Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015
Data Protection Using Virtual Identity and Modified RSA
Rishin Ali K, Mohammed Aslam V.N
This is a new system for protecting user data using integrated fingerprint template, virtual identity and modified RSA. In the process of fingerprint enrolment, two different fingerprints are used. The minutiae positions from one fingerprint, orientation from the other one and reference points from both fingers are used. Using unique coding technique an integrated minutiae template is generated from these two different fingerprints and stored in the database. This makes it more secure in case of a theft, it will be difficult for the attacker to distinguish the integrated template from the original template since their topology is similar. In the authentication process, system requires two query fingerprints from the same fingers which are used for the enrolment. Multi-stage fingerprint matching is proposed for matching the query fingerprints with the integrated minutiae template. We are selecting the fingerprints randomly and because of the altering to the integrated template we will be able to create a better new virtual identity. Features of the generated virtual identity is used to implement the modified RSA algorithm for the data protection. We can make the data protection technique unique for each and every user since the encryption and decryption of data is done using their fingerprint identity. This technique can be used for protecting various user data.
Keywords: Data protection, Fingerprint, Virtual identity, Modified RSA, Cryptography
Edition: Volume 4 Issue 6, June 2015
Pages: 2466 - 2469
How to Cite this Article?
Rishin Ali K, Mohammed Aslam V.N, "Data Protection Using Virtual Identity and Modified RSA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155904, Volume 4 Issue 6, June 2015, 2466 - 2469
Similar Articles with Keyword 'Data protection'
A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard
Yogita Verma, Neerja Dharmale
Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
Sunayana A. Sutar, Ashish A. Zanjade
Similar Articles with Keyword 'Fingerprint'
Design and Implementation of Ballot Malfunctioning System Avoidance Security Optimization
A. Lalitha, N. Muthu Sankar
An Automatic Ballot Mechanism for Electoral Purpose
Thampula Kartheek, B. Naveen Kumar
Similar Articles with Keyword 'Cryptography'
Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari
Image Cryptography Based Upon Scrambling and Random Integer
Gurpreet Singh, Lovleen Kaur
Similar Articles with Keyword 'Data'
Realization of Smart City Using 5G Cognitive Radio
Lalit Chettri, Syed Sazad
A Comparative Study on the Diagnosis of Skin Cancer using different Models in Deep Learning
Surya S Kumar, Dhanesh M S
Similar Articles with Keyword 'protection'
A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V, M. D. Patil
A Review Based on Effects of Change in Thickness and Number of Layers on Microwave Absorbing Materials
Harsroop Kaur, Gagan Deep Aul