CI004 | Published : 10- April -2018 | March-April - 2017 [(4) 5: 248-254 ] 2 nd International Conference on Current Research Trends in Engineering and Technology © 2018 IJSRSET | Volume 4 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099 Themed Section: Engineering and Technology 248 Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security Megha D. Randeri *1 , Dr. Sheshang D. Degadwala 2 , Mrs. Arpana Mahajan 3 * 1 ME Student, Computer Engineering Department, SIE, Vadodara, Gujarat, India 2 Head of Computer Department, SIE, Vadodara, Gujarat, India 3 Assistant Professor, Computer Engineering Department, SIE, Vadodara, Gujarat, India ABSTRACT In recent Era, Security has been most important issue to be considered with different forward looking and preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we propose a technique to generate the key matrix by extracting minutiae points from the combined minutiae template of fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase, second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption of the original image using generated key matrix, we use Hill cipher. Keywords: Fingerprints, Minutiae Points, Cryptography, Hill Cipher. I. INTRODUCTION As of late, the advance in the correspondence innovations is bringing about exchange of data in the openly shared media. To secure these, there is a huge intrigue appeared by the researchers in the cryptographic area prompting numerous creative and productive encryption strategies. Each encryption technique needs to utilize secure keys. The cryptographic keys might be an arbitrary number or password. There are different techniques to produce such keys; a few strategies are proposed to create cryptographic keys from the biometric for example, iris, fingerprints, signature and so forth as in [1, 3, 4, 5]. There is a critical development in the field of biometric innovations in recent years, and many of them are deployed according to the specific application and their acceptability to the users. Fingerprints have been utilized for over a century and are the most generally utilized type of biometric recognizable proof. This unique mark of an individual is interesting and stays unaltered over a person’s lifetime. On a finger, the unique patterns formed by the ridges make up fingerprints. A valley is the area between two consecutive ridges. Among various minutiae types, the ridge endings and bifurcations are utilized commonly. Ridge endings are point where the ridge terminates and bifurcation are points where a single ridge divides into two ridges. In this paper, we propose a new technique of encrypting an image using