Title: Biometric encryption using enhanced finger print image and elliptic curve

Authors: G. Mary Amirtha Sagayee; S. Arumugam; G.S. Anandha Mala

Addresses: Department of Computer Science, Nandha College of Engineering, Erode-638 052, Erode Dt, Tamil Nadu, India ' Nandha College of Technology, Vaikkalmedu Bus Stop, Pitchandampalayam (PO), Erode-638 052, Erode Dt, Tamil Nadu, India ' St. Joseph's College of Engineering, Jeppiar Nagar, IT Hwy, Old Mahabalipuram Road, Chennai-600 119, Tamil Nadu, India

Abstract: Biometrics, cryptography and data hiding will provide good perspectives for information security (Bodo, 1994). The information security mainly depends on the secret key. In this paper, the issues related with key management of cryptosystem (Gao, 2010) is addressed by providing biometrics-based (Jain et al., 2007) key generation which is never stored or revealed to the authentication server. Finger print is widely used than the iris or face and more over it is the primary choice for most privacy concerned applications. Fingerprint-based authentication with randomly selected 40 minutiae is sufficient to generate the key. Elliptic curve is the best solution for cryptography (Miller, 1986). The proposed work deals about, how the image quality can be improved by introducing image fusion technique at sensor levels. The results of the images after introducing the decision rule based image fusion technique are evaluated and analysed with its entropy levels and root mean square error. Then the resultant enhanced image is used for extracting the key for ECC applications.

Keywords: biometric encryption; fingerprint images; wavelet neural networks; image fusion; entropy; RMSE; elliptic curve cryptography; ECC; prime field; information security; key management; fingerprint-based authentication; image quality.

DOI: 10.1504/IJESDF.2013.055049

International Journal of Electronic Security and Digital Forensics, 2013 Vol.5 No.2, pp.110 - 123

Received: 28 Jul 2012
Accepted: 04 Apr 2013

Published online: 26 Jul 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article