Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Fuzzy Bio-Cryptography Key Generation

Author : Dr. Dayananda. R. B. 1 Dr. R. Sanjeev Kunte 2 Mr. Gowreesha. H. B. 3 Mr. Chandrashekar. B. S. 4

Date of Publication :7th May 2016

Abstract: Cryptography is one of the most effective ways to enhance the information security. In the traditional cryptographic algorithms, such as AES and DES etc, information is encrypted and decrypted using cipher keys. Simple keys are easy to be memorized while they are also easy to be cracked. On the other hand, the complex keys are difficult to be cracked while they are also difficult to be remembered and have to be stored in somewhere which can be stolen or lost. To solve these problems, biometric features, which cannot be forgotten, stolen, shared and cracked, have been combined with the cryptography to form biometric cryptography. Bio-cryptography integrates cryptography and biometrics to take advantage of the strengths of both fields. Biocryptographic techniques protects secret key by using biometric feature or generates a key from biometric features. The fingerprint biometric which is unique to the individual is used. Minutiae features are extracted from pre-processed fingerprint images. Cubic spline curve is fitted using bifurcation points of the extracted minutiae. A secret key of 128 bit length is formed by combining the control points of the cubic spline curve. This key can be used with any standard cryptography algorithm for encrypting the file. To decrypt the file, user’s fingerprint image is matched with the registered database and on successful match key is released. An overall recognition rate of about 85% is obtained by the system.

Reference :

    1. Ballan M, “Directional Fingerprint Processing”, proceedings of Fourth International Conference on Communication, Networking & Broadcasting, pp. 1064- 1067, 12-16 Oct. 1998. 
    2. Mohamed Suliman M and Henry O Nyongesa, “Automatic Fingerprint Classification System Using Fuzzy Neural Techniques”, proceedings of IEEE International Conference on Computing & Processing (Hardware/Software), pp. 12-17, May 2002.
    3. Hanaa M. A. Salman, “Fuzzy Bio-Cryptography Key Generation”, proceedings of the 13th International ACIT 2012, Dec. 10-13.
    4. Kai Xi and Jiankun Hu, Bio-Cryptography - Handbook of Information and Communication Security, pp. 129-157, 2004
    5. Ratha., N. K., Chikkerur., S. Connell., J. H. Bolle., R.M., "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp.561 - 572, 2007.
    6. B. Prasanalakshmi, A. Kannammal, "A secure cryptosystem from palm vein biometrics", In proceedings of the ACM International, Seoul, Korea, pp. 1401-1405, 2009.
    7. H. A. Garcia-Baleon, V. Alarcon-Aquino, O. Starostenko, "K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation", proceedings of the 14th Iberoamerican Conference on Pattern Recognition, pp. 85 – 94, 2009.
    8. B. Chen, V. Chandran, "Biometric Based Cryptographic Key Generation from Faces", In Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394-401, 2007.
    9. Sangram Bana, and Dr. Davinder Kaur, “Fingerprint Recognition using Image Segmentation”, International Journal of Advanced Engineering Sciences and Technologies, vol. 5, pp. 012 – 023, 2011.
    10. Sozan Abdullah Mahmood, “Fingerprint identification Based on Skeleton Minutiae extraction”, proceeding of ICGST AIML Conference, pp. 161 -165, 2011.
    11. Marius Tico, Eero Immonen, Pauli Ramo, Pauli Kuosmanen, and Jukka Saarinen, “Finger print recognition using wavelet features”, proceeding of IEEE International Symposium on Communication, pp. 21- 24, 2001.
    12. Jyoti Rajharia, and P.C. Gupta, “A New and Effective Approach for Fingerprint Recognition by using Feed Forward Back Propagation Neural Network”, International Journal of Computer Applications, vol 52, pp. 020-028, 2012.
    13. Rajib Paul, Mustafa Sarwar Nasif, and S. M. Farhad, “Fingerprint recognition by Chain Coded String Matching technique”, proceeding of International Conference on Information and Communication Technology, pp. 64-67, 2007.
    14. Ravi J, K.B. Raja, and Venugopal K.R, “Finger Print Recognition using Minutia Score Matching”, International Journal of Engineering Science and Technology, vol.1, no. 2, pp. 35-42, 2009.
    15. L. O’Gorman, “Overview of fingerprint verification technologies”, Elsevier Information Security Technical Report, vol. 3, 1998.
    16. Roli Bansal, Priti Sehgaland, Punam Bedi, Minutiae Extraction from Fingerprint Images - a Review, IJCSI International Journal of Computer Science Issues, vol. 8, Issue 5, No 3, 2011.
    17. Peter Stavroulakis, Mark Stamp, “Handbook of Information and Communication Security”, Springer, ISBN 978-3-642-04116-7, 2010.
    18. A. Juels, M. Wallenberg, “A Fuzzy Commitment Scheme”, In Proceeding of Sixth ACM Conference on Computer and Communications Security, Singapore, pp. 28-36, 1999.
    19. A. Juels, M. Sudan, “ A Fuzzy Vault Scheme”, In Proceeding of the IEEE International Symposium on Information Theory, Lau-sanne, pp. 408, 2002.
    20. Y.J. Chang, W. Zhang, T. Chen, “ Biometrics Based Cryptographic Key Generation”, In Proceeding of the IEEE Conference on Multimedia and Expo, Taipei, pp. 2203-2206, 2001.
    21. C. Vielhauer, R. Stcinmctz, A. Maycrhofcr, “Biomctric Hash Based on Statistical Features of Online Signatures”, In Proceeding of the 16th International Conference on Pattern Recognition, Quebec, pp.123-126, 2002.
    22. Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data”, SIAM Journal on Computing, vol. 38, no. 1, pp.97–139, 2008.
    23. Kushal veer singh, “application of neural networks in fingerprint identification”, thesis, 2010. [25] K. Venkateshwarlu, “Image Enhancement using Fuzzy Inference System”, thesis, June 2010.
    24. Lin Hong, “Automatic Personal Identification Using Fingerprints”, Ph.D. Thesis, 1998.
    25. Maria Cristina Floreno, Giovanni Novelli, “Implementingfuzzy polynomial interpolation (FPI) and fuzzy linear regression (LFR)”. http://www.dmi.unict.it/ojs/index.php/lematematiche/articl e/view/426 
    26. http://bias.csr.unibo.it/fvc2004

Recent Article