International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 112

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014


Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar


Abstract: Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia-marking with false minutiae removal methods are used in the work. An alignment-based elastic matching algorithm has been developed for minutia matching. This algorithm is capable of finding the correspondences between input minutia pattern and the stored template minutia pattern without resorting to exhaustive search. Performance of the developed system is then evaluated on a database with fingerprints from different people.


Keywords: Cryptography, database toolbox, oracle, fingerprint, image enhancement, filtering, minutiae extraction, image post-processing, fingerprints matching and encryption using biometric key


Edition: Volume 3 Issue 4, April 2014,


Pages: 418 - 421


How to Cite this Article?

Abhishek Sharma, Narendra Kumar, "Encryption of Text Using Fingerprints as Input to Various Algorithms", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=20131461, Volume 3 Issue 4, April 2014, 418 - 421

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 8

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Similar Articles with Keyword 'oracle'

Downloads: 113

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1160 - 1163

Dynamic Application Development for Web Application Process

Saranya Seera, Y. Sangeetha

Share this Article

Downloads: 123

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 612 - 613

Database Privilege Management and Data Dictionary: Security Issues and Avoidance

M. Rajesh

Share this Article

Similar Articles with Keyword 'fingerprint'

Downloads: 3 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Similar Articles with Keyword 'image enhancement'

Downloads: 133

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Downloads: 140

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 143 - 147

Integrated Approach for Solving Haziness in an Image Using Dark and Bright Channel Prior

Jyoti Tomar, Shweta Bandhekar

Share this Article

Similar Articles with Keyword 'filtering'

Downloads: 102

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this Article

Downloads: 103

Comparative Studies, Information Technology, India, Volume 4 Issue 8, August 2015

Pages: 1437 - 1440

Comparative Analysis of Various Denoising Techniques for MRI Images

Priya C. Nair, G. Suganthi

Share this Article

Similar Articles with Keyword 'minutiae extraction'

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Downloads: 133

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article
Top