Fingerprint Image Enhancement: Algorithm and Performance Evaluation
IEEE Transactions on Pattern Analysis and Machine Intelligence
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Fusing images with different focuses using support vector machines
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
Biometrics, cryptography and data hiding will provide good perspectives for information security Bodo, 1994. The information security mainly depends on the secret key. In this paper, the issues related with key management of cryptosystem Gao, 2010 is addressed by providing biometrics-based Jain et al., 2007 key generation which is never stored or revealed to the authentication server. Finger print is widely used than the iris or face and more over it is the primary choice for most privacy concerned applications. Fingerprint-based authentication with randomly selected 40 minutiae is sufficient to generate the key. Elliptic curve is the best solution for cryptography Miller, 1986. The proposed work deals about, how the image quality can be improved by introducing image fusion technique at sensor levels. The results of the images after introducing the decision rule based image fusion technique are evaluated and analysed with its entropy levels and root mean square error. Then the resultant enhanced image is used for extracting the key for ECC applications.