CI004 | Published : 10- April -2018 | March-April - 2017 [(4) 5: 248-254 ]
2
nd
International Conference on Current Research Trends in Engineering and Technology
© 2018 IJSRSET | Volume 4 | Issue 5 | Print ISSN: 2395-1990 | Online ISSN : 2394-4099
Themed Section: Engineering and Technology
248
Image Encryption Using Key Matrix Generation from Biometric
Mixed Fingerprint Image for Two Level Security
Megha D. Randeri
*1
, Dr. Sheshang D. Degadwala
2
, Mrs. Arpana Mahajan
3
*
1
ME Student, Computer Engineering Department, SIE, Vadodara, Gujarat, India
2
Head of Computer Department, SIE, Vadodara, Gujarat, India
3
Assistant Professor, Computer Engineering Department, SIE, Vadodara, Gujarat, India
ABSTRACT
In recent Era, Security has been most important issue to be considered with different forward looking and
preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a
secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which
make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the
private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be
used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we
propose a technique to generate the key matrix by extracting minutiae points from the combined minutiae
template of fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase,
second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption
of the original image using generated key matrix, we use Hill cipher.
Keywords: Fingerprints, Minutiae Points, Cryptography, Hill Cipher.
I. INTRODUCTION
As of late, the advance in the correspondence
innovations is bringing about exchange of data in the
openly shared media. To secure these, there is a huge
intrigue appeared by the researchers in the
cryptographic area prompting numerous creative and
productive encryption strategies. Each encryption
technique needs to utilize secure keys. The
cryptographic keys might be an arbitrary number or
password. There are different techniques to produce
such keys; a few strategies are proposed to create
cryptographic keys from the biometric for example,
iris, fingerprints, signature and so forth as in [1, 3, 4,
5]. There is a critical development in the field of
biometric innovations in recent years, and many of
them are deployed according to the specific
application and their acceptability to the users.
Fingerprints have been utilized for over a century and
are the most generally utilized type of biometric
recognizable proof. This unique mark of an individual
is interesting and stays unaltered over a person’s
lifetime. On a finger, the unique patterns formed by
the ridges make up fingerprints. A valley is the area
between two consecutive ridges. Among various
minutiae types, the ridge endings and bifurcations are
utilized commonly. Ridge endings are point where the
ridge terminates and bifurcation are points where a
single ridge divides into two ridges. In this paper, we
propose a new technique of encrypting an image using