Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm

Data security is becoming the prime concern these days. In the daily and day-to-day activities, data is required to be shared, whether it is a simple chat message or even the crucial business message or mail. In this paper, the unique concept of using the ECG reports as the authentication medium is proposed. First, the ECG report of the person is analyzed using sin charts and compared with the database. Before processing to the next phase, the user has to validate the transaction ID and SHA key generated using the. The next phase of the message transfer is further secured by providing the transaction id and encryption key. After that, the fingerprints of the users are validated again using the SHA-based concept of validation, and then to transfer data, Diffie–Hellman algorithm is used. In the dissertation, the double level security is maintained and implemented by making use of ECG reports and using the fingerprints. From the previous approaches and base papers, we have speed up the comparison process and reduce the time involved by making use of SHA-based analysis, and the double authentication helps us to deal with hackers in the better ways as compared to the previous approaches as now double efforts will be requirement by the hackers to break through the whole process. The uniqueness of the ECG report will act as uniquely validating the identity of two persons.

[1]  Rahul Kulkarni,et al.  Secure Data communication and Cryptography based on DNA based Message Encoding , 2014 .

[2]  Neha Goyal,et al.  A Review of Comparative Study of MD5 and SHA Security Algorithm , 2014 .

[3]  R. Saravanan Biometrics Based Key Generation using Diffie Hellman Key Exchange for Enhanced Security Mechanism , 2014 .

[4]  Mohsen Machhout,et al.  A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1 , 2017, 2017 International Conference on Control, Automation and Diagnosis (ICCAD).

[5]  Obaida Mohammad Awad Al-Hazaimeh,et al.  A New Approach for Complex Encrypting and Decrypting Data , 2013 .

[6]  Sarita Kumari A research Paper on Cryptography Encryption and Compression Techniques , 2017 .

[7]  Fengqing Tian,et al.  A Secure Public Key Encryption from Computational Linear Diffe-Hellman Problem , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.

[8]  Gopal D. Dalvi,et al.  Facial images authentication in visual cryptography using sterilization algorithm , 2017, 2017 2nd International Conference for Convergence in Technology (I2CT).

[9]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .

[10]  M. Gencoglu,et al.  Mathematical cryptanalysis of “personalized information encryption using ECG signals with chaotic functions” , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[11]  Shawkat K. Guirguis,et al.  A Survey on Cryptography Algorithms , 2018 .