1144555
doi
10.5281/zenodo.1144555
oai:zenodo.org:1144555
P. S. Aithal
College of Computer and Information Science, Srinivas University, Mangaluru, Karnataka
A STUDY ON FINGERPRINT HASH CODE GENERATION BASED ON MD5 ALGORITHM AND FREEMAN CHAIN CODE
K. Krishna Prasad
Research Scholar, College of Computer and Information Science, Srinivas University, Mangaluru, Karnataka
info:eu-repo/semantics/openAccess
Creative Commons Attribution 4.0 International
https://creativecommons.org/licenses/by/4.0/legalcode
Fingerprint Image, Fingerprint Hashcode, Authentication, Multifactor Authentication Model, Freeman Chain Code & MD5 Algorithm
<p>The drastic changes in mobile and wireless based technologies and increasing number of applications and users demanded high-security concern, which leads to research on biometrics with a purpose to increase the security aspects and to minimize security threats. The current global mindset toward terrorism has influenced people and their governments to take some special actions and be extra proactive in protection or security problems. Fingerprint image and identification technology have been in life for hundreds of years. Archaeologists have exposed proof suggesting that interest in fingerprints dates to prehistory. But the modern study reveals that fingerprint is not so secured like secured passwords which consist of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of latent fingerprints. We cannot keep fingerprint as secure like rigid passwords. In this paper, we discuss fingerprint image Hash code generation based on the MD5 Algorithm and Freeman Chain code calculated on the binary image. Freeman chain code extracts all possible boundaries for an image and which gives starting x and y positions as x0 and y0. Hashcode alone not sufficient for Verification or Authentication purpose, but can work along with Multifactor security model or it is half secured. To implement Hash code generation we use MATLAB2015a. This study shows how fingerprints Hash code uniquely identifies a user or acts as index-key or identity-key.</p>
Zenodo
2018-01-10
info:eu-repo/semantics/article
1144554
1579540834.367164
363753
md5:0c86c9caaca49fe73efc2f34ef3d2d14
https://zenodo.org/records/1144555/files/114.pdf
public
10.5281/zenodo.1144554
isVersionOf
doi
International Journal of Computational Research and Development
3
1
13-22
2018-01-10