Crypto key generation using contour graph algorithm

  • Authors:
  • M. S. Al-Tarawneh;L. C. Khor;W. L. Woo;S. S. Dlay

  • Affiliations:
  • School of Electrical, Electronic and Computer Engineering, University of Newcastle, Newcastle upon Tyne, United Kingdom;School of Electrical, Electronic and Computer Engineering, University of Newcastle, Newcastle upon Tyne, United Kingdom;School of Electrical, Electronic and Computer Engineering, University of Newcastle, Newcastle upon Tyne, United Kingdom;School of Electrical, Electronic and Computer Engineering, University of Newcastle, Newcastle upon Tyne, United Kingdom

  • Venue:
  • SPPRA'06 Proceedings of the 24th IASTED international conference on Signal processing, pattern recognition, and applications
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptography and biometrics have been identified as two of the most important aspects of digital security environment, for various types of security problems the merging between cryptography and biometrics has led to the development of Bio-Crypto technology. In this paper we propose a cryptography key generating methodology based on graph construction and adjacency matrix of extracted minutiae. The formation of graph relies on contour division of minutiae points area. Minutiae points area is studied on both scenarios (with singular point, and without singular point detection). Results show that with singular point detection the average of minutiae points area dimension is less than in the other case and at some points of threshold, it show an improvement performance comparing to the other one. 100% uniqueness key was achieved on both cases.