0% found this document useful (0 votes)
26 views

Cryptography Technical seminar

This technical seminar report discusses the use of fingerprint biometrics for generating secure cryptographic keys, achieving a total of 87 keys through image enhancement and feature extraction techniques. The proposed method incorporates geometrical shapes and a Chaotic-Pseudo-Random Number Generator (CPRNG) to enhance key security, making it extremely difficult to crack the generated keys. The research highlights the potential for improved privacy and security in digital systems through advanced biometric and cryptographic methods.

Uploaded by

D. Jeevitha. Cse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Cryptography Technical seminar

This technical seminar report discusses the use of fingerprint biometrics for generating secure cryptographic keys, achieving a total of 87 keys through image enhancement and feature extraction techniques. The proposed method incorporates geometrical shapes and a Chaotic-Pseudo-Random Number Generator (CPRNG) to enhance key security, making it extremely difficult to crack the generated keys. The research highlights the potential for improved privacy and security in digital systems through advanced biometric and cryptographic methods.

Uploaded by

D. Jeevitha. Cse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

Visvesvaraya Technological University

BELAGAVI, KARNATAKA

ATechnical Seminar Report on

“ Cryptography based on Fingerprint Bio metric ”

Submitted by

Prateeksha A 4JN21CS117

Under the guidance of

Thaseen Bhashith B.E.,M.Tech


.
Associate Professor
Department of CS&E
JNNCE, Shivamogga

Department of Computer Science & Engineering


J N N College of Engineering
Shivamogga - 577 201

2024-25
3
ABSTRACT

Fingerprints remain consistent and stable throughout a human’s lifetime. This research
exhibits the utilization of fingerprint bio-metrics to generate secured keys for improved
security. The main contribution is the generation of 87 keys, achieved by enhancing the
fingerprint image and sharpening it with a Laplacian filter. Three types of geometrical
shapes chosen arbitrary, such as circle, square, and triangle, are separately drawn on the
fingerprint after binarization, morphological operations, and thinning. Each shape is drawn
five times on the fingerprint with different radii for each type to increase the number of
keys. The end and bifurcation points are extracted as features inside and outside these
shapes and these features are considered as keys. Chaotic-Pseudo-Random Number
Generator (CPRNG) technique is used, and the generated keys are merged with those
generated from the positions of minutiae (end and bifurcation) points. The process was
implemented using MATLAB R2021b. The simulation results demonstrate that it is difficult
to crack the keys generated by this technique because the attacker requires a very long time,
almost 7.5595e+159 years, to decrypt the encrypted message. Using geometrical shapes and
CPRNG) technique increases the number of keys. The contribution of 87 keys is raising the
time needed to break the encrypted text to this time, which is greater than the time required
to crack the keys generated in some previous research compared to them. Therefore, the
proposed technique enhances privacy and security. It can be used via deep learning in
fingerprint identification, recognition, and key generation mechanisms and can use any
other geometrical shapes.
i

ACKNOWLEDGEMENT

The satisfaction and euphoria that accompany the successful completion of any task would be
incomplete without the mention of the people who made it possible, whose constant guidance and
the encouragement crowned the effort with success.
I would like to express our gratitude and thanks to the Principal of INNCE Dr. Y. Vijay
Kumar, Principal, JNNCE, Shimoga for providing a good working environment and for his
constant support and encouragement.
I would also like to express our gratitude and thanks to Head of the Department
Dr. Jalesh Kumar , Department of Computer Science & Engineering for providing a good working
environment and for his constant support and encouragement.
I would like to thank our guide, Thaseen Bhashith, Associate Professor, Department of
Computer Science and Engineering, for his expert guidance, initiative, and encouragement that led
us through the presentation.
Also, I would like to thank our beloved Technical seminar Coordinators, Department of
Computer Science and Engineering. I am highly indebted to them for their guidance and constant
supervision as well as for providing necessary information regarding the technical seminar.
I am thankful to and fortunate enough to get constant encouragement, support and guidance
from all Teaching staffs of the Department of Computer Science and Engineering. Also, I would
like to extend our sincere regards to all the non-teaching staff of Department of Computer science
and Engineering for their timely support.

Prateeksha A (4JN21CS117)

ii
TABLE OF CONTENTS

CHAPTER NO TITLE PAGE NO


ABSTRACT i
ACKNOWLEGEMENT ii
TABLE OF CONTENTS iii
LIST OF FIGURES iv
CHAPTER 1 INTRODUCTION 1-8
1.1 Problem Description 8
CHAPTER 2 LITERATURE SURVEY 9-15
CHAPTER 3 SYSTEM DESIGN 16-24
3.1 System Design 16
3.2 Proposed Methodology 18
3.2.1 Block Diagram 1 and 2 18
3.2.3 Flow Diagram 20
CHAPTER 4 RESULTS 22-24
CHAPTER 5 CONCLUSION 25

REFERENCES
iii

LIST OF FIGURES

FIGURE NO FIGURE NAME PAGE NO


Figure 1.1 Internet of Things and its application 2

Figure 1.2 7
Applications of IoT-based Weather
Forecasting System
Figure 3.1 System Block Diagram of Transmitter 18

Figure 3.2 System Block Diagram of a Receiver 20

Figure 3.3 20
Process flow of a proposed weather
monitoring system
Figure 4.1 Data collected on Arduino IDE and LoRa 23
transmission and Reception of
Data Packets at the receiver end

iv
Cryptography based on Fingerprint Bio Metrics

CHAPTER 1

INTRODUCTION
The application of biometric technologies in securing digital systems has evolved
significantly over the years, with a strong focus on leveraging unique human
characteristics for authentication and encryption purposes. Fingerprint recognition remains
one of the most commonly used biometric modalities, owing to its widespread availability
and ease of use. Fingerprints are considered highly reliable and difficult to replicate,
making them ideal for generating cryptographic keys. Various research efforts have
explored how these fingerprint features, particularly minutiae points such as ridge endings
and bifurcations, can be extracted and transformed into secure keys. This process is vital
for enhancing the security of systems that require high levels of authentication, as it
ensures that only authorized users can access sensitive information.

In addition to fingerprint minutiae, recent studies have proposed integrating


multiple biometric traits to further fortify security. Multi-biometric systems, which
combine fingerprint recognition with other biometric modalities like facial recognition or
voice authentication, create a layered defense against unauthorized access. These systems
are more resistant to spoofing and mimicry attacks, as they require attackers to bypass
several unique biometric identifiers simultaneously. Moreover, hybrid systems that
combine biometric features with advanced cryptographic techniques such as RSA and AES
provide an additional layer of protection, enabling more secure data transmission and
storage. By combining the strengths of biometric identification and robust cryptographic
algorithms, these multi-biometric systems offer a promising solution for securing personal
and organizational data in an increasingly interconnected world.

As the demand for heightened security continues to grow, researchers have also
explored more advanced cryptographic methods to improve the robustness of biometric-
based systems. Techniques like the use of chaotic maps, fuzzy vault systems, and hybrid
encryption methods have gained attention for their ability to produce highly secure
encryption keys. For example, chaotic maps, which use non-linear mathematical functions,
can introduce an element of unpredictability into the key generation process, making it
difficult for attackers to predict or replicate the key sequence. Similarly, fuzzy vault
systems combine biometric features with cryptographic techniques to create a secure vault

Dept. of CSE, JNNCE, Shivamogga. Page No 8


Cryptography based on Fingerprint Bio Metrics

for storing and transmitting sensitive data. These methods aim to safeguard biometric
templates, ensuring that they are not easily compromised or stolen during transmission.

