Skip to main content

Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach

  • Conference paper
  • First Online:
Computing in Engineering and Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1025))

Abstract

In any network, security is considered to be the major issue because of intruders. The motivation of this research is to achieve security in transmission of information by using dual-fingerprint combined with encryption algorithm called elliptic curve cryptography (bio-cryptography). The crypto system’s strength lies in the key used for encryption and decryption. For human users, it is very difficult to remember long cryptographic keys. This paper focuses on generation of cryptographic keys based on fusion approach of fingerprints which reduces the complexity of other traditional cryptosystems. Biometric features like fingerprints are permanent throughout person’s lifespan. We propose fingerprint key generation scheme, which is robust and used for encryption and decryption in elliptic curve cryptography. For measuring a performance, false acceptance ratio and false rejection ratio are used. This method is evaluated using FVC2004, a fingerprint publicly available database.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Manjeet, K., Sanjeev, S., Deepak, S.: Template and database security in biometrics systems: a challenging task. Int. J. Comput. Appl. 4(5) (2010)

    Google Scholar 

  2. Sharath, P., Umut, U., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  3. Rao, B.R., Rao, E.K., Rao, S.R., Rama, M.: Finger print parameter based cryptographic key generation. Int. J. Eng. Res. Appl. (IJERA) 2(6), 1598–1604 (2013). ISSN 2248-9622

    Google Scholar 

  4. Bharati, K., Satao, K.J.: Implementation of multi biometric cryptosystem for information security using ECC. Science Direct (2015)

    Google Scholar 

  5. Feifei, C., Gongping, Y.: Score level fusion of fingerprint and finger vein recognition. J. Comput. Inf. Syst. 7(16), 5723–5731 (2011)

    Google Scholar 

  6. Shin-Yan, C.: Secure method for biometric-based recognition with integrated cryptographic functions. BioMed. Res. Int. 2013, 1–12. Article ID 623815. Hindawi Publishing Corporation (2013). http://dx.doi.org/10.1155/2013/623815

  7. Junghsi, L., Hung, H.: Fingerprint image cryptography based on multiple chaotic systems. Sig. Process. 113, 169–181 (2015)

    Article  Google Scholar 

  8. Tohari, A., Kai, X., Fengling, H., Jiankun, H.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Netw. Wiley Online Library (wileyonlinelibrary.com) (online) (2010). https://doi.org/10.1002/sec.225

  9. Duraiswamy, K., Jagadeesan, A.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(1), 296–305 (2010)

    Google Scholar 

  10. Mukesh, R., Subashini, V.J.: Fingerprint based authentication system using threshold visual cryptographic technique. In: IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012, pp. 16–19 (2012)

    Google Scholar 

  11. Zhe, L., Xinyi, H., Zhi H., Muhammad, K.K., Hwajeong, S., Lu, Z.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Dependable Secure Comput. XX(XX) (2016)

    Google Scholar 

  12. Li, C., Hu, J., Pieprzyk, J., Susilo, W.: A new biocryptosystem-oriented security analysis framework and implementation of multi-biometric cryptosystems based on decision level fusion. IEEE Trans. Inf. Forensics Secur. 10(6), 1193–1206 (2015)

    Google Scholar 

  13. Yogita, P., Girish, C.: Biometric key generation for elliptic curve cryptography. Int. J. Manag. Technol. Eng. (IJMTE) 8(X) (2018). Impact Factor: 6.3. ISSN 2249-7455

    Google Scholar 

  14. Abhishek, N., Karthik, N., Anil, K.J.: Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7(1), 255–268 (2012)

    Article  Google Scholar 

  15. Karthik, N., Anil, K.J., Sharath, P.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2009)

    Google Scholar 

  16. FVC2004. http://bias.csr.unibo.it/fvc2004/. Accessed 11 Nov 2018

  17. Patil, M.N., Iyer, B., Arya, R.: Performance evaluation of PCA and ICA algorithm for facial expression recognition application. In: Proceedings of fifth international conference on soft computing for problem solving, pp. 965–976 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yogita S. Pagar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pagar, Y.S., Chowdhary, G.V. (2020). Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach. In: Iyer, B., Deshpande, P., Sharma, S., Shiurkar, U. (eds) Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol 1025. Springer, Singapore. https://doi.org/10.1007/978-981-32-9515-5_9

Download citation

Publish with us

Policies and ethics