Published December 30, 2023 | Version CC BY-NC-ND 4.0
Journal article Open

Cryptographic Security Approach for Biometric Verification System

  • 1. Department of Computer Science, Federal University, Oye Ekiti.
  • 1. Department of Computer Science, Federal University, Oye Ekiti.
  • 2. Department of Computer Science, Federal University of Technology, Akure.
  • 3. Department of Computer Science, Bamidele Olumilua University of Education, Science and Technology, Ikere - Ekiti.

Description

Abstract: This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.

Files

C78540912323.pdf

Files (491.9 kB)

Name Size Download all
md5:452ea0aaddc0f175d79f946a6b9eeef8
491.9 kB Preview Download

Additional details

Identifiers

DOI
10.54105/ijcns.C7854.113223
EISSN
2582-9238

Dates

Accepted
2023-11-15
Manuscript received on 03 July 2023 | Revised Manuscript received on 07 November 2023 | Manuscript Accepted on 15 November 2023 | Manuscript published on 30 December 2023

References

  • Afsar F.A, Arif M. and Hussain M. (2004) Fingerprint Identification and Verification System using Matching, National Conference on Emerging Technologies PP 141-146
  • Acharya B., Rath G.S., Parra S.K. Panigraphy S.K. (2007) Novel Methods of Generating seif-invertible matrix for Hill Cipher Algorithm International Journal secur. 1(1)
  • Chaudhary V., Bhardwaj S., Sabharwa H. (2014) "Fingerprint Recognition using Orientation features" International Journal of Advanced Research in Computer Science and Software engineering. Research paper available online at www.ijarcsse.com. Vol 4, issue 5.
  • Dawahdeh Z. E., Yaakob S.N., R.R., Bin Othman (2018), " A new image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipher" Journal of King Saud University-Computer and Information Science 30 (2018) 349-355. https://doi.org/10.1016/j.jksuci.2017.06.004
  • Philippe parra (2003) Fingerprint minutiae extraction and matching for identification procedure
  • Quist-Aphetsi Kester, (2013)" A Cryptographic Image Encryption Technique for Facial-Blurring of Images" International Journal of Advanced Technology and engineering Research (IJATER) www.ijater.com
  • Vivek K. S. , Tripatti S.P., Agarwal R.P. and Singl J.B. (2011) "Formal Verification of fingerprint ATM Transaction through Real Time Constraint Notation (RTCN) " (IJCSI) International Journal of Computer Science Issues, (8)(13)395:400. www.IJCSI.org.
  • Jassin F. A. (2013) . "A Novel Steganography Algorithm for Hiding text in Image using Five Modulus Method" International Journal of Computer Applications (0975-8887) Vol 72 No17.
  • Raju Rajkumar, Hemachandram (2012)" A secondary Fingerprint Enhancement and Minutiae Extraction, Signal and Image Processsing" An International Journal (SIPIJ) vol 3, No2 https://doi.org/10.5121/sipij.2012.3213
  • Shanthi, Palamisamy V. (2014) A Novel Text to Image Encryption Technique by AES Rijndael Algorithm with color code conversation, International Journal of Engineering trends and Technology (IJETT) Vol 13, No 15, PP 237-241 ISSN: 2231-5381. https://doi.org/10.14445/22315381/IJETT-V13P249
  • Yuliang .H, Jie T., X ipingL, Taughui Z. (2003) "Image enhancement and minutiae matching fingerprint verification" Pattern recognition letters Vol 24 pp 1349-1360 https://doi.org/10.1016/S0167-8655(02)00376-8
  • Saravanan, S., & Sivabalakrishnan, M. (2019). A Framework for Digital Image Encryption using Chaotic Baker Map with SHA Algorithm. In International Journal of Innovative Technology and Exploring Engineering (Vol. 2, Issue 9, pp. 4093–4097). https://doi.org/10.35940/ijitee.b7716.129219
  • Archana, N., Manogna, S., Hussain, Dr. M. A., & Razia, Dr. Sk. (2019). Secure Sharing of Documents using Image Encryption and Key Image. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 4, pp. 9415–9419). https://doi.org/10.35940/ijrte.d9724.118419
  • Janani, S., Shalini, M., Parkavi, K., & Chandrasekar, A. (2019). Autonomous Data hiding in an Encrypted Image using KM-DH Algorithm. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 2, pp. 4950–4952). Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP. https://doi.org/10.35940/ijitee.a4524.129219
  • Vejare, R., Vaish, A., Singh, K., & Desai, M. (2022). Removal of Image Steganography using Generative Adversarial Network. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 2, Issue 4, pp. 6–10). Lattice Science Publication (LSP). https://doi.org/10.54105/ijainn.d1054.062422
  • Proença, M. da C. (2022). On the Need of Quick Monitoring for Wildfire Response from City Halls. In Indian Journal of Image Processing and Recognition (Vol. 2, Issue 3, pp. 1–4). Lattice Science Publication (LSP). https://doi.org/10.54105/ijipr.c1014.042322