Design of Secured Key Generation Algorithm using Fingerprint Based Biometric Modality

Many high-secure applications are using biometrics for natural, user-friendly and quick authentication. Cryptography is meant to make sure the secrecy and authenticity of message and protecting the confidentiality of the cryptographic keys is one among the numerous problems to be dealt with. Researchers are examining suggests that to utilize biometric options of the user to get sturdy and repeatable cryptographic keys rather than a memorable password. This may be efficiently solved by the combination of biometrics with cryptography. This paper presents ways for generating the strong bio-crypt key based mostly on fingerprint. Fingerprint biometric modality is predominantly thought of due to its two vital characteristics uniqueness and permanence that's ability to stay unchanged over the lifetime. I. INTRODUCTION Among all the biometric modalities, fingerprint-based identification is the oldest methodology, that has been successfully employed in numerous applications. Most are known to possess distinctive, immutable fingerprints. The individuality of a fingerprint will be determined by the pattern of ridges and furrows as well as the trivialities points. Trivialities points are native ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

[1]  Francesco Piazza,et al.  Novel Sub-band Adaptive Systems Incorporating Wiener Filtering for Binaural Speech Enhancement , 2005, NOLISP.

[2]  Oleg Starostenko,et al.  K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation , 2009, CIARP.

[3]  Mayer Aladjem,et al.  Fingerprint image enhancement using filtering techniques , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[4]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[5]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[6]  Venu Govindaraju,et al.  Combination of Symmetric Hash Functions for Secure Fingerprint Matching , 2010, 2010 20th International Conference on Pattern Recognition.

[7]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[8]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[9]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[10]  Kazuhiko Hamamoto,et al.  PERFORMANCE EVALUATION OF FIELD SMOOTHING FILTERS , 2010 .

[11]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..