One particularly innovative approach involves the use of geometrical shapes


incorporated into fingerprint images, which adds a layer of complexity to the encryption
process. This method relies on the extraction of geometric patterns such as circles, squares,
and triangles from the fingerprint after applying preprocessing techniques like binarization,
morphological operations, and thinning. These shapes are then used to generate
cryptographic keys, which are further enhanced by Cryptographically Secure Pseudo-
Random Number Generators (CSPRNGs). The result is a highly secure key that is difficult
to replicate or break using traditional brute-force methods. By introducing randomness and
complexity into the key generation process, these techniques offer a higher level of
protection against potential attacks.

Overall, the integration of biometric data with advanced cryptographic techniques


offers a promising avenue for securing digital communication and protecting sensitive
information. As cyber threats continue to evolve, it is crucial to develop and implement
more sophisticated security measures that are both reliable and difficult to bypass. The
combination of fingerprint-based key generation, multi-biometric authentication, and
complex cryptographic algorithms provides an effective solution to these challenges. With
the increasing adoption of biometric technologies in areas such as banking, healthcare, and
government services, the need for robust, secure systems has never been greater. The
ongoing research in this field continues to push the boundaries of what is possible in
biometric security, paving the way for more secure and efficient digital ecosystems in the
future.

 Biometric systems, especially fingerprint recognition, are used for secure encryption
key generation and authentication.
 Multi-biometric systems, combining multiple traits, offer enhanced security with
layered defense.
 Advanced cryptographic methods like RSA, AES, fuzzy vaults, and chaotic maps
strengthen security.
 Geometrical shapes incorporated into fingerprints increase key generation
complexity, making encryption harder to crack.

Dept. of CSE, JNNCE, Shivamogga. Page No 9


Cryptography based on Fingerprint Bio Metrics

 Blockchain integration with biometrics ensures secure and transparent storage of


biometric data.
 Contactless biometric systems (e.g., facial recognition, iris scanning) offer hygiene
benefits and convenience.
 Cancelable biometrics allow biometric templates to be transformed and updated
periodically for better security.
 Anti-spoofing techniques, such as liveness detection, improve biometric system
reliability by preventing fraudulent access.
 Privacy and ethical concerns are addressed through secure data collection, user
consent, and compliance with data protection laws.
 Biometric authentication integrated with IoT devices improves security and seamless
user experience.
 Future advancements in biometric security will focus on AI, blockchain, and anti-
spoofing techniques to safeguard digital identities.

Addressing the ethical concerns of privacy is also crucial when implementing biometric
systems. It is essential to ensure that biometric data is collected securely, with explicit user
consent, and in full compliance with data protection laws to maintain individual privacy.
Additionally, biometric authentication integrated with the Internet of Things (IoT) provides
heightened security for a wide array of connected devices, enabling secure access to smart
technologies in homes, offices, and other environments. Looking to the future, continuous
advancements in AI, blockchain, and anti-spoofing technologies will play a pivotal role in
further improving the security and reliability of biometric systems, ensuring that they remain
resilient against emerging threats.

1.1 Cryptography :

Cryptography refers to the practice of securing communication and data by


transforming information into a format that is unreadable to anyone except authorized users.
It involves the use of mathematical algorithms to encrypt data, ensuring confidentiality,
integrity, and authenticity of information. Cryptographic systems are essential for protecting
sensitive data, such as financial information, personal details, or confidential
communications, from unauthorized access or tampering.

Dept. of CSE, JNNCE, Shivamogga. Page No 10


Cryptography based on Fingerprint Bio Metrics

The most common cryptographic techniques include symmetric encryption (where the
same key is used for both encryption and decryption) and asymmetric encryption (where a
pair of keys, public and private, are used). In the context of fingerprint biometrics,
cryptographic algorithms are used to generate encryption keys based on biometric data (like
fingerprints), transforming plaintext data into ciphertext. The key used for encryption is
often derived from a unique biometric feature, making it more secure than traditional
password-based systems.

Fig.No 1.1 : Cryptography Representation

1.2 Fingerprint Biometrics :

Fingerprint biometrics refers to the use of fingerprint patterns for personal


identification and authentication. Each individual’s fingerprints are unique and remain
unchanged throughout their life, making them a reliable and secure form of biometric
authentication. Fingerprints are composed of unique ridge patterns that create distinct
features such as loops, whorls, and arches, which can be captured and analyzed using
specialized devices.

In security systems, fingerprints are commonly used for access control, time tracking, and
mobile phone unlocking. Additionally, fingerprint biometrics is employed in encryption
systems to generate secure cryptographic keys. Since fingerprints are difficult to replicate or
forge, they offer a high level of security compared to traditional password or PIN-based
systems.

Dept. of CSE, JNNCE, Shivamogga. Page No 11


Cryptography based on Fingerprint Bio Metrics

Fig.No 1.2 : FingerPrint Biometric

1.3 Feature Extraction :

Feature extraction in fingerprint biometrics refers to the process of identifying and


isolating key characteristics from a fingerprint image to create a unique digital
representation. These key features serve as the foundation for the biometric identification or
encryption process. Feature extraction typically involves identifying and recording various
points and patterns in the fingerprint, such as ridge endings, bifurcations, and minutiae
points, which provide a unique identifier for each fingerprint.

The goal of feature extraction is to minimize the amount of data needed for storage and
comparison, while still maintaining a high level of accuracy and uniqueness. These extracted
features are then used to generate cryptographic keys or to compare against stored
fingerprint templates during authentication.

Fig.No 1.3 : Feature Extraction

Dept. of CSE, JNNCE, Shivamogga. Page No 12


Cryptography based on Fingerprint Bio Metrics

1.4 End Points (Ridge Endings) :

End points, also known as ridge endings, are one of the key features used in
fingerprint analysis. They represent the point at which a ridge in the fingerprint pattern ends.
Ridge endings are highly distinctive and unique for each fingerprint, making them valuable
for identification or encryption.

In a fingerprint image, ridge endings can be identified through image processing techniques
like thinning or skeletonization, which reduce the fingerprint image to a simplified form,
making it easier to detect these features. Ridge endings, along with other minutiae points,
are used to generate cryptographic keys by analyzing their positions relative to each other.

Fig.No 1.4 : End Points

1.5 Bifurcation Points :

Bifurcation points are another critical feature in fingerprint analysis. A bifurcation


occurs when a single ridge splits into two, forming a fork-like structure. Bifurcation points,
like ridge endings, are unique to each individual and are used as key features for biometric
identification.

These bifurcation points are often extracted during the feature extraction process, where
image processing techniques detect and record their locations within the fingerprint. The

Dept. of CSE, JNNCE, Shivamogga. Page No 13


Cryptography based on Fingerprint Bio Metrics

relative positioning of ridge endings and bifurcations can be used to generate a secure
cryptographic key, ensuring that the key is difficult to replicate or forge. The combination of
ridge endings and bifurcation points provides a reliable and distinctive basis for encryption
key generation.

Fig.No 1.5 : Bifurcation point

1.6 Chaotic Pseudo-Random Number Generator (CPRNG) :

A Chaotic Pseudo-Random Number Generator (CPRNG) is an algorithm that


generates random numbers based on chaotic systems or functions. Unlike traditional pseudo-
random number generators (PRNGs), which use deterministic algorithms to generate
random numbers, CPRNGs exploit chaotic processes, which are highly sensitive to initial
conditions and can produce highly unpredictable sequences of numbers.

