International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014


Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma [11] | Narendra Kumar [15]


Abstract: Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia-marking with false minutiae removal methods are used in the work. An alignment-based elastic matching algorithm has been developed for minutia matching. This algorithm is capable of finding the correspondences between input minutia pattern and the stored template minutia pattern without resorting to exhaustive search. Performance of the developed system is then evaluated on a database with fingerprints from different people.


Keywords: Cryptography, database toolbox, oracle, fingerprint, image enhancement, filtering, minutiae extraction, image post-processing, fingerprints matching and encryption using biometric key


Edition: Volume 3 Issue 4, April 2014,


Pages: 418 - 421


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Abhishek Sharma, Narendra Kumar, "Encryption of Text Using Fingerprints as Input to Various Algorithms", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 418-421, https://www.ijsr.net/get_abstract.php?paper_id=20131461

Similar Articles with Keyword 'Cryptography'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson | Jesline Abraham

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor | Laxmi Ahuja

Share this Article
Top