Cryptography Technical seminar
Cryptography Technical seminar
BELAGAVI, KARNATAKA
Submitted by
Prateeksha A 4JN21CS117
2024-25
3
ABSTRACT
Fingerprints remain consistent and stable throughout a human’s lifetime. This research
exhibits the utilization of fingerprint bio-metrics to generate secured keys for improved
security. The main contribution is the generation of 87 keys, achieved by enhancing the
fingerprint image and sharpening it with a Laplacian filter. Three types of geometrical
shapes chosen arbitrary, such as circle, square, and triangle, are separately drawn on the
fingerprint after binarization, morphological operations, and thinning. Each shape is drawn
five times on the fingerprint with different radii for each type to increase the number of
keys. The end and bifurcation points are extracted as features inside and outside these
shapes and these features are considered as keys. Chaotic-Pseudo-Random Number
Generator (CPRNG) technique is used, and the generated keys are merged with those
generated from the positions of minutiae (end and bifurcation) points. The process was
implemented using MATLAB R2021b. The simulation results demonstrate that it is difficult
to crack the keys generated by this technique because the attacker requires a very long time,
almost 7.5595e+159 years, to decrypt the encrypted message. Using geometrical shapes and
CPRNG) technique increases the number of keys. The contribution of 87 keys is raising the
time needed to break the encrypted text to this time, which is greater than the time required
to crack the keys generated in some previous research compared to them. Therefore, the
proposed technique enhances privacy and security. It can be used via deep learning in
fingerprint identification, recognition, and key generation mechanisms and can use any
other geometrical shapes.
i
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompany the successful completion of any task would be
incomplete without the mention of the people who made it possible, whose constant guidance and
the encouragement crowned the effort with success.
I would like to express our gratitude and thanks to the Principal of INNCE Dr. Y. Vijay
Kumar, Principal, JNNCE, Shimoga for providing a good working environment and for his
constant support and encouragement.
I would also like to express our gratitude and thanks to Head of the Department
Dr. Jalesh Kumar , Department of Computer Science & Engineering for providing a good working
environment and for his constant support and encouragement.
I would like to thank our guide, Thaseen Bhashith, Associate Professor, Department of
Computer Science and Engineering, for his expert guidance, initiative, and encouragement that led
us through the presentation.
Also, I would like to thank our beloved Technical seminar Coordinators, Department of
Computer Science and Engineering. I am highly indebted to them for their guidance and constant
supervision as well as for providing necessary information regarding the technical seminar.
I am thankful to and fortunate enough to get constant encouragement, support and guidance
from all Teaching staffs of the Department of Computer Science and Engineering. Also, I would
like to extend our sincere regards to all the non-teaching staff of Department of Computer science
and Engineering for their timely support.
Prateeksha A (4JN21CS117)
ii
TABLE OF CONTENTS
REFERENCES
iii
LIST OF FIGURES
Figure 1.2 7
Applications of IoT-based Weather
Forecasting System
Figure 3.1 System Block Diagram of Transmitter 18
Figure 3.3 20
Process flow of a proposed weather
monitoring system
Figure 4.1 Data collected on Arduino IDE and LoRa 23
transmission and Reception of
Data Packets at the receiver end
iv
Cryptography based on Fingerprint Bio Metrics
CHAPTER 1
INTRODUCTION
The application of biometric technologies in securing digital systems has evolved
significantly over the years, with a strong focus on leveraging unique human
characteristics for authentication and encryption purposes. Fingerprint recognition remains
one of the most commonly used biometric modalities, owing to its widespread availability
and ease of use. Fingerprints are considered highly reliable and difficult to replicate,
making them ideal for generating cryptographic keys. Various research efforts have
explored how these fingerprint features, particularly minutiae points such as ridge endings
and bifurcations, can be extracted and transformed into secure keys. This process is vital
for enhancing the security of systems that require high levels of authentication, as it
ensures that only authorized users can access sensitive information.
As the demand for heightened security continues to grow, researchers have also
explored more advanced cryptographic methods to improve the robustness of biometric-
based systems. Techniques like the use of chaotic maps, fuzzy vault systems, and hybrid
encryption methods have gained attention for their ability to produce highly secure
encryption keys. For example, chaotic maps, which use non-linear mathematical functions,
can introduce an element of unpredictability into the key generation process, making it
difficult for attackers to predict or replicate the key sequence. Similarly, fuzzy vault
systems combine biometric features with cryptographic techniques to create a secure vault
for storing and transmitting sensitive data. These methods aim to safeguard biometric
templates, ensuring that they are not easily compromised or stolen during transmission.
