Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Generation Using Genetic Algorithm for Image Encryption

Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. Now a day the security of digital images are major area of concern, especially when we deal with digital images where it may be stored or send through the communication channel. Genetic algorithms are a class of optimization...

متن کامل

Plaintext Related Two-level Secret Key Image Encryption Scheme

Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-le...

متن کامل

Raising Security of Fingerprint Biometric Systems- using Advanced Encryption Scheme

Securing biometrics databases from being compromised is major challenge, it must be overcome in order to support widespread use of biometrics based authentication. In this paper we present a cryptographic technique for enhanced security of fingerprint information using RC4 enrichment algorithm approach. RC4 algorithm is already used for image encryption. This paper is about encryption and decry...

متن کامل

Four Level Image Encryption Using Scrambling and Key Based Methods

In this study, we present a novel image encryption algorithm based on four level hash based encryption. Our approach integrates scrambling scheme with hash based methods which masks the image signal and make it more secure. The resulting system can securely encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major advantages associated wit...

متن کامل

Biometric Cryptosystem for VoIP Security using RSA Key Generation

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Scientific Research in Science, Engineering and Technology

سال: 2018

ISSN: 2394-4099,2395-1990

DOI: 10.32628/ci004