ISSN ONLINE(2320-9801) PRINT (2320-9798)
Sanjukta Pal1, Prof (Dr) Pranam Paul2
|
Related article atPubmed,Scholar Google |
Visit for more related articles atInternational Journal of Innovative Research in Computer and Communication Engineering
In recent days, for secure information transaction through internet, the most used term is cryptography. Where encryption algorithm, decryption algorithm, key generation algorithm and key matching algorithms are used for proper secure transaction from sender to receiver, avoiding any middle attacker. Here the main concept of the paper comes from cryptography, which is combined with the fingerprint geometry, which is the current leader of Biometric Authentication. Here the fingerprint geometry is used for key generation, information deduction from the key. Here the fingerprint matching algorithm would be used for information deduction from key. To implement the above concept, sender’s recent fingerprint geometry would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are already kept by receiver at receiver’s end would be used. Here the fingerprint matching algorithms would be used, which are applied on the binary conversion of the fingerprint images. For this purpose the whole technique is applicable on the binary form. So, for another part of cryptography, means for encryption and decryption process, the binary form of the data is taken. So the steps may be applicable on any type of data, means text, image, multimedia, graphics data etc.
Keywords |
||||
Cryptography, encryption, decryption, key, recent fingerprint geometry, database fingerprintgeometry. | ||||
INTRODUCTION |
||||
For secure information transaction through internet, Cryptography is used. Here for secure data communication theplain text would be encrypted into cipher text using encryption process. This encrypted text along with the key orinformation would be send by the sender at receiver’s end. Then using the key or information, the receiver woulddecrypt the encrypted text. Using this base idea there exist different algorithm for encryption and decryption and forkey generation. This paper is on same concept of cryptography, where plain text would be encrypted using encryptionalgorithm. After that, the encrypted text along with information would be achieved. Next, the information would becombined with the sender’s fingerprint image, which would be called as key. After reaching the encrypted text alongwith key at receiver’s end, the receiver would try to collect information from key using the Database fingerprint imagesof sender (which are already given to the receiver by sender).With the help of fingerprint matching algorithm or keymatching algorithm, the receiver would try to match the sender’s fingerprint geometry with the key. If the two matches(i.e. if one of the Database fingerprint image matches with the key’s fingerprint geometry) then the information can bederived from key. Otherwise the information cannot be derived. At next step, after getting the information, the receiverwould decrypt the encrypted text using that information. | ||||
Here the whole cryptographic process is done on the binary conversion (i.e. the encryption process would be done onthe binary form of the plain text, so the reverse technique means decryption process also done on binary form. Also, forthe key construction, the information and the fingerprint geometry is also taken in binary format. Finally, thefingerprint geometry matching or key matching algorithm is also applicable only on binary format of fingerprintgeometry). For the application of binary conversion as a whole, this cryptographic technique is applicable on any typeof data transmission.That means, it is applicable on the text, image, multimedia data etc. which can be converted intobinary form. | ||||
In this cryptographic technique, for generation the key, the sender’s recent fingerprint geometry would be combinedwith the information.On the other hand, for deriving the information from key, the sender’s Database fingerprintgeometry would be used. Here sender’s database fingerprint geometry is nothing but the collection of sender’sfingerprint images already kept at receiver’s side. For information deduction from the key, any one fingerprintgeometry matching algorithm would be used [19] or [20] or [21]. | ||||
RELATED WORK |
||||
使用生物authentica的基本优势tion with cryptography are, any type of failure handling, falsereading handling speed limit accuracy and forgeries. For these reason there exists so many research work on biometricauthentication in combination with cryptographic technique. In [21], the biometric approach combined withcryptographic technique is provided, for high security over traditional cryptography avoiding any type of risks andmiddle attacks. Here biometric technologies like fingerprint geometry, eye scanning (iris and retina scanning), handgeometry, face recognition, voice recognition, signature, key stroke are used. Again esoteric biometrics like facialthermographs, DNA matching, palm vein pattern are also be applicable. Here biometric is used, because biometriccannot be stolen, lost or forgotten and be always available. Here, proper framework has not been used. In [22],fingerprint encryption technique is discussed for ATM banking system. Here, for authentication purpose users woulduse smart card as well as fingerprint geometry. In first layer, for authentication smart card would be used and in thesecond layer authentication process, the biometric fingerprint technique would be used | ||||
In [23], a provably secure and blind authentication protocol has been proposed based on asymmetric encryption ofbiometric data. These protocol is applicable on multiple biometrics because of no restrictive assumptions. This protocolis not affect able on the accuracy whenever encryption key acts as an additional layer security. Here, locking andunlocking method is used for performing authentication to provide strong encryption, non-repudiable authentication,and protection against replay, client side attack and recoverability. In [24], biometric characteristics has been used ascryptographic key to secure transfer. Here biometric hashes are used for authentication. In this type of biometriccryptography, biometric characteristic would be extracted and processed into biometric hashing, which would help thedecryption process by finding the key pair. Here, the key pair may be of public key or private key and the technique isapplicable in large domain. | ||||