Biometric systems, especially fingerprint recognition, are used for secure encryption
key generation and authentication.
Multi-biometric systems, combining multiple traits, offer enhanced security with
layered defense.
Advanced cryptographic methods like RSA, AES, fuzzy vaults, and chaotic maps
strengthen security.
Geometrical shapes incorporated into fingerprints increase key generation
complexity, making encryption harder to crack.
Addressing the ethical concerns of privacy is also crucial when implementing biometric
systems. It is essential to ensure that biometric data is collected securely, with explicit user
consent, and in full compliance with data protection laws to maintain individual privacy.
Additionally, biometric authentication integrated with the Internet of Things (IoT) provides
heightened security for a wide array of connected devices, enabling secure access to smart
technologies in homes, offices, and other environments. Looking to the future, continuous
advancements in AI, blockchain, and anti-spoofing technologies will play a pivotal role in
further improving the security and reliability of biometric systems, ensuring that they remain
resilient against emerging threats.
1.1 Cryptography :
The most common cryptographic techniques include symmetric encryption (where the
same key is used for both encryption and decryption) and asymmetric encryption (where a
pair of keys, public and private, are used). In the context of fingerprint biometrics,
cryptographic algorithms are used to generate encryption keys based on biometric data (like
fingerprints), transforming plaintext data into ciphertext. The key used for encryption is
often derived from a unique biometric feature, making it more secure than traditional
password-based systems.
In security systems, fingerprints are commonly used for access control, time tracking, and
mobile phone unlocking. Additionally, fingerprint biometrics is employed in encryption
systems to generate secure cryptographic keys. Since fingerprints are difficult to replicate or
forge, they offer a high level of security compared to traditional password or PIN-based
systems.
The goal of feature extraction is to minimize the amount of data needed for storage and
comparison, while still maintaining a high level of accuracy and uniqueness. These extracted
features are then used to generate cryptographic keys or to compare against stored
fingerprint templates during authentication.
End points, also known as ridge endings, are one of the key features used in
fingerprint analysis. They represent the point at which a ridge in the fingerprint pattern ends.
Ridge endings are highly distinctive and unique for each fingerprint, making them valuable
for identification or encryption.
In a fingerprint image, ridge endings can be identified through image processing techniques
like thinning or skeletonization, which reduce the fingerprint image to a simplified form,
making it easier to detect these features. Ridge endings, along with other minutiae points,
are used to generate cryptographic keys by analyzing their positions relative to each other.
These bifurcation points are often extracted during the feature extraction process, where
image processing techniques detect and record their locations within the fingerprint. The
relative positioning of ridge endings and bifurcations can be used to generate a secure
cryptographic key, ensuring that the key is difficult to replicate or forge. The combination of
ridge endings and bifurcation points provides a reliable and distinctive basis for encryption
key generation.
In cryptography, random numbers are essential for key generation, ensuring that the keys are
unpredictable and secure. CPRNGs are particularly valuable in biometric-based systems
because they add an extra layer of unpredictability to the key generation process. By using
chaotic functions, the CPRNG generates numbers that are difficult to predict or reverse-
engineer, even if an attacker has knowledge of the system’s behavior.
End points (ridge endings) and bifurcation points are critical in fingerprint analysis
because they are distinct and unique to each person. These points are extracted through
image processing techniques and are used to create robust encryption keys. In addition to the
fingerprint features, a Chaotic Pseudo-Random Number Generator (CPRNG) is employed to
introduce additional randomness into the key generation process. The CPRNG uses chaotic
systems to produce unpredictable and secure random numbers, which further strengthen the
generated encryption keys.
The overall system enhances data security by ensuring that the encryption keys are
not only unique but also highly resistant to attacks. The use of biometric features, such as
fingerprints, coupled with chaotic random number generation, ensures a high level of
security, making the encryption process nearly impossible to crack through conventional
methods. This method of using fingerprint biometrics for encryption addresses the need for
strong, user-friendly, and reliable security systems for protecting sensitive information.
Unlike passwords or tokens, biometric traits are unique to individuals and cannot be
easily lost or stolen. However, incorporating biometrics into cryptography introduces new
challenges, such as variability in biometric data due to environmental factors, user behavior,
and sensor limitations. Small changes in biometric input can lead to incorrect cryptographic
key generation, causing failures in encryption and decryption processes Furthermore, while
error correction techniques can mitigate biometric inconsistencies, they may also increase
false acceptance rates, posing security risks. Another major concern is the storage of
biometric templates, as compromised biometric data cannot be revoked like traditional
passwords. To overcome these challenges, the paper proposes a fingerprint-based
cryptographic key generation approach, where a cryptographic key is dynamically derived
from the user's fingerprint template. This eliminates the need for key storage, ensures non-
repudiation, and enhances security by binding the key directly to the user’s biometric data.
