Abstract
In any network, security is considered to be the major issue because of intruders. The motivation of this research is to achieve security in transmission of information by using dual-fingerprint combined with encryption algorithm called elliptic curve cryptography (bio-cryptography). The crypto system’s strength lies in the key used for encryption and decryption. For human users, it is very difficult to remember long cryptographic keys. This paper focuses on generation of cryptographic keys based on fusion approach of fingerprints which reduces the complexity of other traditional cryptosystems. Biometric features like fingerprints are permanent throughout person’s lifespan. We propose fingerprint key generation scheme, which is robust and used for encryption and decryption in elliptic curve cryptography. For measuring a performance, false acceptance ratio and false rejection ratio are used. This method is evaluated using FVC2004, a fingerprint publicly available database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Manjeet, K., Sanjeev, S., Deepak, S.: Template and database security in biometrics systems: a challenging task. Int. J. Comput. Appl. 4(5) (2010)
Sharath, P., Umut, U., Salil, P., Anil, K.J.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
Rao, B.R., Rao, E.K., Rao, S.R., Rama, M.: Finger print parameter based cryptographic key generation. Int. J. Eng. Res. Appl. (IJERA) 2(6), 1598–1604 (2013). ISSN 2248-9622
Bharati, K., Satao, K.J.: Implementation of multi biometric cryptosystem for information security using ECC. Science Direct (2015)
Feifei, C., Gongping, Y.: Score level fusion of fingerprint and finger vein recognition. J. Comput. Inf. Syst. 7(16), 5723–5731 (2011)
Shin-Yan, C.: Secure method for biometric-based recognition with integrated cryptographic functions. BioMed. Res. Int. 2013, 1–12. Article ID 623815. Hindawi Publishing Corporation (2013). http://dx.doi.org/10.1155/2013/623815
Junghsi, L., Hung, H.: Fingerprint image cryptography based on multiple chaotic systems. Sig. Process. 113, 169–181 (2015)
Tohari, A., Kai, X., Fengling, H., Jiankun, H.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Secur. Commun. Netw. Wiley Online Library (wileyonlinelibrary.com) (online) (2010). https://doi.org/10.1002/sec.225
Duraiswamy, K., Jagadeesan, A.: Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 7(1), 296–305 (2010)
Mukesh, R., Subashini, V.J.: Fingerprint based authentication system using threshold visual cryptographic technique. In: IEEE-International Conference on Advances in Engineering, Science and Management, ICAESM-2012, pp. 16–19 (2012)
Zhe, L., Xinyi, H., Zhi H., Muhammad, K.K., Hwajeong, S., Lu, Z.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Dependable Secure Comput. XX(XX) (2016)
Li, C., Hu, J., Pieprzyk, J., Susilo, W.: A new biocryptosystem-oriented security analysis framework and implementation of multi-biometric cryptosystems based on decision level fusion. IEEE Trans. Inf. Forensics Secur. 10(6), 1193–1206 (2015)
Yogita, P., Girish, C.: Biometric key generation for elliptic curve cryptography. Int. J. Manag. Technol. Eng. (IJMTE) 8(X) (2018). Impact Factor: 6.3. ISSN 2249-7455
Abhishek, N., Karthik, N., Anil, K.J.: Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7(1), 255–268 (2012)
Karthik, N., Anil, K.J., Sharath, P.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2009)
FVC2004. http://bias.csr.unibo.it/fvc2004/. Accessed 11 Nov 2018
Patil, M.N., Iyer, B., Arya, R.: Performance evaluation of PCA and ICA algorithm for facial expression recognition application. In: Proceedings of fifth international conference on soft computing for problem solving, pp. 965–976 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pagar, Y.S., Chowdhary, G.V. (2020). Strengthening Elliptic Curve Cryptography—Key Generation via Biometric Fusion Approach. In: Iyer, B., Deshpande, P., Sharma, S., Shiurkar, U. (eds) Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol 1025. Springer, Singapore. https://doi.org/10.1007/978-981-32-9515-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-32-9515-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9514-8
Online ISBN: 978-981-32-9515-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)