Encryption of Text Using Fingerprints
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 3 Issue 2, February 2014

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, and unacceptable error rates. To represent the large amount of data in the biometric images an efficient feature extraction method is needed. In this paper we have implemented the generation of unique biometric key after Fingerprint processing. Fingerprint processing involves the feature extraction of fingerprint image processing stages such as image Preprocessing, Converting the image in to gray scale, Image Enhancement can be performed with the help of Discrete Fourier transformation, image binarization, image segmentation, image thinning, Minutiae Extraction after Minutiae Extraction again segmentation technique is used. In fingerprints images there are foreground regions and background regions where foreground region show the ridges and valleys while the background regions are to be left out.

Keywords: Cryptography, database toolbox, oracle, and minutiae based features extraction, fingerprints matching and encryption using biometric key

Edition: Volume 3 Issue 2, February 2014

Pages: 397 - 401

Share this Article

How to Cite this Article?

Abhishek Sharma, Narendra Kumar, "Encryption of Text Using Fingerprints", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2013996, Volume 3 Issue 2, February 2014, 397 - 401

143 PDF Views | 116 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Similar Articles with Keyword 'database toolbox'

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'oracle'

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1160 - 1163

Dynamic Application Development for Web Application Process

Saranya Seera, Y. Sangeetha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 612 - 613

Database Privilege Management and Data Dictionary: Security Issues and Avoidance

M. Rajesh

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Research Paper, Information Technology, India, Volume 8 Issue 2, February 2019

Pages: 440 - 442

Estimating Social Opinion Dynamics Models from Voting System

Divya, Rashmi Mohan, Cynthiya Priyadharshini

Share this Article
Top