By leveraging biometric-based cryptographic key generation, the proposed system aims to
provide a more seconds.
CHAPTER 2
LITERATURE SURVEY
Author : Zainab Ibrahim Abood Al-Rafiee, Dr. Tarik Z, Dr. Samir Ibrahim Abood
Publication Publication Year : 2024
One of the major concerns discussed in the paper is the vulnerability of existing
biometric cryptosystems to adversarial attacks. The current focus of research in this field
tends to emphasize brute force complexity for preventing such attacks. However, simple
methods that use biometric authentication to release biometric keys are inadequate for many
cryptographic applications. These methods typically involve transmitting unencrypted
biometric data over insecure channels, which undermines the security of the system and
requires the generation of biometric keys to decrypt encrypted messages. This creates a
potential security gap.
The paper also points out that while various ideas for generating or binding biometric
keys have been proposed, many critical issues specific to the biometric domain remain
unresolved. For instance, despite efforts to enhance the complexity of intrusion prevention
mechanisms, these systems can still be compromised using relatively straightforward
methods. The discussion suggests that while biometric cryptosystems can be effective, they
are not foolproof and require further refinement to address these fundamental challenges.
Overall, the paper calls for continued research into biometric cryptosystems,
focusing on solving the specific problems related to biometric feature extraction, matching,
and secure transmission of biometric data to improve their robustness and applicability in
real-world cryptographic applications.
Advantanges :
Drawbacks :
1. Variability in Biometric Data: Unlike passwords, which remain static, biometric data
can change over time due to various factors. For example, fingerprints may be
affected by cuts, scars, or aging, while voice recognition can be influenced by illness
or background noise. These variations can lead to authentication errors, requiring the
use of error correction techniques.
2. Privacy Concerns: The collection, storage, and processing of biometric data raise
serious privacy concerns. If biometric information is leaked or misused, individuals
may suffer identity theft or surveillance without their consent. Regulations such as
the General Data Protection Regulation (GDPR) emphasize the need for strong
safeguards when handling biometric data.
Advantages :
1. Fast and Convenient – Authentication is quick and requires only a fingerprint scan,
improving user experience.
2. Stronger Access Control – Provides a high level of security for sensitive applications,
such as financial transactions and secure data storage.
3. Reduces Key Management Complexity – Users do not need to share or securely store
cryptographic keys, simplifying security protocols.
Drawbacks :
1. Privacy Concerns – Storing and processing biometric data raises risks of identity theft
and misuse if security measures are inadequate.
2. Vulnerability to Spoofing – Attackers may use fake fingerprints (e.g., 3D-printed
replicas or high-resolution images) to bypass authentication.
3. Computational Overhead – Generating cryptographic keys from fingerprint templates
requires complex processing, which may slow down authentication.
Advantages :
Drawbacks :
1. Legal and Ethical Issues – The use of biometric authentication may raise concerns
regarding user consent, data protection laws, and potential misuse in mass
surveillance.
2. Computational Overhead – Biometric cryptosystems require complex algorithms for
feature extraction and cryptographic key generation, which can lead to processing
delay system.
The Need for Enhancing Information System Security through the Integration of
Biometrics and Cryptography With the rapid advancements in information systems, ensuring
the safety, integrity, and confidentiality of information has become more challenging.
Despite the numerous benefits of technology, it has also introduced several security threats.
Authentication, authorization, and accounting are crucial aspects of information security that
require attention. Authentication, in particular, has been extensively studied, and biometric
authentication is a recent method that has shown significant potential to enhance system
security.
Advantages :
Drawbacks :
1. Privacy Concerns: Storing and processing biometric data raises privacy issues if not
handled securely. A compromised biometric cannot be replaced like a password.
The protocol is proven to be secure in the random oracle model, providing strong
guarantees against adversarial attacks from both parties in the system. It is designed to be
highly efficient, incurring just 880 ms of computational overhead and 99 KB of
communication cost, making it practical for real-world applications where performance and
scalability are critical. The security model is robust, ensuring that even if a malicious
adversary gains access to the client’s device or the server, they cannot easily compromise
the system or perform impersonation attacks.
party, which is a significant advantage over other systems that require external entities for
trust. Moreover, the protocol ensures that even if secret keys are compromised, they are
insufficient to carry out impersonation attacks, as the system still requires valid biometric
data for authentication.
Advantages :
1. Enhanced Security : The protocol is secure against both malicious clients and servers,
protecting sensitive biometric data from unauthorized access and ensuring privacy.
