Downloads: 106 | Views: 361
Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.3 / 10
Data Protection Using Virtual Identity and Modified RSA
Rishin Ali K, Mohammed Aslam V.N
Abstract: This is a new system for protecting user data using integrated fingerprint template, virtual identity and modified RSA. In the process of fingerprint enrolment, two different fingerprints are used. The minutiae positions from one fingerprint, orientation from the other one and reference points from both fingers are used. Using unique coding technique an integrated minutiae template is generated from these two different fingerprints and stored in the database. This makes it more secure in case of a theft, it will be difficult for the attacker to distinguish the integrated template from the original template since their topology is similar. In the authentication process, system requires two query fingerprints from the same fingers which are used for the enrolment. Multi-stage fingerprint matching is proposed for matching the query fingerprints with the integrated minutiae template. We are selecting the fingerprints randomly and because of the altering to the integrated template we will be able to create a better new virtual identity. Features of the generated virtual identity is used to implement the modified RSA algorithm for the data protection. We can make the data protection technique unique for each and every user since the encryption and decryption of data is done using their fingerprint identity. This technique can be used for protecting various user data.
Keywords: Data protection, Fingerprint, Virtual identity, Modified RSA, Cryptography
Edition: Volume 4 Issue 6, June 2015
Pages: 2466 - 2469
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 130
Survey Paper, Electronics & Communication Engineering, India, Volume 4 Issue 3, March 2015
Pages: 352 - 355A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard
Yogita Verma, Neerja Dharmale
Downloads: 132
Research Paper, Electronics & Communication Engineering, India, Volume 5 Issue 2, February 2016
Pages: 969 - 974Reversible Encrypted Data Concealment in Encrypted Images by Reserving Room approach for Data Protection System
Sunayana A. Sutar, Ashish A. Zanjade