158378

A Biometric Cryptographic System based on Fingerprint signature

Article

Last updated: 04 Jan 2025

Subjects

-

Tags

-

Abstract

The main goal of this paper is to give new insights and directions on how to
improve existing methods of hiding secret messages, possibly by combining steganography
and cryptography. We start by a security background describing its history and a short
comparison between cryptography and steganography. We then illustrate our approach
that helps us achieve a higher level of secrecy and security. In such a way to make it harder
for any steganalyst to retrieve the plaintext of a secret message from a stego-object if
cryptanalysis were not used.
The principle motivation behind the presented paper is to set up a safe path by
incorporating the organic trademark as a key with cryptographic applications. A binary
string is produced dependably from authentic unique finger impression traditions. That key
is produced from a subject's fingerprint image with the guide of SDK, which don't uncover
the key. The multiplication of that key relies on upon the identical fingerprint image. That is
the reason the general key dispersion issue is dependably allude to the undertaking of
appropriating mystery keys between imparting gatherings to give security properties such
as secrecy and authentication.
A novel system is acquainted with exchange individual biometric fingerprint
(payload) as a symmetric key in mystery utilizing Secure Hash Algorithm 1 which is acting
as a cryptographic hash work - one approach to create 20-bytes hash esteem known as a
message process. At that point the Enhanced Hill Multimedia Cryptosystem (EHMC) is
utilized to transport that key safely to alternate gatherings. When they have the key the
much quicker symmetric encryption can used to trade the real information planned to be
exchanged. So that key administration assumes a major part in cryptography as the reason
for securing cryptographic techniques. In this paper, the issue of sharing this sort of keys is
tended to. Many experiments were done to guarantee the outcomes and it is demonstrated
that separating any data about the bio-key as well as from the encoded information is hard
for any meddlers with computational assets.

DOI

10.21608/asc.2018.158378

Keywords

Cryptography, Steganography, Public-key, Probabilistic Encryption, Chinese Remainder Theorem, Quadratic Residues, Multimedia, RSA and the Extended Euclidean Algorithm

Volume

9

Article Issue

1

Related Issue

23306

Issue Date

2018-05-01

Receive Date

2021-03-22

Publish Date

2018-05-01

Page Start

1

Page End

19

Print ISSN

1687-8515

Online ISSN

2682-3578

Link

https://asc.journals.ekb.eg/article_158378.html

Detail API

https://asc.journals.ekb.eg/service?article_code=158378

Order

1

Type

Original Article

Type Code

1,549

Publication Type

Journal

Publication Title

Journal of the ACS Advances in Computer Science

Publication Link

https://asc.journals.ekb.eg/

MainTitle

A Biometric Cryptographic System based on Fingerprint signature

Details

Type

Article

Created At

23 Jan 2023