2. Efficiency : It offers minimal computational overhead (880 ms) and low
communication costs (99 KB), making it practical for real-time biometric verification
in resource-constrained environments.
3. No Trusted Third-Party: The protocol does not rely on a trusted third-party, reducing
potential security risks and simplifying the system design.
Drawbacks :
1. Computational Overhead : While efficient, the 880 ms overhead may not be suitable
for extremely low-latency applications, especially in high-volume environments.
2. Privacy Concerns with Face Recognition : Using facial recognition for authentication
may raise privacy concerns, as facial data is sensitive and vulnerable to misuse or
attacks like deepfakes.
3. Assumption of Secure Feature Extraction : The system relies on accurate biometric
feature extraction, which could be compromised if the extraction process is not
robust, affecting overall security.
CHAPTER 3
The primary objective of the proposed approach is to generate encryption keys that
are extremely difficult to crack, enhancing the overall security of sensitive data. The key
factor in this system is the use of a highly unique biometric feature, minimizing the chances
that two individuals will have identical characteristics. This uniqueness and stability make
biometric data particularly valuable for authentication and encryption. Fingerprints, in
particular, are widely recognized as a unique biometric trait and have been utilized for
identification purposes for over a century, making them a trusted and reliable source for
secure systems.
Figure 3.2(b) shows the decryption process, where the encrypted data is restored to
its original format. The same fingerprint features that were used to generate the encryption
key are utilized in this process. The fingerprint is analyzed again to extract the minutiae
points, and these are compared to the original biometric data. If the fingerprint data matches,
the system generates the correct decryption key, allowing the encrypted message to be
decrypted and accessed by the authorized user.
By using fingerprints as the basis for generating cryptographic keys, this system
ensures a higher level of security compared to traditional password-based methods, as the
fingerprint is unique to each individual and cannot easily be replicated. This approach
combines the uniqueness of biometric data with robust cryptographic techniques to create a
highly secure system for protecting sensitive information.
The pre-processing stage plays a crucial role in enhancing and improving the quality
of the fingerprint image, ensuring that key features are more clearly identifiable for
subsequent analysis. One of the main techniques used in this stage is image sharpening,
which focuses on enhancing the detected edges of the fingerprint. Image sharpening helps to
improve the clarity of the image by emphasizing the boundaries and details of the objects
within it. This process makes the features of the image, such as the ridges and minutiae
points in a fingerprint, more distinct, giving the image better depth and visual sharpness.
In this work, the original fingerprint image is captured using a ZKTeco U270 device
and has a resolution of size M×N in PNG format. The first step in pre-processing is
converting this original fingerprint image to grayscale, simplifying the color information to
focus on the intensity of light in the image. This step prepares the image for further
processing, where details can be enhanced more easily.
Next, the image is sharpened using a Laplacian filter in MATLAB R2021b. The
Laplacian filter is a well-known edge-detection technique that highlights areas where the
intensity of pixel values changes rapidly, which corresponds to the edges in the fingerprint
image. This sharpening technique further enhances the image by improving the definition of
ridge patterns and minutiae points, making it easier to perform subsequent feature
extraction.
Figure 2 illustrates the pre-processing steps, where panel (a) shows the original
fingerprint image, panel (b) displays the grayscale version, and panel (c) presents the
sharpened fingerprint image. This sequence of pre-processing steps improves the image
quality, ensuring that the features necessary for secure biometric identification are more
easily extracted and processed in the subsequent stages of the system.
Feature extraction plays a pivotal role in converting the raw fingerprint image into a
compact and useful representation for further processing, particularly for biometric
authentication and encryption key generation. The goal of feature extraction is to identify
and quantify important characteristics in the fingerprint, which can be used to uniquely
identify an individual. This process involves counting and analyzing feature vectors that
highlight the most distinctive parts of the fingerprint pattern (Abood, 2017; Shini et al.,
2016).
A fingerprint consists of an impression of ridges and valleys on the finger, and the
most critical features used in fingerprint identification are the minutiae. Minutiae points
refer to the specific features that make up the fingerprint’s pattern. The two main types of
minutiae are ridge endings and bifurcations. Ridge endings are points where a ridge in the
fingerprint pattern abruptly ends, while bifurcations are points where a ridge splits into two
branches. These minutiae points are critical for creating a unique representation of the
fingerprint and are used to form a fingerprint template that is then processed for key
generation.
Figure 3.4(a) shows ridge endings, which are key features in fingerprint analysis.
Figure 3.4(b) shows ridge bifurcations, where a single ridge splits into two branches,
another essential minutia used for identification.
