High Secure
High Secure
ABSTRACT
This paper presents a high-secure fingerprint authentication system using ring learning
with errors (ring-LWE) cryptography to protect users' fingerprint data more securely. A delay-
optimized high-accuracy scheme for a fingerprint-features extraction approach is proposed to
collect necessary features information from fingerprint images. In addition, a ring-LWE
cryptography scheme using low-latency number theoretic transform (NTT) polynomial
multiplications is deployed to speed up the ring-LWE encryption and decryption times. As a
result, the processing time of the fingerprint authentication system is significantly reduced, and
the fingerprint data are effectively protected. The simulation results show that the proposed NTT
multiplication-based ring-LWE cryptography scheme for fingerprint features outperforms the
existing works up to 46% and 44% in terms of encryption time and decryption time, respectively.
The latency of the whole fingerprint authentication system is less than 160 ms, which makes it
suitable for practical applications. Furthermore, performance analysis on entropy and similarity
of the encrypted fingerprint features proves the domination of the proposed system compared
with the previous systems in terms of confidentiality.
EXISTING SYSTEM
Users' fingerprints are initially collected by local sensing devices before being sent to a
remote server database. The information sent from local stations to the remote server can be full
fingerprint images or limited to fingerprint features. Generally, individual identification
information (like fingerprint images or fingerprint features) sent over a network without any
security solution is accessible to attackers and thus at risk. In existing methods to combine
various fingerprints into a new identity before sending data to the server. The minutiae positions
from one fingerprint, the orientation from another fingerprint, and the reference points from both
fingerprints are extracted. However, there are concomitant risks associated with this method of
storing and transmitting fingerprint data. If attackers distinguish a combined minutiae template
from the original minutiae templates, they can recover the original fingerprint.
Disadvantages:
Although fingerprint recognition system has various its advantages, this system has some
drawbacks.
This biometric system has some complexity in obtaining high quality images of images
of finger patterns. Due to the issues of dirty, cuts, tear and wear that can easily affect the
ridges.
One of the disadvantages of Fingerprint recognition is the simple distinguished features
of the finger that cannot provide a strong establishment of an individual’s identity
without cryptography.
Anyone can easily attack the database and retrieve the information.
There is no cryptography applied in existing system.
PROPOSED SYSTEM
Biometrics deals with automated method of identifying a person or verifying the identity
of a person based on the physiological or behavioural characteristic, and so is used for
authentication in many of the online transactions. The biometric that has been chosen for
implementation is fingerprint, since fingerprint biometric is easily available and highly reliable
compared to many other biometrics. In the existing biometric authentication system the
fingerprint template of a person is stored as such in the authentication server and is prone to
security attacks at the server side. To overcome this kind of server side attack, in the proposed
system the fingerprint template is encrypted image using bitxor cryptographic technique
followed by compression. This kind of approach solves two major problems related to fingerprint
based automatic access control systems such as falsification and costly maintenance of the large
fingerprint database.
Therefore, integrating a highly secure solution into the fingerprint authentication system
to protect personal information during authentication, storage, and transmission is a necessity.
Cryptosystems, in which only authorized users with a right key can access the hidden
information, offer a potential solution that can be integrated into biometric authentication
systems to provide a higher level of security. a fingerprint authentication system using ring-LWE
cryptography, the post-quantum cryptosystem, is introduced. To the best of our knowledge, this
is the first work designing a fingerprint authentication system using the ring-LWE cryptography
scheme. By applying novel fingerprint-feature extraction and NTT polynomial multiplication in
the proposed ring-LWEcryptography-based fingerprint authentication system, the total
processing time of the proposed system is much faster than other systems. Additionally, the
encrypted data generated by the proposed system is more secure than the obtained results from
existing schemes.
ADVANTAGES
By using the novel NTT multiplication and feature extraction approach, the processing
time of the proposed system is improved remarkably. Simulation results show that the proposed
system achieves low processing times, and can be used in real-time authentication systems. In
addition, with the high level of security offered by ring-LWE cryptography, users' personal
fingerprints are completely protected. Therefore, the proposed fingerprint authentication system
can be applied in systems that require a high-security level, such as biometric authentication,
medical image transmission, and IoT security.
METHODOLOGY OR ALGORITHM
Ring-LWE cryptography scheme
MODIFIED ALGORITHM
BIT XOR
Software used:
MATLAB SIMULATION
Block diagram:
Read Fingerprint Image
Encrypted Fingerprint
Database
Matching /MisMatching