International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 328

Research Paper | Information Technology | India | Volume 3 Issue 4, April 2014 | Popularity: 6.7 / 10


     

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar


Abstract: Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia-marking with false minutiae removal methods are used in the work. An alignment-based elastic matching algorithm has been developed for minutia matching. This algorithm is capable of finding the correspondences between input minutia pattern and the stored template minutia pattern without resorting to exhaustive search. Performance of the developed system is then evaluated on a database with fingerprints from different people.


Keywords: Cryptography, database toolbox, oracle, fingerprint, image enhancement, filtering, minutiae extraction, image post-processing, fingerprints matching and encryption using biometric key


Edition: Volume 3 Issue 4, April 2014


Pages: 418 - 421



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Abhishek Sharma, Narendra Kumar, "Encryption of Text Using Fingerprints as Input to Various Algorithms", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 418-421, https://www.ijsr.net/getabstract.php?paperid=20131461, DOI: https://www.doi.org/10.21275/20131461



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 5, May 2023

Pages: 2681 - 2682

Blockchain in Cloud Computing

Goutham Sabbani

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor, Laxmi Ahuja

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 1415 - 1423

Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud

Sandeep Chinamanagonda

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article
Top