In the process of fingerprint feature extraction, the center coordinates (xc, yc) of the
fingerprint image are calculated. These coordinates represent the intersection point of the
diagonals of the image. Specifically, the coordinates are determined as:
where (xc, yc) considered as the fingerprint diagonals intersection point in eq. (1).
Where MMM and NNN are the dimensions of the fingerprint image (with MMM
representing the number of rows and NNN representing the number of columns in the
image). The center coordinates, (xc,yc)(xc, yc)(xc,yc), act as the reference point for the
fingerprint image, which is essential for aligning and extracting the minutiae in a
consistent and accurate manner.
After the minutiae points (ridge endings and bifurcations) are identified, they are
used to create a fingerprint template, which can then be utilized in the key generation
process. This template serves as the foundation for generating cryptographic keys, which are
unique to each individual. By leveraging these unique features, the system can create a
secure and personalized encryption key that is difficult to replicate or forge.
a) Image Binarization
Image binarization is an essential step in the process of fingerprint image processing,
as it converts the grayscale image into a binary format, which simplifies the analysis and
extraction of important features. In the case of fingerprints, binarization helps to
differentiate between the ridges (which represent the fingerprint pattern) and the valleys
(the spaces between the ridges). By transforming the image into a binary format, where
pixels are either black or white, it becomes easier to detect minutiae points, such as ridge
endings and bifurcations, which are crucial for fingerprint recognition.
Unlike other image processing techniques, there is no universal threshold value that
applies to the entire image. Instead, the threshold value for each pixel is calculated based
on its location within the image. This means that each pixel’s threshold is determined
individually, taking into account the surrounding pixels and their intensity values. This
local thresholding ensures more accurate binarization, especially for fingerprint images,
where ridge patterns may have varying levels of contrast in different regions of the image.
The threshold value is calculated by finding the mean value of the intensity of a
block of neighboring pixels. This block of pixels forms a district or local region within the
image. The mean intensity of this block is used as the threshold for the central pixel in that
block. If the pixel’s grayscale intensity is less than this threshold value, it is converted to
black. If the pixel’s grayscale intensity is greater than the threshold, it is set to white.
This process effectively highlights the fingerprint ridges in white and the valleys in black,
creating a binary image that can be easily processed for further feature extraction and
analysis.
image. This ensures that the binarization process is more accurate and reliable across the
entire image, enhancing the precision of subsequent steps, such as feature extraction and
minutiae detection. By converting the fingerprint image into a binary form, the system can
more effectively detect and analyze the important features that are crucial for secure
biometric identification.
Fig.No 3.1 : Image Binarization (a) Original Image (b) After Binarization
b) Morphological Operations
Erosion and dilation are crucial operations in image processing that modify the shape
and structure of objects in a binary image. Erosion works by shrinking the white regions in
the image, removing pixels from the boundaries of the foreground objects. This helps
eliminate small artifacts or noise around the fingerprint ridges, making the ridges more
distinct and isolated from unnecessary background elements. Dilation, in contrast, expands
the white regions by adding pixels to the boundaries of the foreground objects. This
operation can help connect broken or fragmented ridge lines in the fingerprint, filling in
small gaps and making the ridges more continuous.
In the context of fingerprint processing, erosion and dilation are used together to
enhance the quality of the fingerprint image. Erosion is used to remove small noise and
isolate the true fingerprint ridges, while dilation is used to enhance the continuity of the
ridges by connecting broken segments and closing small gaps. This combination improves
the overall clarity and structure of the fingerprint, which is essential for accurately
detecting minutiae points (ridge endings and bifurcations) and improving the precision of
biometric identification or key generation processes.
These morphological operations make the fingerprint image more suitable for feature
extraction, ensuring that the important characteristics of the fingerprint are clearly defined
and free from unnecessary distractions.
c) Thinning
The thinning process is a morphological operation used to reduce the width of the
objects in a binary image to a single pixel, effectively creating a skeletonized version of
the image. This technique is particularly useful for fingerprint image processing, where the
goal is to simplify the ridges of the fingerprint into a minimal representation, making it
easier to detect and analyze important features such as minutiae points. By thinning the
image, the ridges are transformed into a skeleton, which is often essential for accurate
fingerprint feature extraction and identification.
In the context of key generation for biometric encryption, this research employs three
distinct shapes circle, square, and triangle to generate cryptographic keys based on the
fingerprint image. The process involves utilizing these geometrical shapes as templates or
patterns that are overlaid on the skeletonized fingerprint image, and these patterns help
form unique keys.
