0% found this document useful (0 votes)
89 views6 pages

High Secure

The document proposes a fingerprint authentication system using ring-LWE cryptography to securely protect fingerprint data. It introduces a novel approach using number theoretic transform to speed up ring-LWE encryption and decryption times. The system extracts fingerprint features and applies ring-LWE encryption to the features, authenticating a user in less than 160ms. Simulation results show the proposed system outperforms existing methods in encryption time, decryption time, and security of encrypted fingerprint data.

Uploaded by

Crisp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views6 pages

High Secure

The document proposes a fingerprint authentication system using ring-LWE cryptography to securely protect fingerprint data. It introduces a novel approach using number theoretic transform to speed up ring-LWE encryption and decryption times. The system extracts fingerprint features and applies ring-LWE encryption to the features, authenticating a user in less than 160ms. Simulation results show the proposed system outperforms existing methods in encryption time, decryption time, and security of encrypted fingerprint data.

Uploaded by

Crisp
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

HIGH-SECURE FINGERPRINT AUTHENTICATION SYSTEM

USING RING-LWE CRYPTOGRAPHY

ABSTRACT

This paper presents a high-secure fingerprint authentication system using ring learning
with errors (ring-LWE) cryptography to protect users' fingerprint data more securely. A delay-
optimized high-accuracy scheme for a fingerprint-features extraction approach is proposed to
collect necessary features information from fingerprint images. In addition, a ring-LWE
cryptography scheme using low-latency number theoretic transform (NTT) polynomial
multiplications is deployed to speed up the ring-LWE encryption and decryption times. As a
result, the processing time of the fingerprint authentication system is significantly reduced, and
the fingerprint data are effectively protected. The simulation results show that the proposed NTT
multiplication-based ring-LWE cryptography scheme for fingerprint features outperforms the
existing works up to 46% and 44% in terms of encryption time and decryption time, respectively.
The latency of the whole fingerprint authentication system is less than 160 ms, which makes it
suitable for practical applications. Furthermore, performance analysis on entropy and similarity
of the encrypted fingerprint features proves the domination of the proposed system compared
with the previous systems in terms of confidentiality.

EXISTING SYSTEM

Users' fingerprints are initially collected by local sensing devices before being sent to a
remote server database. The information sent from local stations to the remote server can be full
fingerprint images or limited to fingerprint features. Generally, individual identification
information (like fingerprint images or fingerprint features) sent over a network without any
security solution is accessible to attackers and thus at risk. In existing methods to combine
various fingerprints into a new identity before sending data to the server. The minutiae positions
from one fingerprint, the orientation from another fingerprint, and the reference points from both
fingerprints are extracted. However, there are concomitant risks associated with this method of
storing and transmitting fingerprint data. If attackers distinguish a combined minutiae template
from the original minutiae templates, they can recover the original fingerprint.
Disadvantages:

 Although fingerprint recognition system has various its advantages, this system has some
drawbacks.
 This biometric system has some complexity in obtaining high quality images of images
of finger patterns. Due to the issues of dirty, cuts, tear and wear that can easily affect the
ridges.
 One of the disadvantages of Fingerprint recognition is the simple distinguished features
of the finger that cannot provide a strong establishment of an individual’s identity
without cryptography.
 Anyone can easily attack the database and retrieve the information.
 There is no cryptography applied in existing system.

PROPOSED SYSTEM

Biometrics deals with automated method of identifying a person or verifying the identity
of a person based on the physiological or behavioural characteristic, and so is used for
authentication in many of the online transactions. The biometric that has been chosen for
implementation is fingerprint, since fingerprint biometric is easily available and highly reliable
compared to many other biometrics. In the existing biometric authentication system the
fingerprint template of a person is stored as such in the authentication server and is prone to
security attacks at the server side. To overcome this kind of server side attack, in the proposed
system the fingerprint template is encrypted image using bitxor cryptographic technique
followed by compression. This kind of approach solves two major problems related to fingerprint
based automatic access control systems such as falsification and costly maintenance of the large
fingerprint database.

Therefore, integrating a highly secure solution into the fingerprint authentication system
to protect personal information during authentication, storage, and transmission is a necessity.
Cryptosystems, in which only authorized users with a right key can access the hidden
information, offer a potential solution that can be integrated into biometric authentication
systems to provide a higher level of security. a fingerprint authentication system using ring-LWE
cryptography, the post-quantum cryptosystem, is introduced. To the best of our knowledge, this
is the first work designing a fingerprint authentication system using the ring-LWE cryptography
scheme. By applying novel fingerprint-feature extraction and NTT polynomial multiplication in
the proposed ring-LWEcryptography-based fingerprint authentication system, the total
processing time of the proposed system is much faster than other systems. Additionally, the
encrypted data generated by the proposed system is more secure than the obtained results from
existing schemes.
ADVANTAGES

1) We present a novel NTT polynomial multiplication scheme by removing bit-reverse


operations in conventional NTT multiplication to speed up the polynomial multiplication time
over ring operation;
2) We propose an optimal scheme for fingerprint-features extraction to reduce processing time
and increase accuracy;
3) We propose and implement the ring-LWE cryptography system using the proposed NTT
polynomial multiplication approach to enhance the encryption and decryption time;
4) We develop a fingerprint authentication system using our fingerprint-features extraction
method and the proposed NTT multiplication-based ring-LWE cryptography scheme. The
advantages of the proposed system in terms of processing time and security level can be proved
by simulation results.

By using the novel NTT multiplication and feature extraction approach, the processing
time of the proposed system is improved remarkably. Simulation results show that the proposed
system achieves low processing times, and can be used in real-time authentication systems. In
addition, with the high level of security offered by ring-LWE cryptography, users' personal
fingerprints are completely protected. Therefore, the proposed fingerprint authentication system
can be applied in systems that require a high-security level, such as biometric authentication,
medical image transmission, and IoT security.

METHODOLOGY OR ALGORITHM
Ring-LWE cryptography scheme

Number theoretic transform (NTT) polynomial multiplications scheme

MODIFIED ALGORITHM

BIT XOR

Software used:

MATLAB SIMULATION
Block diagram:
Read Fingerprint Image

Generate Key using Size of


Encrypt the finger image using Image
bitXor based on Key

Encrypted Fingerprint Images

Encrypted Fingerprint
Database

Read Encrypted Fingerprint


Image

Decrypt the finger image using


bitXor based on Key

Preprocessing Template database

Feature Extraction Classification(ecludian


(Bifiraction,minuatia,ridges,thic Minimum Distance Classifier)
kness,thining)

Matching /MisMatching

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy