Visible to the public "Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"Conflict Detection Enabled

Title"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Publication TypeConference Paper
Year of Publication2015
AuthorsP. Dahake, S. Nimbhorkar
Conference Name2015 International Conference on Pervasive Computing (ICPC)
Date PublishedJan
PublisherIEEE
ISBN Number 978-1-4799-6272-3
Accession Number15058330
Keywordsauthentication, authentication purpose, authorisation, Biomedical imaging, biometric fingerprint, biometrics (access control), Compression, confidential information, cryptography, data communication, data compression, data hiding encryption, Encryption, encryption purpose, Fingerprint recognition, human being, hybrid cryptosystem, Image coding, image compression, image data integrity, image integrity, image lossless compression technique, image parameter, image security, key generation, mosaic image, PSNR, pubcrawl170102, secret fragment visible mosaic image method, secure image transmission, transmission, user authentication
Abstract

Integrity of image data plays an important role in data communication. Image data contain confidential information so it is very important to protect data from intruder. When data is transmitted through the network, there may be possibility that data may be get lost or damaged. Existing system does not provide all functionality for securing image during transmission. i.e image compression, encryption and user authentication. In this paper hybrid cryptosystem is proposed in which biometric fingerprint is used for key generation which is further useful for encryption purpose. Secret fragment visible mosaic image method is used for secure transmission of image. For reducing the size of image lossless compression technique is used which leads to the fast transmission of image data through transmission channel. The biometric fingerprint is useful for authentication purpose. Biometric method is more secure method of authentication because it requires physical presence of human being and it is untraceable.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7087177&isnumber=7086957
DOI10.1109/PERVASIVE.2015.7087177
Citation Key7087177