Figure 4 illustrates the key generation process, with Figure 3.5(a) showing the
generation of a key using a circle, Figure 3.5(b) demonstrating the generation using a
square, and Figure 3.5(c) showing the key generated from a triangle. Each of these
shapes plays a role in encoding the fingerprint's minutiae features and contributes to
creating a unique cryptographic key. By using these geometrical shapes as part of the key
generation, the system ensures that the resulting keys are highly unique and difficult to
replicate, enhancing the security of the encryption process.
Fig.No 3.3 : Pre-Processing (a) Original Image (b) Gray Image (c) Sharpened Image
d) Circle (c)
A circle of specified center coordinates (xc, yc) with a radius r = 60 is drawn, as
shown in Figure 3.5(a). The ends and bifurcations of the fingerprint inside the circle are
extracted separately, and their points are recorded. These ends and bifurcations are
considered as keys of circle1 (c1), but for the taken fingerprint, there are no bifurcation
points inside c1, so there is no bifurcation key. With the exact center coordinates, but with
r = 110, circle2 (c2) is drawn. The ends and bifurcations inside c2 but at the same time
outside c1 are extracted separately as (c2-c1) keys. With the exact center coordinates, but
with r = 160, circle3 (c3) is drawn. The ends and bifurcations inside c3 but at the same
time outside c2 are extracted separately as (c3-c2) keys. And so on for r = 210 and 250, the
ends and bifurcations are extracted separately as (c4-c3) and (c5-c4) keys. The other keys,
either for ends or bifurcations, are found as follows:
c1 = c1
c2 = (c2-c1) + c1
c3-c1= (c3-c2) + (c2-c1)
c3 = c2 + (c3-c2)
c4-c2 = (c3-c2) + (c4-c3)
c4-c1= (c4-c2) + (c2-c1)
c4 = c3 + (c4-c3)
c5-c3 = (c4-c3) + (c5-c4)
c5-c2 = (c3-c2) + (c5-c3)
c5-c1 = (c5-c2) + (c2-c1)
c5 = c4 + (c5-c4)
e) Square
A square of specified center coordinates (xc, yc) with radius rs = 60 is drawn from
the center point to the top-left corner, top-right corner, bottom-right corner, and bottom-left
corner, as shown in Figure 3.5(b):
The ends and bifurcations of the fingerprint inside the square are extracted
separately, and their points are recorded. These ends and bifurcations are considered as
keys of square1 (s1), but for the taken fingerprint, there are no bifurcation points inside s1,
so there is no bifurcation key. With the exact center coordinates, but with rs = 110, square2
(s2) is drawn. The ends and bifurcations inside s2 but at the same time outside s1 are
extracted separately as (s2-s1) keys and so on for rs=160, 210, and 250. The other keys,
either for ends or bifurcations, are found as in the circle. In Figure 1, the keys: k30, k31,
…, k58 refer to s1, s2-s1, …, s5 for square end and bifurcation points.
f) Triangle (t)
A triangle of specified center coordinates (xc, yc) with rt = 80 is drawn from the
center point to the topleft corner, top-right corner, and bottom corner, as shown in Figure
3.5(c):
The ends and bifurcations of the fingerprint inside the triangle are extracted
separately, and their points are recorded. In eq. (3) shows these ends and bifurcations are
considered as keys of triangle1 (t1), but for the taken fingerprint, there are no bifurcation
points inside t1, so there is no bifurcation key. With the exact center coordinates, but with
rt = 110, triangle2 (t2) is drawn. The bifurcations and ends inside t2 but at the same time
outside t1 are extracted separately as (t2-t1) keys. And so on for rt = 160, 250, 330, and
430. The other keys, either for ends or bifurcations, are found as in the circle. Note that rt
values in the triangle have different values from those in the circle and square to cover the
maximum area of the fingerprint and ensure an appropriate distance between the triangles.
In this case, one can ensure that the ends and bifurcations are present at these distances. In
Figure 1, the keys: k59, k60, …, k87 refer to t1, t2-t1, …, t5 for triangle end and
bifurcation points. Table 1 shows the key number (key no.) and key name for circle,
square, and triangle end and bifurcation points. k1, k2, …, k15 and k16, k17, …, k29 refer
to end and bifurcation keys for circle. k30, k31, …, k44 and k45, k46, …, k58 refer to end
and bifurcation keys for square. k59, k60, …, k73 and k74, k75, …, k87 refer to end and
bifurcation keys for triangle.
Fig.No 3.5 : Methods of Key Generation (a) Circle (b) Square (c) Triangle
In biometric systems, geometric shapes such as circle, triangle, and square are used
in the key generation process to enhance the security and uniqueness of cryptographic keys
derived from fingerprint minutiae. The circle helps in mapping key fingerprint features,
ensuring the generated key is personalized and difficult to replicate. The triangle
introduces additional complexity, making the key even more unique. The square provides a
structured approach, organizing the minutiae into clear patterns that strengthen the key.