PROPOSED WORK |
||||
The idea of combining biometric authentication with cryptography is not only for better security but also forimplementation and technical simplicity. Because this cryptography with biometric authentication is capable to handleany type of failure handling, enhance speed limit and false reading handling. So, here total cryptographic technique(Encryption process as well as decryption process) has been developed with the help of fingerprint geometry, thecurrent leader of biometric authentication. Here the total technique is discussed in some individual steps, at first atsender’s side and then at receiver’s side. Starting from sender’s side encryption process to receiver’s side decryptionprocess some steps are followed. Those are defined distinctly step wise and chronologically, first at sender’s side andthen at receiver’s side. | ||||
A. STEPS AT SENDER’S SIDE | ||||
At sender’s end, the binary format of the normal text would be taken as plain text. So, | ||||
Step 1: the plain text would be encrypted by encryption process, from which we will get the encrypted text and someInformation. | ||||
Step 2: the information would be combined with the sender’s recent fingerprint geometry for key generation. | ||||
Step 3: encrypted text along with key would be send by the sender. | ||||
Step 4: finally the information would be send by the sender to the receiver side. | ||||
The steps at Sender’s side is diagrammed in figure 1. Here, at first at sender side the binary form of plain text would beencrypted by encryption process. After that the sender would get the two parts, one is the encrypted text and another isthe information. Next, the information would be combined with the binary form of sender’s recent fingerprint geometry and the key would be formed. Finally the key along with encrypted text would be send by the sender at the receiver’send. | ||||
B. STEPS AT RECEIVER’S SIDE | ||||
At receiver’s end, | ||||
Step 1: encrypted text along with key would be accepted by the receiver | ||||
Step 2: the encrypted text and the key will be separated. | ||||
Step 3: with the help of sender’s database fingerprint geometry(which are kept by the receiver) and the fingerprintGeometry matching algorithm the information would be deducted from key. If, the two images does not match,information cannot be received. | ||||
Step 4: with the help of information the encrypted text would be decrypt into plain text or in the original binary formof the plain text or normal text. | ||||
The steps at Receiver’s side is diagrammed in figure 2. Here, at first the receiver would get the encrypted text alongwith key. The using database fingerprint geometry of the sender kept by the receiver and with fingerprint matchingalgorithm the information would be deducted from the key. Finally the information would help to convert the encryptedtext into decrypted text or plain text. Here also the whole process would be held on the binary conversion. | ||||
PERFORMANCE APPRAISAL |
||||
在整个场景中,发送者的指纹通用电气ometry (one is recent fingerprint geometry and the another areDatabase fingerprint geometries) is used for both encryption and decryption. No other fingerprint images can derive theinformation from key, which can help the decryption process. So it can be concluded, that the technique is symmetrickey cryptography and also called as private key cryptography | ||||
For its symmetric key nature, the total cryptographic technique is fast and efficient. But the classical symmetric keycryptography suffer from big disadvantage, because the use of same key and key exchange without letting anyone. Thiscryptographic technique would avoid that disadvantage, because here the key is formed by using fingerprint geometrycombined with information (in classical cryptography only information is used as key). On the other hand, for keyexchange, the information cannot be derived if the two fingerprints (one is recent fingerprint image and another isdatabase fingerprint image) does not match. So, it can be concluded that being a symmetric key cryptography, it isadvantageous like asymmetric key cryptography and secure enough. | ||||
CONCLUSION |
||||
In this cryptographic technique the biometric authentication concept is here incorporated with information for keyformation. Here it can easily said that this cryptographic technique is a symmetric key cryptography because only oneperson’s (here sender’s) fingerprint geometry is used for key formation, so this technique is fast and efficient and alsosame advantageous like classical asymmetric key cryptography. This cryptographic technique would avoid thedisadvantage of classical symmetric key cryptographic, because here the key is formed by using fingerprint geometrycombined with information (in classical cryptography only information is used as key). On the other hand, during keyexchange, the information cannot be derived if the two fingerprints (one recent another database fingerprint image)does not match, which concludes better security. The only disadvantage is the probability of stolen the sender’sdatabase fingerprint geometry. Our future work is to work on better security by maintaining the simplicity and toreduce the time complexity for whole technique using the base idea of cryptographic technique using biometricauthentication. | ||||
Figures at a glance |
||||
|
||||
References |
||||
|
||||
BIOGRAPHY | ||||
Sanjukta Pal is research Scholar at NIT Durgapur, she has completed M.Tech (CST) and MCA under the West Bengal University of Technology and B.Sc in Mathematics from The University of Burdwan. She has total 3 International. Her research interests are internet security and cloud computing. | ||||
Dr Pranam Paul is a Professor of Narula Institute Technology, Agarpara He had completed his Ph.D from Electronic and Communication Engineering department of National Institute of Technology, Durgapur in the field of Cryptography and Network Security. His research interest is internet security. His research interest is internet security. |