In cryptography, random numbers are essential for key generation, ensuring that the keys are
unpredictable and secure. CPRNGs are particularly valuable in biometric-based systems
because they add an extra layer of unpredictability to the key generation process. By using
chaotic functions, the CPRNG generates numbers that are difficult to predict or reverse-
engineer, even if an attacker has knowledge of the system’s behavior.

Dept. of CSE, JNNCE, Shivamogga. Page No 14


Cryptography based on Fingerprint Bio Metrics

Fig.No 1.6 : CPRNG Process

In fingerprint-based encryption, the CPRNG can be used to generate additional


cryptographic keys or to add a layer of randomness to the keys generated from the
fingerprint minutiae. This ensures that the resulting encryption keys are not only unique but
also highly secure, as the chaotic nature of the CPRNG makes it extremely difficult for
attackers to predict the sequence or reverse the process.

The proposed biometric-based encryption system combines advanced cryptographic


techniques with fingerprint biometrics to create highly secure encryption keys that are
difficult to crack. Fingerprints are unique to each individual, making them an ideal biometric
feature for key generation. The process starts with feature extraction, where important
characteristics, such as ridge endings and bifurcation points, are identified from the
fingerprint. These features form the foundation for generating cryptographic keys.

End points (ridge endings) and bifurcation points are critical in fingerprint analysis
because they are distinct and unique to each person. These points are extracted through
image processing techniques and are used to create robust encryption keys. In addition to the
fingerprint features, a Chaotic Pseudo-Random Number Generator (CPRNG) is employed to
introduce additional randomness into the key generation process. The CPRNG uses chaotic
systems to produce unpredictable and secure random numbers, which further strengthen the
generated encryption keys.

The overall system enhances data security by ensuring that the encryption keys are
not only unique but also highly resistant to attacks. The use of biometric features, such as
fingerprints, coupled with chaotic random number generation, ensures a high level of
security, making the encryption process nearly impossible to crack through conventional
methods. This method of using fingerprint biometrics for encryption addresses the need for
strong, user-friendly, and reliable security systems for protecting sensitive information.

1.7 Problem Description

The problem description of biometric cryptosystems revolves around the security


vulnerabilities and challenges in integrating biometrics with cryptography. Traditional
cryptosystems rely on secret keys, which can be lost, stolen, or shared, making them

Dept. of CSE, JNNCE, Shivamogga. Page No 15


Cryptography based on Fingerprint Bio Metrics

vulnerable. Biometric authentication offers a solution by binding cryptographic keys with


biometric data, ensuring that only authorized users can access secure systems. However,
issues such as variability in biometric samples, template security, and privacy concerns
arise. Attackers can exploit weaknesses through spoofing, replay attacks, and template
substitution. Developing robust biometric cryptosystems requires addressing these
challenges while ensuring accuracy, security, and user convenience.

Biometric security systems, though widely adopted for authentication, present


significant vulnerabilities that threaten both privacy and security. Replay attacks enable
attackers to inject recorded biometric data, bypassing live verification, while substitution
attacks allow unauthorized users to replace stored templates, leading to identity theft.
Tampering with biometric data can manipulate verification processes, and masquerade
attacks use artificial biometric artifacts to deceive systems. Trojan horse attacks manipulate
verification scores, and overriding Yes/No responses can grant fraudulent access.
Additionally, high False Rejection and Acceptance Rates undermine reliability. To address
these challenges, Biometric Encryption integrates cryptography with biometrics, enhancing
security by binding cryptographic keys to biometric data. This method eliminates the need
for centralized biometric storage, reducing the risk of unauthorized access, template
breaches, and identity theft. Furthermore, Biometric Encryption ensures revocability,
allowing new identifiers to be generated if compromised, a feature absent in traditional
biometric systems. This approach not only strengthens authentication security but also aligns
with privacy laws, offering a positive-sum model where privacy and security coexist
effectively.

Traditional symmetric cryptography faces significant challenges in key management,


including key generation, modification, and sharing. Users often struggle to remember long
and complex cryptographic keys, leading to reliance on storage or transmission methods that
make keys vulnerable to theft or compromise. Additionally, traditional authentication
mechanisms, such as passwords and tokens, do not provide non-repudiation, allowing
attackers to deny unauthorized access. To address these issues, biometrics, particularly
fingerprint-based authentication, has been integrated with cryptography to enhance security.

Unlike passwords or tokens, biometric traits are unique to individuals and cannot be
easily lost or stolen. However, incorporating biometrics into cryptography introduces new

Dept. of CSE, JNNCE, Shivamogga. Page No 16


Cryptography based on Fingerprint Bio Metrics

challenges, such as variability in biometric data due to environmental factors, user behavior,
and sensor limitations. Small changes in biometric input can lead to incorrect cryptographic
key generation, causing failures in encryption and decryption processes Furthermore, while
error correction techniques can mitigate biometric inconsistencies, they may also increase
false acceptance rates, posing security risks. Another major concern is the storage of
biometric templates, as compromised biometric data cannot be revoked like traditional
passwords. To overcome these challenges, the paper proposes a fingerprint-based
cryptographic key generation approach, where a cryptographic key is dynamically derived
from the user's fingerprint template. This eliminates the need for key storage, ensures non-
repudiation, and enhances security by binding the key directly to the user’s biometric data.
By leveraging biometric-based cryptographic key generation, the proposed system aims to
provide a more seconds.

1.7 Organization of report

This report consists of four chapters. In chapter 1 consist of Introduction, chapter 2


consist of Literature survey, chapter 3 consist of Materials and Methods, chapter 4 consist
conclusion and Reference.

Dept. of CSE, JNNCE, Shivamogga. Page No 17


Cryptography based on Fingerprint Bio Metrics

CHAPTER 2

LITERATURE SURVEY

A literature survey is a comprehensive review of existing research and publications


on specific topic, providing an overview of relevant studies and identifying gaps for future
research.

[1]. Cryptography based on Fingerprint Bio Metrics

Author : Zainab Ibrahim Abood Al-Rafiee, Dr. Tarik Z, Dr. Samir Ibrahim Abood
Publication Publication Year : 2024

This paper explores the integration of biometrics into cryptographic systems,


particularly in the context of Digital Rights Management (DRM) applications. Biometrics
play a crucial role in identity-based security systems, as they provide a unique and reliable
means to identify authorized users based on their distinctive biological traits. However, the
paper highlights several challenges when attempting to combine biometrics with
cryptography, especially regarding the inconsistencies in biometric representations and the
imperfections in feature extraction and matching algorithms.

One of the major concerns discussed in the paper is the vulnerability of existing
biometric cryptosystems to adversarial attacks. The current focus of research in this field
tends to emphasize brute force complexity for preventing such attacks. However, simple
methods that use biometric authentication to release biometric keys are inadequate for many
cryptographic applications. These methods typically involve transmitting unencrypted
biometric data over insecure channels, which undermines the security of the system and
requires the generation of biometric keys to decrypt encrypted messages. This creates a
potential security gap.

Dept. of CSE, JNNCE, Shivamogga. Page No 18


Cryptography based on Fingerprint Bio Metrics

The paper also points out that while various ideas for generating or binding biometric
keys have been proposed, many critical issues specific to the biometric domain remain
unresolved. For instance, despite efforts to enhance the complexity of intrusion prevention
mechanisms, these systems can still be compromised using relatively straightforward
methods. The discussion suggests that while biometric cryptosystems can be effective, they
are not foolproof and require further refinement to address these fundamental challenges.

Overall, the paper calls for continued research into biometric cryptosystems,
focusing on solving the specific problems related to biometric feature extraction, matching,
and secure transmission of biometric data to improve their robustness and applicability in
real-world cryptographic applications.

