Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security
نویسندگان
چکیده
منابع مشابه
Key Generation Using Genetic Algorithm for Image Encryption
Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. Now a day the security of digital images are major area of concern, especially when we deal with digital images where it may be stored or send through the communication channel. Genetic algorithms are a class of optimization...
متن کاملPlaintext Related Two-level Secret Key Image Encryption Scheme
Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-le...
متن کاملRaising Security of Fingerprint Biometric Systems- using Advanced Encryption Scheme
Securing biometrics databases from being compromised is major challenge, it must be overcome in order to support widespread use of biometrics based authentication. In this paper we present a cryptographic technique for enhanced security of fingerprint information using RC4 enrichment algorithm approach. RC4 algorithm is already used for image encryption. This paper is about encryption and decry...
متن کاملFour Level Image Encryption Using Scrambling and Key Based Methods
In this study, we present a novel image encryption algorithm based on four level hash based encryption. Our approach integrates scrambling scheme with hash based methods which masks the image signal and make it more secure. The resulting system can securely encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major advantages associated wit...
متن کاملBiometric Cryptosystem for VoIP Security using RSA Key Generation
-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Scientific Research in Science, Engineering and Technology
سال: 2018
ISSN: 2394-4099,2395-1990
DOI: 10.32628/ci004