These shapes ensure that each fingerprint produces a distinct cryptographic key, making it
harder for unauthorized access or key replication, ultimately enhancing the security of the
biometric authentication system.
Table 1: Key no. and Key Name for Circle, Square and Triangle End and Bifurcation Points
Figure 3.6 shows feature extraction and key generation, where Figure 2.6(a-c) shows the
ends in a red color and bifurcations in a blue color for circle, square and triangle,
respectively.
Figure 3.6 : Feature Extraction and Key Generation a) Circle b) Square c) Triangle
Chaotic System
A Chaotic system is vastly used with cryptography, while the researchers developed
chaos maps several years ago. A pseudo-random bit generator is generated based on a
chaotic system and used for stream-cipher cryptography (Jerjees et al., 2020). For more
security and to produce a vital encryption key, a Chaotic-Pseudo-Random-Number
Generator technique will be used. The keys generated by CPRNG are merged with those
generated from minutiae (end and bifurcation) points' positions. The authors (Jerjees et
al., 2020) used two Logistic maps but in this research three Logistic maps with different
system parameters and initial conditions are used to achieve better randomness bits
sequence:
where I1, I2 and I3 are iteration factors. X1(n), X2(n), and X3(n) are the initial values in
eq. (4). Pseudo-random bit b(n) is generated from the logistic map after (n) iterations and
obtained by comparing the mean value of the outputs of three logistic maps with the
output of every map as in equation 5.
text substance or disguising it; is called encryption. The cipher-text is the unreadable
gibberish results from the encryption process. The process of decoding the cipher-text to
its original plain-text using a secure key is called decryption (Sarkar & Noel, 2020;
George et al., 2020; Krishna & Kareem, 2021; Ibraheem et al., 2018). Encryption-based
biometrics became more suitable to meet cryptographic demands by applying fingerprint
images to generate the crypto-biometric key (Jerjees & Ismaeel, 2018). Cryptography is
symmetric or asymmetric; in symmetric, the same key is used in encryption and
decryption algorithms. In asymmetric, two unlike keys are used: the public key to
encrypt the plain-text and the private key to decrypt the cipher-text into plain-text
(Barman et al., 2015; Rabee & Abdullah, 2020). The same plain-text encrypts to
different cipher-text using different keys. The security of the encrypted data is dependent
on the key secrecy and the algorithms’ strength (Sarkar & Noel, 2020; Tyagi & Dixit,
2018; Al-Lehiebe, 2015). Encryption and decryption algorithms are expressed in
equations (6) and (7):
where i and j are the plaintext and ciphertext letters’ numbers, n is a shift key point,
and m is a modulus in eq. (6) – (7).
The end and bifurcation coordinate points (x, y) values are sufficient to give
randomness in data, so in this work, they have been considered as minutiae points of the
fingerprint images for both sender and receiver. Table 2 shows a lookup table with 26
capital letters, space, and point designed with modulus m=28. Each letter (Let.) has a
corresponding mapped number (No.) while (.) and (space) have the numbers 27 and 28,
respectively.
CHAPTER 4
RESULT AND DISCUSSION
The key and algorithm control the operation on the plain-text and cipher-text (Tyagi
& Dixit, 2018). Keys are crucial as ciphers without changing keys are simply breakable;
therefore, fingerprint features are used in this paper as security keys. Table 3 shows the
encryption and decryption process using the end key c1 with r = 60 and a plain-text (THANK
YOU). The letter T has the end point (202, 216), when it is mapped onto the lockup table, it
has a number of 20. In the encryption process using cipher shift right with mod28, the
resulting number Noen. = 18 (where Noen. = (No. + (X+ Y)) mod28), which has a mapped
letter R on the lockup table. When this ciphered letter R is decrypted using cipher shift left
with an encrypted number Noen = 18 and mod28, the resulting number is the decrypted
number (Nodec.) which is equal to 20 (where Nodec. = (Noen. - (X+ Y)) mod28), which has
a mapped letter T on the lookup table and so on for other letters in the plain-text. The plain-
text is encrypted then the cipher-text is decrypted to retrieve the plain-text. Some end points
such as (202, 216), (200, 237), and (182, 263) in the table are repeated because the plain-text
has nine letters and the end points inside c1 are only six; so only these three points are
repeated. There are no bifurcation points inside c1. Table 4 shows the processes of encryption
and decryption using the ending points’ key of c2 with r=110. Despite the same plain-text
and No., the cipher-text differs in Tables 3 and 4 because the points differ.
