Title :
RC5 encryption using key derived from fingerprint image
Author :
Ali, Asha ; Aliyar, Liyamol ; Nisha, V.K.
Author_Institution :
Anna Univ. of Technol., Coimbatore, India
Abstract :
This paper presents a method for encrypting user´s data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. The key can be unpacked only by presenting a genuine fingerprint image. The fingerprint images are compared using an efficient fingerprint matching algorithm that involves a Phase Only Correlation (POC) function. This is a fully automated method of data encryption that incorporates biometrics authentication. The database itself is protected using a master key. This method ensures the prevention of key leakage and provides a more secure way for data encryption.
Keywords :
authorisation; cryptography; fingerprint identification; image coding; steganography; LSB based image steganography technique; RC5 encryption; biometric fingerprint image; biometrics authentication; data encryption; fingerprint matching algorithm; key leakage; phase only correlation function; Correlation; Databases; Encryption; Fingerprint recognition; Fingers; Image matching; Biometrics; Cryptography; LSB based image steganography; Phase Only Correlation; RC5 Encryption;
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4244-5965-0
Electronic_ISBN :
978-1-4244-5967-4
DOI :
10.1109/ICCIC.2010.5705778