6.1 AIMS AND OBJECTIVES
The aim of performing this research work into authenticity and security fields is to create acceptance for fingerprint based authentication cryptosystem, with the intentionally of meeting the trust and security requirements in any secure transmission and communications. The aims and objectives of this research work can be summarized as follows:
? To provide a better collaboration or the relationship between fingerprint image of a person and officials (like DBA), processing techniques and security approaches for cryptographic system based.
? To identify, describe and produce analysis of fingerprint image region of interest for authenticated features.
? To provide a better understanding of the fingerprint quality analysis threshold and to develop improved methods of authenticity, validity and quality estimation for functional fingerprint imaging.
? To facilitate the development of concerned methods for studying fingerprint in cryptography key infrastructure and to the incorporate authenticated fingerprint features extraction into cryptography system.
Fig 6.1. A Combined (Biometric Cryptosystem) System
(a) In password-based authentication: a cryptographic key is the “secret key” and the password is the “key.”
(b) In the fingerprint-based authentication system: a cryptographic key is the “secret key” and fingerprint is the “key” for next round of authentication.
In both the cases, the cryptographic key is released upon a successful authentication 11
? To the claimed this merging of biometric and cryptography for integration usage, and contribution addition in the field of Biometric crypto-system and security with bio within obtaining practical results and investigating Bio-crypt’s embedded results.
6.2 THESIS WORK
The proposed approach was implemented on the fingerprint database FVC2004-DB1, a public domain database with 400 images (100 fingers and 4 impressions each finger), cropped into 256×256 sizes, 500 dpi resolution. We apply the following step by step procedure and get authentic and correct result.
Fig 6.2: Pre-process Algorithm
If fingerprint not match
If fingerprint match with both’s templates
Fig 6.3: Biometric Cryptosystem with Fingerprint Authentication Algorithm
6.3 BIOMETRIC CRYPTOSYSTEM ALGORITHM
Input Query Fingerprint
if (Fingerprint matched with template)
then check the fingerprint of DBA’s / Authorized Person of Organization
if (Fingerprint matched)
// Again apply the cryptography key exchange scheme for authentication
Use Diffie-Hellman Key Exchange Algorithm
After process if K1=K2 then
// Permission for accessing all secret data or Keys
then print “You are an authorized person, please proceed”
Generate or Show Secret message/Cryptography key / any secret data
//The data generated to be used in concerned work and proceed further
else print “You are not an authorized person for the concerned work”
else print “Fake Input Query fingerprint Try Again”