Back to Current Issues

Biometrics based Cryptographic Key Generation using Finger Print

Mrs. A. Ruba, Dr. G. Rajkumar, Dr. K. Parimala

N.M.S.S.Vellaichamy Nadar College, Madurai – 625019, Tamilnadu, India.
:10.22362/ijcert/2017/v4/i6/xxxx [UNDER PROCESS]

Accurate and automatic identification and verification of users are essential in all system. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart Cards are not presently adequate in few situations. What is necessary is a system that could authenticate that the person is the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the identification of a living person according to the physiological or behavioral features to be accepted without human involvement. The construction of cryptographic key from biometrics is used to make safe our system. To implement this concept, sender’s recent fingerprint would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are previously kept by receiver’s end, would be used.

Mrs. A. Ruba, Dr. G. Rajkumar, & Dr. K. Parimala. (2017). Biometrics based Cryptographic Key Generation using Finger Print. International Journal of Computer Engineering In Research Trends, 4(6), 259-262. Retrieved from

Keywords : Information Security, Biometrics, Cryptography, Encryption, Decryption, Cryptographic Key Generation

[1]	B. Raja Rao, Dr. E.V.V. Krishna Rao et al., “Finger Print Parameter based Cryptographic Key Generation”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 6, Nov – Dec, 2012, pp. 1598 – 1604.
[2]	Dr. G. Rajkumar, Dr. K. Parimala and Mrs. A. Ruba, “An Innovative Approach to Genetic Algorithm based Cryptography”, International Jouranl of Computer Science, Vol. 5, Issue 1, No 9, 2017,  Page No. 1199 – 1202.
[3]	N. Ratha and J. Connell et al. Cancelable biometrics: A case study in fingerprints. Intl. Conf. on Pattern Recognition, page 370C373, 2006 
[4]	N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614C634, 2001. 
[5]	Nanavati, S. Thieme, M. and Nanavati, R. Biometrics: Identity Verification in a Networked World. Wiley Computer Publishing, New York, 2002 
[6]	Saad Abuguba, Milan M. Milosavljevic, and Nemanja Macek, “An Efficient Approach to Generating Cryptographic keys from the face and Iris Biometrics fused at the feature level,” International Journal of Computer Science and Network Security, Vol. 15, No. 6, June 2015.
[7]	Sanjukta Pal, Sucharita Pal, Dr. Pranam Paul “Fingerprint Geometry matching by Divide and Conquer Strategy” accepted and published in International Journal of Advanced Research in Computer Science(IJARCS), ISSN No. 0976-5697, Volume 4, No. 4, March-April 2013.
[8]	T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005
[9]	Cryptography and Network Security Principles and Practices by William Stalling, Prentice Hall, 2005.
[10]	M.Sathya, & Dr.K.Thangadurai. (2017). Implementation of Optimization Using Eclat and PSO for Efficient Association Rule Mining. International Journal of Computer Engineering In Research Trends, 4(1), 4-8. Retrieved from

DOI Link : Not yet assigned

Download :

Refbacks : There are currently no refbacks

Quick Links


Science Central

Score: 13.30

Submit your paper to