Advantanges :

1. Enhanced Security: Biometric cryptosystems provide a higher level of security than


traditional password-based systems. Since biometric traits such as fingerprints, iris, or
facial recognition are unique to individuals, the chances of unauthorized access are
significantly reduced. Unlike passwords, which can be guessed or stolen, biometric
data is difficult to replicate or forge.
2. No Need to Remember Passwords: Traditional cryptographic systems require users to
remember and securely store complex passwords or cryptographic keys. However,
people often forget passwords, use weak ones, or store them insecurely.
Biometricbased authentication eliminates this problem by using physical or
behavioural traits, removing the need for memory-based security.

Drawbacks :

1. Variability in Biometric Data: Unlike passwords, which remain static, biometric data
can change over time due to various factors. For example, fingerprints may be
affected by cuts, scars, or aging, while voice recognition can be influenced by illness
or background noise. These variations can lead to authentication errors, requiring the
use of error correction techniques.
2. Privacy Concerns: The collection, storage, and processing of biometric data raise
serious privacy concerns. If biometric information is leaked or misused, individuals
may suffer identity theft or surveillance without their consent. Regulations such as

Dept. of CSE, JNNCE, Shivamogga. Page No 19


Cryptography based on Fingerprint Bio Metrics

the General Data Protection Regulation (GDPR) emphasize the need for strong
safeguards when handling biometric data.

[2]. Fingerprint Based Symmetric Cryptography

Author: Subhas Barman, Samiran Chattopadhyay, Debasis Samanta

Publication Year :2022

The Fingerprint-based symmetric cryptography is a security approach that integrates


biometric authentication with traditional encryption techniques to address key management
challenges. In conventional symmetric cryptography, cryptographic keys must be securely
stored or remembered, which makes them vulnerable to theft, loss, or compromise.
Traditional authentication methods, such as passwords or tokens, are prone to attacks,
leading to potential security breaches. To overcome these issues, biometric cryptosystems
use fingerprint data to generate cryptographic keys dynamically. Instead of storing a key, a
fingerprint template is extracted from a user's fingerprint and converted into a binary
cryptographic key, which is used for encryption. During decryption, the same fingerprint is
presented, and a new key is regenerated from the fresh biometric scan to unlock the
encrypted data. This method eliminates the need to memorize or store keys while ensuring
non-repudiation, as biometric traits are unique and cannot be easily forged. However,
challenges such as biometric variability, error correction, and security risks related to
compromised biometric data must be addressed. Despite these challenges, fingerprint-based
cryptography offers a promising alternative to traditional key management by enhancing
security and reducing the risks associated with key storage and distribution.

Advantages :

1. Fast and Convenient – Authentication is quick and requires only a fingerprint scan,
improving user experience.
2. Stronger Access Control – Provides a high level of security for sensitive applications,
such as financial transactions and secure data storage.
3. Reduces Key Management Complexity – Users do not need to share or securely store
cryptographic keys, simplifying security protocols.

Dept. of CSE, JNNCE, Shivamogga. Page No 20


Cryptography based on Fingerprint Bio Metrics

Drawbacks :

1. Privacy Concerns – Storing and processing biometric data raises risks of identity theft
and misuse if security measures are inadequate.
2. Vulnerability to Spoofing – Attackers may use fake fingerprints (e.g., 3D-printed
replicas or high-resolution images) to bypass authentication.
3. Computational Overhead – Generating cryptographic keys from fingerprint templates
requires complex processing, which may slow down authentication.

[3]. Biometrics as a Cryptographic Method for Network Security

Author: Rekha Jayaram, Kumar Ankit

Publication Year: 2023

A biometric cryptosystem is proposed in this paper which is more powerful and


provides a better secures approach to encryption and decryption methodologies by using a
key-pair generated from fingerprint impressions. The Encryption scheme that may be further
adopted can be the RSA encryption algorithm because of the similarities in the key-pair
application towards encryption and decryption6,14. The uniqueness of the proposed system
lies in the distinctiveness of the generated keys that are completely based on the fact that
human biometric traits are individually distinct and thus provide a much better approach
towards securing the message passed over an unsecured or open transmission.

Advantages :

1. Eliminates Password-Based Vulnerabilities – Reduces risks associated with weak


passwords, forgotten credentials, and password theft.
2. Convenience and Speed – Users can authenticate quickly using their biometric traits
without needing to remember or enter complex credentials.
3. Dynamic Key Generation – Instead of storing cryptographic keys, biometric data is
used to generate encryption keys on demand, reducing the risk of key exposure.

Drawbacks :

Dept. of CSE, JNNCE, Shivamogga. Page No 21


Cryptography based on Fingerprint Bio Metrics

1. Legal and Ethical Issues – The use of biometric authentication may raise concerns
regarding user consent, data protection laws, and potential misuse in mass
surveillance.
2. Computational Overhead – Biometric cryptosystems require complex algorithms for
feature extraction and cryptographic key generation, which can lead to processing
delay system.

[4]. Consolidating Biometrics and Cryptography for Enhanced Security

Author: B. Prasanna rani, J Sekhar, P. Ramya

Publication Year: 2023

The Need for Enhancing Information System Security through the Integration of
Biometrics and Cryptography With the rapid advancements in information systems, ensuring
the safety, integrity, and confidentiality of information has become more challenging.
Despite the numerous benefits of technology, it has also introduced several security threats.
Authentication, authorization, and accounting are crucial aspects of information security that
require attention. Authentication, in particular, has been extensively studied, and biometric
authentication is a recent method that has shown significant potential to enhance system
security.

Advantages :

1. Enhanced Security: Combining biometrics with cryptography strengthens security by


making unauthorized access more difficult. Cryptographic keys generated using
biometric data are harder to steal or replicate.
2. Improved Key Management: Biometric cryptosystems improve the generation and
management of secret keys, reducing the risk of key theft.
3. Resistance to Attacks: Methods like fuzzy vaults and cancellable biometrics help
protect biometric data from spoofing attacks. Liveness detection techniques can
further prevent fraud.

Drawbacks :

1. Privacy Concerns: Storing and processing biometric data raises privacy issues if not
handled securely. A compromised biometric cannot be replaced like a password.

Dept. of CSE, JNNCE, Shivamogga. Page No 22


Cryptography based on Fingerprint Bio Metrics

2. Potential for Spoofing: Biometric authentication methods are vulnerable to spoofing


if liveness detection is not implemented.
3. Processing Overhead: Biometric encryption techniques can be computationally nsive,
leading to slower authentication times.

[5]. Secure Biometric Verification in the Presence of Malicious


Adversaries

Author : Kamela Al-Mannai, Elmahdi Bentafat, Spiridon Bakiras.

Publication Year : 2024

This paper presents a comprehensive and efficient biometric verification protocol


designed to secure biometric data against both malicious clients and servers. In traditional
biometric systems, users' biometric data, such as facial features, are often transmitted and
processed, making them vulnerable to attacks. To address this issue, the authors introduce a
protocol that uses homomorphic encryption, which allows biometric data to be encrypted
while still enabling secure computations to be performed on the encrypted data. This ensures
that sensitive information, such as users' plaintext biometric data, is never exposed to the
server during the verification process.

The protocol is proven to be secure in the random oracle model, providing strong
guarantees against adversarial attacks from both parties in the system. It is designed to be
highly efficient, incurring just 880 ms of computational overhead and 99 KB of
communication cost, making it practical for real-world applications where performance and
scalability are critical. The security model is robust, ensuring that even if a malicious
adversary gains access to the client’s device or the server, they cannot easily compromise
the system or perform impersonation attacks.

