A Biometric Cryptographic System based on Fingerprint signature | ||||
Journal of the ACS Advances in Computer Science | ||||
Article 1, Volume 9, Issue 1, 2018, Page 1-19 PDF (841.12 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/asc.2018.158378 | ||||
View on SCiNiTO | ||||
Abstract | ||||
The main goal of this paper is to give new insights and directions on how to improve existing methods of hiding secret messages, possibly by combining steganography and cryptography. We start by a security background describing its history and a short comparison between cryptography and steganography. We then illustrate our approach that helps us achieve a higher level of secrecy and security. In such a way to make it harder for any steganalyst to retrieve the plaintext of a secret message from a stego-object if cryptanalysis were not used. The principle motivation behind the presented paper is to set up a safe path by incorporating the organic trademark as a key with cryptographic applications. A binary string is produced dependably from authentic unique finger impression traditions. That key is produced from a subject's fingerprint image with the guide of SDK, which don't uncover the key. The multiplication of that key relies on upon the identical fingerprint image. That is the reason the general key dispersion issue is dependably allude to the undertaking of appropriating mystery keys between imparting gatherings to give security properties such as secrecy and authentication. A novel system is acquainted with exchange individual biometric fingerprint (payload) as a symmetric key in mystery utilizing Secure Hash Algorithm 1 which is acting as a cryptographic hash work - one approach to create 20-bytes hash esteem known as a message process. At that point the Enhanced Hill Multimedia Cryptosystem (EHMC) is utilized to transport that key safely to alternate gatherings. When they have the key the much quicker symmetric encryption can used to trade the real information planned to be exchanged. So that key administration assumes a major part in cryptography as the reason for securing cryptographic techniques. In this paper, the issue of sharing this sort of keys is tended to. Many experiments were done to guarantee the outcomes and it is demonstrated that separating any data about the bio-key as well as from the encoded information is hard for any meddlers with computational assets. | ||||
Keywords | ||||
Cryptography; Steganography; Public-Key; Probabilistic Encryption; Chinese Remainder Theorem; Quadratic Residues; Multimedia; RSA and the Extended Euclidean Algorithm | ||||
Statistics Article View: 124 PDF Download: 184 |
||||