DocumentCode
2401263
Title
RC5 encryption using key derived from fingerprint image
Author
Ali, Asha ; Aliyar, Liyamol ; Nisha, V.K.
Author_Institution
Anna Univ. of Technol., Coimbatore, India
fYear
2010
fDate
28-29 Dec. 2010
Firstpage
1
Lastpage
4
Abstract
This paper presents a method for encrypting user´s data using RC5 algorithm with a secret key, which is embedded in a biometric fingerprint image using LSB based image steganography techniques and stored in the database. The key can be unpacked only by presenting a genuine fingerprint image. The fingerprint images are compared using an efficient fingerprint matching algorithm that involves a Phase Only Correlation (POC) function. This is a fully automated method of data encryption that incorporates biometrics authentication. The database itself is protected using a master key. This method ensures the prevention of key leakage and provides a more secure way for data encryption.
Keywords
authorisation; cryptography; fingerprint identification; image coding; steganography; LSB based image steganography technique; RC5 encryption; biometric fingerprint image; biometrics authentication; data encryption; fingerprint matching algorithm; key leakage; phase only correlation function; Correlation; Databases; Encryption; Fingerprint recognition; Fingers; Image matching; Biometrics; Cryptography; LSB based image steganography; Phase Only Correlation; RC5 Encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on
Conference_Location
Coimbatore
Print_ISBN
978-1-4244-5965-0
Electronic_ISBN
978-1-4244-5967-4
Type
conf
DOI
10.1109/ICCIC.2010.5705778
Filename
5705778
Link To Document