In addition to the theoretical contributions, the paper includes a proof-of-concept


implementation that demonstrates the effectiveness of the protocol in practice. Using face
recognition as the biometric authentication method, the implementation showcases the
feasibility of the system in a real-world setting. The system does not rely on a trusted third-

Dept. of CSE, JNNCE, Shivamogga. Page No 23


Cryptography based on Fingerprint Bio Metrics

party, which is a significant advantage over other systems that require external entities for
trust. Moreover, the protocol ensures that even if secret keys are compromised, they are
insufficient to carry out impersonation attacks, as the system still requires valid biometric
data for authentication.

Advantages :

1. Enhanced Security : The protocol is secure against both malicious clients and servers,
protecting sensitive biometric data from unauthorized access and ensuring privacy.
2. Efficiency : It offers minimal computational overhead (880 ms) and low
communication costs (99 KB), making it practical for real-time biometric verification
in resource-constrained environments.
3. No Trusted Third-Party: The protocol does not rely on a trusted third-party, reducing
potential security risks and simplifying the system design.

Drawbacks :

1. Computational Overhead : While efficient, the 880 ms overhead may not be suitable
for extremely low-latency applications, especially in high-volume environments.
2. Privacy Concerns with Face Recognition : Using facial recognition for authentication
may raise privacy concerns, as facial data is sensitive and vulnerable to misuse or
attacks like deepfakes.
3. Assumption of Secure Feature Extraction : The system relies on accurate biometric
feature extraction, which could be compromised if the extraction process is not
robust, affecting overall security.

Dept. of CSE, JNNCE, Shivamogga. Page No 24


Cryptography based on Fingerprint Bio Metrics

CHAPTER 3

MATERIALS AND METHODS

The primary objective of the proposed approach is to generate encryption keys that
are extremely difficult to crack, enhancing the overall security of sensitive data. The key
factor in this system is the use of a highly unique biometric feature, minimizing the chances
that two individuals will have identical characteristics. This uniqueness and stability make
biometric data particularly valuable for authentication and encryption. Fingerprints, in
particular, are widely recognized as a unique biometric trait and have been utilized for
identification purposes for over a century, making them a trusted and reliable source for
secure systems.

The proposed system leverages fingerprint biometrics to generate encryption keys.


As Shown in the Figure 3.2(a) the encryption process begins with the extraction of distinct
features from the user's fingerprint, such as minutiae points (e.g., ridge endings,
bifurcations). These features are then processed through a cryptographic algorithm to
generate an encryption key. This key is used to encrypt sensitive information, converting it
into a format that is unreadable without the corresponding decryption key.

Figure 3.2(b) shows the decryption process, where the encrypted data is restored to
its original format. The same fingerprint features that were used to generate the encryption
key are utilized in this process. The fingerprint is analyzed again to extract the minutiae
points, and these are compared to the original biometric data. If the fingerprint data matches,
the system generates the correct decryption key, allowing the encrypted message to be
decrypted and accessed by the authorized user.

Dept. of CSE, JNNCE, Shivamogga. Page No 25


Cryptography based on Fingerprint Bio Metrics

By using fingerprints as the basis for generating cryptographic keys, this system
ensures a higher level of security compared to traditional password-based methods, as the
fingerprint is unique to each individual and cannot easily be replicated. This approach
combines the uniqueness of biometric data with robust cryptographic techniques to create a
highly secure system for protecting sensitive information.

3.1 Pre Processing

The pre-processing stage plays a crucial role in enhancing and improving the quality
of the fingerprint image, ensuring that key features are more clearly identifiable for
subsequent analysis. One of the main techniques used in this stage is image sharpening,
which focuses on enhancing the detected edges of the fingerprint. Image sharpening helps to
improve the clarity of the image by emphasizing the boundaries and details of the objects
within it. This process makes the features of the image, such as the ridges and minutiae
points in a fingerprint, more distinct, giving the image better depth and visual sharpness.

Sharpening techniques are particularly important in biometric systems because they


allow for more accurate feature extraction. When applied to fingerprint images, sharpening
ensures that the ridges and other critical details are more pronounced, making it easier to
identify minutiae points like ridge endings and bifurcations, which are essential for
fingerprint matching and key generation.

In this work, the original fingerprint image is captured using a ZKTeco U270 device
and has a resolution of size M×N in PNG format. The first step in pre-processing is
converting this original fingerprint image to grayscale, simplifying the color information to
focus on the intensity of light in the image. This step prepares the image for further
processing, where details can be enhanced more easily.

Next, the image is sharpened using a Laplacian filter in MATLAB R2021b. The
Laplacian filter is a well-known edge-detection technique that highlights areas where the
intensity of pixel values changes rapidly, which corresponds to the edges in the fingerprint
image. This sharpening technique further enhances the image by improving the definition of

Dept. of CSE, JNNCE, Shivamogga. Page No 26


Cryptography based on Fingerprint Bio Metrics

ridge patterns and minutiae points, making it easier to perform subsequent feature
extraction.

Figure 2 illustrates the pre-processing steps, where panel (a) shows the original
fingerprint image, panel (b) displays the grayscale version, and panel (c) presents the
sharpened fingerprint image. This sequence of pre-processing steps improves the image
quality, ensuring that the features necessary for secure biometric identification are more
easily extracted and processed in the subsequent stages of the system.

3.2 Post Processing

Feature extraction plays a pivotal role in converting the raw fingerprint image into a
compact and useful representation for further processing, particularly for biometric
authentication and encryption key generation. The goal of feature extraction is to identify
and quantify important characteristics in the fingerprint, which can be used to uniquely
identify an individual. This process involves counting and analyzing feature vectors that
highlight the most distinctive parts of the fingerprint pattern (Abood, 2017; Shini et al.,
2016).

A fingerprint consists of an impression of ridges and valleys on the finger, and the
most critical features used in fingerprint identification are the minutiae. Minutiae points
refer to the specific features that make up the fingerprint’s pattern. The two main types of
minutiae are ridge endings and bifurcations. Ridge endings are points where a ridge in the
fingerprint pattern abruptly ends, while bifurcations are points where a ridge splits into two
branches. These minutiae points are critical for creating a unique representation of the
fingerprint and are used to form a fingerprint template that is then processed for key
generation.

Figure 3.4 illustrates these minutiae types:

 Figure 3.4(a) shows ridge endings, which are key features in fingerprint analysis.

 Figure 3.4(b) shows ridge bifurcations, where a single ridge splits into two branches,
another essential minutia used for identification.

Dept. of CSE, JNNCE, Shivamogga. Page No 27


Cryptography based on Fingerprint Bio Metrics

In the process of fingerprint feature extraction, the center coordinates (xc, yc) of the
fingerprint image are calculated. These coordinates represent the intersection point of the
diagonals of the image. Specifically, the coordinates are determined as:

where (xc, yc) considered as the fingerprint diagonals intersection point in eq. (1).

Where MMM and NNN are the dimensions of the fingerprint image (with MMM
representing the number of rows and NNN representing the number of columns in the
image). The center coordinates, (xc,yc)(xc, yc)(xc,yc), act as the reference point for the
fingerprint image, which is essential for aligning and extracting the minutiae in a
consistent and accurate manner.

