Security on Fingerprint Data Transfer System
Keywords:
Fingerprint, Watermarking, Discrete Wavelet Transform, Confusion and DiffusionAbstract
Nowadays, the data can undergo grave modifications (access to the credit cards, the transactions in ecommerce, espionage of the secret information in military domain, theft biometrics information) especially through transmissions on the insecure network or internet. Where, it is necessary to look a robust method to secure the data. In this work we are focusing on matching data pattern along with all security assurance, so that we can provide discrete wavelet transform watermarking and en-decryption using confusion and diffusion method. The encryption method is based on XORing the message bytes and, it is the key used for encryption and decryption that makes the process of cryptography secure because key was automatically taken by system. Its performance with biometric information (fingerprint) using MATLAB 7.10(R20109).
References
Wuzhili, ”Fingerprint Recognization”, April 2002.
Graig T. Diefenderfer,” Fingerprint Recognition”, Master’s Thesis, June 2006.
Prabhishek Singh and R S Chadha , “A Survey of Digital Watermarking Techniques, Applications and Attacks ”, International Journal of
Engineering and Innovative Technology (IJEIT), Volume 2, Issue 9, March 2013.
Darshana Mistry, Asim Banerjee, ”Discrete Wavelet Transform Using Matlab” International Journal Of Computer Engineering & Technology, Volume 4, Issue 2, March – April (2013), pp. 252-259
Atual kahate In cryptography and network security, 2nd Edition, Tata McGraw Hill Publishing Company Limited, New Delhi, 2008
Darshana Mistry, Asim Banerjee, ”Discrete Wavelet Transform Using Matlab” International Journal Of Computer Engineering & Technology, Volume 4, Issue 2, March – April (2013), pp. 252-259.
Narshingha P V ,”Security of Data Transfer Over Insecure Channel Through Stenography”, International Journal of Combined Research & Development , Volume: 1; Issue: 2; June –2013
Akshya Kumar Gupta And Mehul S Raval, “A Robust and Secure Watermarking Scheme Based on Singular Values Replacement”,Indian
Academy of Sciences, Vol. 37, Part 4, August 2012, pp. 425–44
P.Vijayram Reddy , K.Venkatesh Sharma , P.Mallesham And P. Radhadevi ,”Secure Image Transmission through Unreliable Channels “,
International Journal on Computer Science and Engineering Vol. 02, No. 06, 2010, 2053-2058.
Asker M. Bazen, Gerben T.B. Verwaaijen, Sabih H. Gerez, Leo P.J. Veelenturf and Berend Jan van der Zwaag , “A CorrelationBased Fingerprint Verification System“ ,ProRISC 2000 Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands, November 2000.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.