Tables 5 and 6 show the encryption and decryption process using end and bifurcation points
of various c keys with a plain-text (SHE IS VERY HAPPY.). The abbreviation (En.) refers to
the cipher-text when the plain-text is encrypted using the related keys c1 or c2-c1 ..., etc. or
in other terms k1 or k2 ..., etc., and (Dec. text) refers to the plain-text when the cipher-text is
decrypted using any of these keys. c1 has no bifurcations, which means no bifurcation point
inside c1. In Table 5, using equations (6) and (7), the plain-text is encrypted by the key k1 to
the encrypted text (QFBEWHZKJWKQFRMUKY). While by using key k2, the encrypted
text will be (GI ZUVMJF MWLKNDQTY). For each key in Table 5, the encrypted text is
not the same as for the other keys. In Tables 6, using bifurcation points, the encrypted text is
not the same as for the other keys but it is the same only when the plain-text is encrypted by
the keys k16 and k17 because k16 is c2-c1 while k17 is c2 as mentioned in Table 1 and c1
has no bifurcations which leads to c2-c1=c2.
Tables 7 and 8 show the encryption and decryption process using end points of
various s and t keys, respectively. In these tables and Table 5, all the letters in the plain-text
have different representations in the encrypted text, even if the letters are repeated in the
message. s1 and t1 have no bifurcations, that means no bifurcation points inside s1 and t1.
Using equation (4) with I1=3.7, I2=3.9, and I3=4 and initial values, X1(0) =0.61,
X2(0) =0.5, and X3(0) =0.6 to achieve better randomness bits sequence. To generate the
binary key used for encryption, CPRNG technique generated keys merged with those
generated from minutiae (end and bifurcation) points' positions. So, binary bits of minutiae
positions are XORed with the binary bits generated from CPRNG. Then, this key is
XORed with the binary bits of the plain-text to produce the cipher-text, which is converted
to ASCII symbols. In the decryption process, the recipient gets the key in random text,
which contains the encrypted text too. This key is a guide used in the encryption process.
Tables 9 and 10 show the encryption and decryption of the proposed system.
Biometric systems, especially fingerprint-based ones, face various attacks like brute-
force and timing attacks. By utilizing 112 features, 87 keys, and three chaos logistic maps,
the proposed technique significantly increases the BFA (Brute-Force Attack) time to
7.5595e+159 years, offering stronger protection against attackers compared to methods
using fewer features, keys, or chaos maps.
4.1 Conclusion
REFERENCE
[1] Abdulrazak, S., & Sabir, F. (2023). An empirical investigation on Snort NIDS versus
supervised machine learning classifiers. Journal of Engineering, 29(02), 164-178.
https://doi.org/10.31026/j.eng.2023.02.11
[2] Abood, Z. I. (2017). Composite techniques-based color image compression. Journal
of Engineering, 23(3), 80-93.
[3] Agrawal, R., Singh, B. K., & Sharma, L. (2021). Cryptography based internet
security ATM system using fingerprint for securing PIN. Journal of University of
Shanghai for Science and Technology, 23(10), 369-380.
http://doi.org/10.51201/JUSST/21/10717
[4] Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-
biometric system for network security. EURASIP Journal on Information Security,
2015, 1-17. https://doi.org/10.1186/s13635-015-0020-1
[5] Herrera, J. A. Q., Limo, F. A. F., Tasayco-Jala, A. A., Vargas, I. M., Farias, W. B.,
Inga, Z. M. C., & Palacios, E. L. H. (2023). Security Issues in Internet Architecture
and Protocols Based on Behavioral Biometric Block ChainEnhanced Authentication
Layer. Journal of Internet Services and Information Security, 13(3), 122-142.
https://doi.org/10.58346/JISIS.2023.I3.008
[6] Jassim, M. F., Hamzah, W. M. S., & Shimla, A. F. (2022). Biometric iris templates
security based on secret image sharing and chaotic maps. International Journal of
Electrical and Computer Engineering (IJECE), 12(1), 339-348.
http://doi.org/10.11591/ijece.v12i1.pp339-348.
[7] Verjees, S. A., Estefan, B. A., & Ismaeel, T. Z. (2020). Hybrid ciphering method
based on chaos logistic map and fingerprint information. Journal of Engineering
Science and Technology, 15(5), 3013-3024.
[8] Tyagi, H., & Dixit, S. (2018). Development of biometric cryptosystem using finger -
print authentication. International Journal of Electronics Engineering, 10(1), 350-358,
http://www.cssjjourrnallss.com