After the minutiae points (ridge endings and bifurcations) are identified, they are
used to create a fingerprint template, which can then be utilized in the key generation
process. This template serves as the foundation for generating cryptographic keys, which are
unique to each individual. By leveraging these unique features, the system can create a
secure and personalized encryption key that is difficult to replicate or forge.

a) Image Binarization
Image binarization is an essential step in the process of fingerprint image processing,
as it converts the grayscale image into a binary format, which simplifies the analysis and
extraction of important features. In the case of fingerprints, binarization helps to
differentiate between the ridges (which represent the fingerprint pattern) and the valleys
(the spaces between the ridges). By transforming the image into a binary format, where
pixels are either black or white, it becomes easier to detect minutiae points, such as ridge
endings and bifurcations, which are crucial for fingerprint recognition.

Unlike other image processing techniques, there is no universal threshold value that
applies to the entire image. Instead, the threshold value for each pixel is calculated based
on its location within the image. This means that each pixel’s threshold is determined
individually, taking into account the surrounding pixels and their intensity values. This

Dept. of CSE, JNNCE, Shivamogga. Page No 28


Cryptography based on Fingerprint Bio Metrics

local thresholding ensures more accurate binarization, especially for fingerprint images,
where ridge patterns may have varying levels of contrast in different regions of the image.

The threshold value is calculated by finding the mean value of the intensity of a
block of neighboring pixels. This block of pixels forms a district or local region within the
image. The mean intensity of this block is used as the threshold for the central pixel in that
block. If the pixel’s grayscale intensity is less than this threshold value, it is converted to
black. If the pixel’s grayscale intensity is greater than the threshold, it is set to white.
This process effectively highlights the fingerprint ridges in white and the valleys in black,
creating a binary image that can be easily processed for further feature extraction and
analysis.

The benefit of using a local thresholding approach is that it adapts to variations in


lighting, contrast, and quality that may exist within different regions of the fingerprint

image. This ensures that the binarization process is more accurate and reliable across the
entire image, enhancing the precision of subsequent steps, such as feature extraction and
minutiae detection. By converting the fingerprint image into a binary form, the system can
more effectively detect and analyze the important features that are crucial for secure
biometric identification.

Fig.No 3.1 : Image Binarization (a) Original Image (b) After Binarization
b) Morphological Operations

Erosion and dilation are crucial operations in image processing that modify the shape
and structure of objects in a binary image. Erosion works by shrinking the white regions in
the image, removing pixels from the boundaries of the foreground objects. This helps
eliminate small artifacts or noise around the fingerprint ridges, making the ridges more
distinct and isolated from unnecessary background elements. Dilation, in contrast, expands
the white regions by adding pixels to the boundaries of the foreground objects. This

Dept. of CSE, JNNCE, Shivamogga. Page No 29


Cryptography based on Fingerprint Bio Metrics

operation can help connect broken or fragmented ridge lines in the fingerprint, filling in
small gaps and making the ridges more continuous.

These operations depend on the structuring element, a small shape (such as a


square, circle, or cross) that moves across the image to determine how the pixels are added
or removed. The size of the structuring element plays a critical role in how significant the
effects of erosion and dilation will be. Larger structuring elements result in more
noticeable changes, while smaller elements lead to subtler adjustments.

In the context of fingerprint processing, erosion and dilation are used together to
enhance the quality of the fingerprint image. Erosion is used to remove small noise and
isolate the true fingerprint ridges, while dilation is used to enhance the continuity of the
ridges by connecting broken segments and closing small gaps. This combination improves
the overall clarity and structure of the fingerprint, which is essential for accurately
detecting minutiae points (ridge endings and bifurcations) and improving the precision of
biometric identification or key generation processes.

These morphological operations make the fingerprint image more suitable for feature
extraction, ensuring that the important characteristics of the fingerprint are clearly defined
and free from unnecessary distractions.

c) Thinning
The thinning process is a morphological operation used to reduce the width of the
objects in a binary image to a single pixel, effectively creating a skeletonized version of
the image. This technique is particularly useful for fingerprint image processing, where the
goal is to simplify the ridges of the fingerprint into a minimal representation, making it
easier to detect and analyze important features such as minutiae points. By thinning the
image, the ridges are transformed into a skeleton, which is often essential for accurate
fingerprint feature extraction and identification.

In the context of key generation for biometric encryption, this research employs three
distinct shapes circle, square, and triangle to generate cryptographic keys based on the
fingerprint image. The process involves utilizing these geometrical shapes as templates or
patterns that are overlaid on the skeletonized fingerprint image, and these patterns help
form unique keys.

Dept. of CSE, JNNCE, Shivamogga. Page No 30


Cryptography based on Fingerprint Bio Metrics

Figure 4 illustrates the key generation process, with Figure 3.5(a) showing the
generation of a key using a circle, Figure 3.5(b) demonstrating the generation using a
square, and Figure 3.5(c) showing the key generated from a triangle. Each of these
shapes plays a role in encoding the fingerprint's minutiae features and contributes to
creating a unique cryptographic key. By using these geometrical shapes as part of the key
generation, the system ensures that the resulting keys are highly unique and difficult to
replicate, enhancing the security of the encryption process.

Dept. of CSE, JNNCE, Shivamogga. Page No 31


Cryptography based on Fingerprint Bio Metrics

Fig. No 3.2 : Proposed System Block Diagram a) Encryption b) Decryption

Fig.No 3.3 : Pre-Processing (a) Original Image (b) Gray Image (c) Sharpened Image

Fig.No 3.4 : Minutiae Types a) Ridge Ending b) Ridge Bifurcation

d) Circle (c)
A circle of specified center coordinates (xc, yc) with a radius r = 60 is drawn, as
shown in Figure 3.5(a). The ends and bifurcations of the fingerprint inside the circle are
extracted separately, and their points are recorded. These ends and bifurcations are
considered as keys of circle1 (c1), but for the taken fingerprint, there are no bifurcation
points inside c1, so there is no bifurcation key. With the exact center coordinates, but with
r = 110, circle2 (c2) is drawn. The ends and bifurcations inside c2 but at the same time
outside c1 are extracted separately as (c2-c1) keys. With the exact center coordinates, but
with r = 160, circle3 (c3) is drawn. The ends and bifurcations inside c3 but at the same
time outside c2 are extracted separately as (c3-c2) keys. And so on for r = 210 and 250, the
ends and bifurcations are extracted separately as (c4-c3) and (c5-c4) keys. The other keys,
either for ends or bifurcations, are found as follows:

c1 = c1

Dept. of CSE, JNNCE, Shivamogga. Page No 32


Cryptography based on Fingerprint Bio Metrics

c2 = (c2-c1) + c1
c3-c1= (c3-c2) + (c2-c1)
c3 = c2 + (c3-c2)
c4-c2 = (c3-c2) + (c4-c3)
c4-c1= (c4-c2) + (c2-c1)
c4 = c3 + (c4-c3)
c5-c3 = (c4-c3) + (c5-c4)
c5-c2 = (c3-c2) + (c5-c3)
c5-c1 = (c5-c2) + (c2-c1)
c5 = c4 + (c5-c4)
e) Square
A square of specified center coordinates (xc, yc) with radius rs = 60 is drawn from
the center point to the top-left corner, top-right corner, bottom-right corner, and bottom-left
corner, as shown in Figure 3.5(b):

Where (x1, y1) is a bottom-left corner point in eq. (2).

