6

6.1 AIMS AND OBJECTIVES

The aim of performing this research work into authenticity and security fields is to create acceptance for fingerprint based authentication cryptosystem, with the intentionally of meeting the trust and security requirements in any secure transmission and communications. The aims and objectives of this research work can be summarized as follows:

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

? To provide a better collaboration or the relationship between fingerprint image of a person and officials (like DBA), processing techniques and security approaches for cryptographic system based.
? To identify, describe and produce analysis of fingerprint image region of interest for authenticated features.
? To provide a better understanding of the fingerprint quality analysis threshold and to develop improved methods of authenticity, validity and quality estimation for functional fingerprint imaging.

? To facilitate the development of concerned methods for studying fingerprint in cryptography key infrastructure and to the incorporate authenticated fingerprint features extraction into cryptography system.

Key

Fig 6.1. A Combined (Biometric Cryptosystem) System
(a) In password-based authentication: a cryptographic key is the “secret key” and the password is the “key.”
(b) In the fingerprint-based authentication system: a cryptographic key is the “secret key” and fingerprint is the “key” for next round of authentication.

In both the cases, the cryptographic key is released upon a successful authentication 11

? To the claimed this merging of biometric and cryptography for integration usage, and contribution addition in the field of Biometric crypto-system and security with bio within obtaining practical results and investigating Bio-crypt’s embedded results.

6.2 THESIS WORK

The proposed approach was implemented on the fingerprint database FVC2004-DB1, a public domain database with 400 images (100 fingers and 4 impressions each finger), cropped into 256×256 sizes, 500 dpi resolution. We apply the following step by step procedure and get authentic and correct result.
STEP 1:

False

True

Fig 6.2: Pre-process Algorithm

STEP 2:

If fingerprint not match

If fingerprint match with both’s templates

Fig 6.3: Biometric Cryptosystem with Fingerprint Authentication Algorithm

6.3 BIOMETRIC CRYPTOSYSTEM ALGORITHM

Input Query Fingerprint
{
if (Fingerprint matched with template)
{
then check the fingerprint of DBA’s / Authorized Person of Organization
if (Fingerprint matched)
{
// Again apply the cryptography key exchange scheme for authentication
Use Diffie-Hellman Key Exchange Algorithm
After process if K1=K2 then
// Permission for accessing all secret data or Keys
then print “You are an authorized person, please proceed”
Generate or Show Secret message/Cryptography key / any secret data
//The data generated to be used in concerned work and proceed further
}
else print “You are not an authorized person for the concerned work”
}
else print “Fake Input Query fingerprint Try Again”
}

x

Hi!
I'm Dora

Would you like to get a custom essay? How about receiving a customized one?

Check it out
x

Hi!
I'm Barry!

Would you like to get a custom essay? How about receiving a customized one?

Check it out