Encryption of Text Using Fingerprints as Input to Various Algorithms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia-marking with false minutiae removal methods are used in the work. An alignment-based elastic matching algorithm has been developed for minutia matching. This algorithm is capable of finding the correspondences between input minutia pattern and the stored template minutia pattern without resorting to exhaustive search. Performance of the developed system is then evaluated on a database with fingerprints from different people.

Keywords: Cryptography, database toolbox, oracle, fingerprint, image enhancement, filtering, minutiae extraction, image post-processing, fingerprints matching and encryption using biometric key

Edition: Volume 3 Issue 4, April 2014

Pages: 418 - 421

Share this Article

How to Cite this Article?

Abhishek Sharma, Narendra Kumar, "Encryption of Text Using Fingerprints as Input to Various Algorithms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131461, Volume 3 Issue 4, April 2014, 418 - 421

134 PDF Views | 99 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Similar Articles with Keyword 'database toolbox'

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'oracle'

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1160 - 1163

Dynamic Application Development for Web Application Process

Saranya Seera, Y. Sangeetha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 612 - 613

Database Privilege Management and Data Dictionary: Security Issues and Avoidance

M. Rajesh

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 2, February 2019

Pages: 440 - 442

Estimating Social Opinion Dynamics Models from Voting System

Divya, Rashmi Mohan, Cynthiya Priyadharshini

Share this Article

Similar Articles with Keyword 'fingerprint'

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Research Paper, Information Technology, Iraq, Volume 6 Issue 4, April 2017

Pages: 1848 - 1851

Family Health Follow-up Using: the Internet of Things (IoT)

Faeza Al-Mashhadani

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 503 - 506

Different Modalities in Biometric Detection

Mukesh Rinwa, Bharat Borkar

Share this Article

Similar Articles with Keyword 'image enhancement'

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 143 - 147

Integrated Approach for Solving Haziness in an Image Using Dark and Bright Channel Prior

Jyoti Tomar, Shweta Bandhekar

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 328 - 333

An Image Enhancement Framework for Fault Diagnosis and Feature Extraction

Malkit Singh, Gurjinder Singh

Share this Article

Similar Articles with Keyword 'filtering'

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this Article

Comparative Studies, Information Technology, India, Volume 4 Issue 8, August 2015

Pages: 1437 - 1440

Comparative Analysis of Various Denoising Techniques for MRI Images

Priya C. Nair, G. Suganthi

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2307 - 2309

Development of Android Application for speech Quality Measurement

Laishram Rahul, Vinoth Kumar

Share this Article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2450 - 2454

An Offline Filtering Agent for Website Analysis and Content Rating: A Review

Vrushali Sanjay Kharad, Prof. S. S. Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1352 - 1355

Edification Training for Participating in Various Activities through Online

S. Thomas Fleming, P. Selvaraj

Share this Article

Similar Articles with Keyword 'minutiae extraction'

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article
Top