The ends and bifurcations of the fingerprint inside the square are extracted
separately, and their points are recorded. These ends and bifurcations are considered as
keys of square1 (s1), but for the taken fingerprint, there are no bifurcation points inside s1,
so there is no bifurcation key. With the exact center coordinates, but with rs = 110, square2
(s2) is drawn. The ends and bifurcations inside s2 but at the same time outside s1 are
extracted separately as (s2-s1) keys and so on for rs=160, 210, and 250. The other keys,
either for ends or bifurcations, are found as in the circle. In Figure 1, the keys: k30, k31,
…, k58 refer to s1, s2-s1, …, s5 for square end and bifurcation points.

f) Triangle (t)
A triangle of specified center coordinates (xc, yc) with rt = 80 is drawn from the
center point to the topleft corner, top-right corner, and bottom corner, as shown in Figure
3.5(c):

Dept. of CSE, JNNCE, Shivamogga. Page No 33


Cryptography based on Fingerprint Bio Metrics

The ends and bifurcations of the fingerprint inside the triangle are extracted
separately, and their points are recorded. In eq. (3) shows these ends and bifurcations are
considered as keys of triangle1 (t1), but for the taken fingerprint, there are no bifurcation
points inside t1, so there is no bifurcation key. With the exact center coordinates, but with
rt = 110, triangle2 (t2) is drawn. The bifurcations and ends inside t2 but at the same time
outside t1 are extracted separately as (t2-t1) keys. And so on for rt = 160, 250, 330, and
430. The other keys, either for ends or bifurcations, are found as in the circle. Note that rt
values in the triangle have different values from those in the circle and square to cover the
maximum area of the fingerprint and ensure an appropriate distance between the triangles.
In this case, one can ensure that the ends and bifurcations are present at these distances. In
Figure 1, the keys: k59, k60, …, k87 refer to t1, t2-t1, …, t5 for triangle end and
bifurcation points. Table 1 shows the key number (key no.) and key name for circle,

square, and triangle end and bifurcation points. k1, k2, …, k15 and k16, k17, …, k29 refer
to end and bifurcation keys for circle. k30, k31, …, k44 and k45, k46, …, k58 refer to end
and bifurcation keys for square. k59, k60, …, k73 and k74, k75, …, k87 refer to end and
bifurcation keys for triangle.

Fig.No 3.5 : Methods of Key Generation (a) Circle (b) Square (c) Triangle

In biometric systems, geometric shapes such as circle, triangle, and square are used
in the key generation process to enhance the security and uniqueness of cryptographic keys
derived from fingerprint minutiae. The circle helps in mapping key fingerprint features,
ensuring the generated key is personalized and difficult to replicate. The triangle
introduces additional complexity, making the key even more unique. The square provides a
structured approach, organizing the minutiae into clear patterns that strengthen the key.
These shapes ensure that each fingerprint produces a distinct cryptographic key, making it
harder for unauthorized access or key replication, ultimately enhancing the security of the
biometric authentication system.

Dept. of CSE, JNNCE, Shivamogga. Page No 34


Cryptography based on Fingerprint Bio Metrics

Table 1: Key no. and Key Name for Circle, Square and Triangle End and Bifurcation Points

Dept. of CSE, JNNCE, Shivamogga. Page No 35


Cryptography based on Fingerprint Bio Metrics

Figure 3.6 shows feature extraction and key generation, where Figure 2.6(a-c) shows the
ends in a red color and bifurcations in a blue color for circle, square and triangle,
respectively.

Figure 3.6 : Feature Extraction and Key Generation a) Circle b) Square c) Triangle

 Chaotic System
A Chaotic system is vastly used with cryptography, while the researchers developed
chaos maps several years ago. A pseudo-random bit generator is generated based on a
chaotic system and used for stream-cipher cryptography (Jerjees et al., 2020). For more
security and to produce a vital encryption key, a Chaotic-Pseudo-Random-Number
Generator technique will be used. The keys generated by CPRNG are merged with those
generated from minutiae (end and bifurcation) points' positions. The authors (Jerjees et

al., 2020) used two Logistic maps but in this research three Logistic maps with different
system parameters and initial conditions are used to achieve better randomness bits
sequence:

where I1, I2 and I3 are iteration factors. X1(n), X2(n), and X3(n) are the initial values in
eq. (4). Pseudo-random bit b(n) is generated from the logistic map after (n) iterations and
obtained by comparing the mean value of the outputs of three logistic maps with the
output of every map as in equation 5.

Dept. of CSE, JNNCE, Shivamogga. Page No 36


Cryptography based on Fingerprint Bio Metrics

where x is the mean value in eq. (5).

3.3 Encryption and Decryption Algorithms

Cryptography is a science that uses mathematical principles to encrypt and decrypt


messages. It enables anyone to transmit sensitive information or store it across insecure
networks such as the internet in order to be read by the intended recipient only and
cannot be read by others (Jha et al., 2016; Sarkar & Noel, 2020; Alrifaee & Ismaeel,
2022; Younis et al., 2016; Al-Hassani, 2022). A cryptosystem is also referred to as a
cipher system (Tyagi & Dixit, 2018). Data or messages that can be understood and read
without special measures are called clear or plain-text. The process of hiding the plain-

text substance or disguising it; is called encryption. The cipher-text is the unreadable
gibberish results from the encryption process. The process of decoding the cipher-text to
its original plain-text using a secure key is called decryption (Sarkar & Noel, 2020;
George et al., 2020; Krishna & Kareem, 2021; Ibraheem et al., 2018). Encryption-based
biometrics became more suitable to meet cryptographic demands by applying fingerprint
images to generate the crypto-biometric key (Jerjees & Ismaeel, 2018). Cryptography is
symmetric or asymmetric; in symmetric, the same key is used in encryption and
decryption algorithms. In asymmetric, two unlike keys are used: the public key to
encrypt the plain-text and the private key to decrypt the cipher-text into plain-text
(Barman et al., 2015; Rabee & Abdullah, 2020). The same plain-text encrypts to
different cipher-text using different keys. The security of the encrypted data is dependent
on the key secrecy and the algorithms’ strength (Sarkar & Noel, 2020; Tyagi & Dixit,
2018; Al-Lehiebe, 2015). Encryption and decryption algorithms are expressed in
equations (6) and (7):

where i and j are the plaintext and ciphertext letters’ numbers, n is a shift key point,
and m is a modulus in eq. (6) – (7).

The end and bifurcation coordinate points (x, y) values are sufficient to give
randomness in data, so in this work, they have been considered as minutiae points of the
fingerprint images for both sender and receiver. Table 2 shows a lookup table with 26
capital letters, space, and point designed with modulus m=28. Each letter (Let.) has a

Dept. of CSE, JNNCE, Shivamogga. Page No 37


Cryptography based on Fingerprint Bio Metrics

corresponding mapped number (No.) while (.) and (space) have the numbers 27 and 28,
respectively.

Table 2: Lookup Table

CHAPTER 4
RESULT AND DISCUSSION
The key and algorithm control the operation on the plain-text and cipher-text (Tyagi
& Dixit, 2018). Keys are crucial as ciphers without changing keys are simply breakable;
therefore, fingerprint features are used in this paper as security keys. Table 3 shows the
encryption and decryption process using the end key c1 with r = 60 and a plain-text (THANK
YOU). The letter T has the end point (202, 216), when it is mapped onto the lockup table, it
has a number of 20. In the encryption process using cipher shift right with mod28, the
resulting number Noen. = 18 (where Noen. = (No. + (X+ Y)) mod28), which has a mapped
letter R on the lockup table. When this ciphered letter R is decrypted using cipher shift left
with an encrypted number Noen = 18 and mod28, the resulting number is the decrypted
number (Nodec.) which is equal to 20 (where Nodec. = (Noen. - (X+ Y)) mod28), which has
a mapped letter T on the lookup table and so on for other letters in the plain-text. The plain-
text is encrypted then the cipher-text is decrypted to retrieve the plain-text. Some end points
such as (202, 216), (200, 237), and (182, 263) in the table are repeated because the plain-text

Dept. of CSE, JNNCE, Shivamogga. Page No 38


Cryptography based on Fingerprint Bio Metrics

has nine letters and the end points inside c1 are only six; so only these three points are
repeated. There are no bifurcation points inside c1. Table 4 shows the processes of encryption
and decryption using the ending points’ key of c2 with r=110. Despite the same plain-text
and No., the cipher-text differs in Tables 3 and 4 because the points differ.

