Crypto Key Generation using Contour Graph Algorithm

نویسندگان

  • M. S. Al-Tarawneh
  • Li Chin Khor
  • Wai Lok Woo
  • Satnam Singh Dlay
چکیده

Cryptography and biometrics have been identified as two of the most important aspects of digital security environment, for various types of security problems the merging between cryptography and biometrics has led to the development of Bio-Crypto technology. In this paper we propose a cryptography key generating methodology based on graph construction and adjacency matrix of extracted minutiae. The formation of graph relies on contour division of minutiae points area. Minutiae points area is studied on both scenarios (with singular point, and without singular point detection). Results show that with singular point detection the average of minutiae points area dimension is less than in the other case and at some points of threshold, it show an improvement performance comparing to the other one. 100% uniqueness key was achieved on both cases. Key-Words: Biometric, Fingerprint, Minutiae, Contouring, Adjacency matrix, String matching, Security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows

Logs are one of the most fundamental resources to any security professional. It is widely recognized by the government and private industry that it is both beneficial and desirable to share logs for the purpose of security research and network measurements. Rapid growth of the Internet and its applications, especially financial and security related services, require a secure and efficient way t...

متن کامل

Biometric Cryptosystem for VoIP Security using RSA Key Generation

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

متن کامل

A Modified Character Segmentation Algorithm for Farsi Printed Text Using Upper Contour Labelling

In this paper, a modified segmentation algorithm for printed Farsi words is presented. This algorithm is based on a previous work by Azmi that uses the conditional labeling of the upper contour to find the segmentation points. The main objective is to improve the segmentation results for low quality prints. To achieve this, various modifications on local baseline detection, contour labeling an...

متن کامل

A Recursive Algorithm for the Complete Representation of Salient Contour Paths in a Graph

The problem of computing salient contour groupings in an image is formulated as a graph search problem where the vertices of the graph are given by high-contrast smooth contour fragments and the arcs of the graph represent hypothesized contour singularities (corners and junctions) or hypothesized \invisible" contour fragments. Whereas previous approaches to this problem assume an additive cost ...

متن کامل

Elliptic Curve Crypto-processor

In this paper, we propose an elliptic curve key generation processor over GF(2 163 ) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture has been tested on an ISE 9.1 Software using...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006