Security on Fingerprint Data Transfer System

Authors

  • Modi H IT System and Network Security, Gujarat Technological University, India
  • Mistry D Technical Associate, Elnfochips Training & Research Academy, India

Keywords:

Fingerprint, Watermarking, Discrete Wavelet Transform, Confusion and Diffusion

Abstract

Nowadays, the data can undergo grave modifications (access to the credit cards, the transactions in ecommerce, espionage of the secret information in military domain, theft biometrics information) especially through transmissions on the insecure network or internet. Where, it is necessary to look a robust method to secure the data. In this work we are focusing on matching data pattern along with all security assurance, so that we can provide discrete wavelet transform watermarking and en-decryption using confusion and diffusion method. The encryption method is based on XORing the message bytes and, it is the key used for encryption and decryption that makes the process of cryptography secure because key was automatically taken by system. Its performance with biometric information (fingerprint) using MATLAB 7.10(R20109).

References

Wuzhili, ”Fingerprint Recognization”, April 2002.

Graig T. Diefenderfer,” Fingerprint Recognition”, Master’s Thesis, June 2006.

Prabhishek Singh and R S Chadha , “A Survey of Digital Watermarking Techniques, Applications and Attacks ”, International Journal of

Engineering and Innovative Technology (IJEIT), Volume 2, Issue 9, March 2013.

Darshana Mistry, Asim Banerjee, ”Discrete Wavelet Transform Using Matlab” International Journal Of Computer Engineering & Technology, Volume 4, Issue 2, March – April (2013), pp. 252-259

Atual kahate In cryptography and network security, 2nd Edition, Tata McGraw Hill Publishing Company Limited, New Delhi, 2008

Darshana Mistry, Asim Banerjee, ”Discrete Wavelet Transform Using Matlab” International Journal Of Computer Engineering & Technology, Volume 4, Issue 2, March – April (2013), pp. 252-259.

Narshingha P V ,”Security of Data Transfer Over Insecure Channel Through Stenography”, International Journal of Combined Research & Development , Volume: 1; Issue: 2; June –2013

Akshya Kumar Gupta And Mehul S Raval, “A Robust and Secure Watermarking Scheme Based on Singular Values Replacement”,Indian

Academy of Sciences, Vol. 37, Part 4, August 2012, pp. 425–44

P.Vijayram Reddy , K.Venkatesh Sharma , P.Mallesham And P. Radhadevi ,”Secure Image Transmission through Unreliable Channels “,

International Journal on Computer Science and Engineering Vol. 02, No. 06, 2010, 2053-2058.

Asker M. Bazen, Gerben T.B. Verwaaijen, Sabih H. Gerez, Leo P.J. Veelenturf and Berend Jan van der Zwaag , “A CorrelationBased Fingerprint Verification System“ ,ProRISC 2000 Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands, November 2000.

Downloads

Published

2024-02-26

How to Cite

Modi, H., & Mistry, D. (2024). Security on Fingerprint Data Transfer System. COMPUSOFT: An International Journal of Advanced Computer Technology, 3(05), 783–787. Retrieved from https://ijact.in/index.php/j/article/view/139

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.