Table 3: Encryption and Decryption using End Key c1 with r=60

Table 4: Encryption and Decryption Using Bifurcation Key c2 with r=110

Tables 5 and 6 show the encryption and decryption process using end and bifurcation points
of various c keys with a plain-text (SHE IS VERY HAPPY.). The abbreviation (En.) refers to

Dept. of CSE, JNNCE, Shivamogga. Page No 39


Cryptography based on Fingerprint Bio Metrics

the cipher-text when the plain-text is encrypted using the related keys c1 or c2-c1 ..., etc. or
in other terms k1 or k2 ..., etc., and (Dec. text) refers to the plain-text when the cipher-text is
decrypted using any of these keys. c1 has no bifurcations, which means no bifurcation point
inside c1. In Table 5, using equations (6) and (7), the plain-text is encrypted by the key k1 to
the encrypted text (QFBEWHZKJWKQFRMUKY). While by using key k2, the encrypted
text will be (GI ZUVMJF MWLKNDQTY). For each key in Table 5, the encrypted text is
not the same as for the other keys. In Tables 6, using bifurcation points, the encrypted text is
not the same as for the other keys but it is the same only when the plain-text is encrypted by
the keys k16 and k17 because k16 is c2-c1 while k17 is c2 as mentioned in Table 1 and c1
has no bifurcations which leads to c2-c1=c2.

Tables 7 and 8 show the encryption and decryption process using end points of
various s and t keys, respectively. In these tables and Table 5, all the letters in the plain-text
have different representations in the encrypted text, even if the letters are repeated in the
message. s1 and t1 have no bifurcations, that means no bifurcation points inside s1 and t1.

Table 5: Encryption and Decryption Using End Points of Various c Keys

Dept. of CSE, JNNCE, Shivamogga. Page No 40


Cryptography based on Fingerprint Bio Metrics

Table 6: Encryption and Decryption Using Bifurcation Points of Various c Keys

Table 7: Encryption and Decryption Using End Points of Various s Keys

Dept. of CSE, JNNCE, Shivamogga. Page No 41


Cryptography based on Fingerprint Bio Metrics

Table 8: Encryption and Decryption Using End Points of Various t Keys

Using equation (4) with I1=3.7, I2=3.9, and I3=4 and initial values, X1(0) =0.61,
X2(0) =0.5, and X3(0) =0.6 to achieve better randomness bits sequence. To generate the
binary key used for encryption, CPRNG technique generated keys merged with those
generated from minutiae (end and bifurcation) points' positions. So, binary bits of minutiae
positions are XORed with the binary bits generated from CPRNG. Then, this key is
XORed with the binary bits of the plain-text to produce the cipher-text, which is converted
to ASCII symbols. In the decryption process, the recipient gets the key in random text,
which contains the encrypted text too. This key is a guide used in the encryption process.
Tables 9 and 10 show the encryption and decryption of the proposed system.

Dept. of CSE, JNNCE, Shivamogga. Page No 42


Cryptography based on Fingerprint Bio Metrics

Table 9: Encryption of the Proposed System

Table 10: Encryption of the Proposed System

Biometric systems, especially fingerprint-based ones, face various attacks like brute-
force and timing attacks. By utilizing 112 features, 87 keys, and three chaos logistic maps,
the proposed technique significantly increases the BFA (Brute-Force Attack) time to
7.5595e+159 years, offering stronger protection against attackers compared to methods
using fewer features, keys, or chaos maps.

4.1 Conclusion

Dept. of CSE, JNNCE, Shivamogga. Page No 43


Cryptography based on Fingerprint Bio Metrics

The proposed technique improves security by generating 87 secured keys from


fingerprint biometrics. These keys are generated in a method that is difficult enough to
guess. The generation is achieved by enhancing the fingerprint image and sharpening it with
a Laplacian filter. Circles, squares, and triangles are drawn on the fingerprint separately after
binarization, morphological operations, and thinning. Then, the end and bifurcation points
are extracted inside and outside these shapes to generate secured keys. A CPRNG technique
is used, and the generated keys are merged with those generated from the positions of
minutiae (end and bifurcation) points. After the encryption and decryption processes, it was
found that the attacker required time of almost 7.5595e+159 years to decrypt the encrypted
message, which is more than that required to crack the keys generated in the previous
researches. Also, it is proved that by separately drawing three types of geometrical shapes on
the fingerprint and with different radii, the plain-text can be reconstructed after encryption
using keys generated from end and bifurcation points. That means drawing any geometrical
shape with any radius can be used in this technique. Therefore, the proposed technique can
enhance privacy and security. The technique can be used in fingerprint identification,
recognition, and retrieval for future works. Also, it can be used in key generation
mechanisms via deep learning.

REFERENCE

[1] Abdulrazak, S., & Sabir, F. (2023). An empirical investigation on Snort NIDS versus
supervised machine learning classifiers. Journal of Engineering, 29(02), 164-178.
https://doi.org/10.31026/j.eng.2023.02.11
[2] Abood, Z. I. (2017). Composite techniques-based color image compression. Journal
of Engineering, 23(3), 80-93.

Dept. of CSE, JNNCE, Shivamogga. Page No 44


Cryptography based on Fingerprint Bio Metrics

[3] Agrawal, R., Singh, B. K., & Sharma, L. (2021). Cryptography based internet
security ATM system using fingerprint for securing PIN. Journal of University of
Shanghai for Science and Technology, 23(10), 369-380.
http://doi.org/10.51201/JUSST/21/10717
[4] Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-
biometric system for network security. EURASIP Journal on Information Security,
2015, 1-17. https://doi.org/10.1186/s13635-015-0020-1
[5] Herrera, J. A. Q., Limo, F. A. F., Tasayco-Jala, A. A., Vargas, I. M., Farias, W. B.,
Inga, Z. M. C., & Palacios, E. L. H. (2023). Security Issues in Internet Architecture
and Protocols Based on Behavioral Biometric Block ChainEnhanced Authentication
Layer. Journal of Internet Services and Information Security, 13(3), 122-142.
https://doi.org/10.58346/JISIS.2023.I3.008
[6] Jassim, M. F., Hamzah, W. M. S., & Shimla, A. F. (2022). Biometric iris templates
security based on secret image sharing and chaotic maps. International Journal of
Electrical and Computer Engineering (IJECE), 12(1), 339-348.
http://doi.org/10.11591/ijece.v12i1.pp339-348.
[7] Verjees, S. A., Estefan, B. A., & Ismaeel, T. Z. (2020). Hybrid ciphering method
based on chaos logistic map and fingerprint information. Journal of Engineering
Science and Technology, 15(5), 3013-3024.
[8] Tyagi, H., & Dixit, S. (2018). Development of biometric cryptosystem using finger -
print authentication. International Journal of Electronics Engineering, 10(1), 350-358,
http://www.cssjjourrnallss.com

Dept. of CSE, JNNCE, Shivamogga. Page No 45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy