Encryption Using Finger-Code Generated from Fingerprints
Title | Encryption Using Finger-Code Generated from Fingerprints |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ntshangase, C. S., Shabalala, M. B. |
Conference Name | 2018 Conference on Information Communications Technology and Society (ICTAS) |
ISBN Number | 978-1-5386-1001-5 |
Keywords | biometric encryption, biometric key, biometrics (access control), cryptographic key generation, cryptography, Elliptic curve cryptography, Encryption, encryption keys, finger-code, fingerprint, fingerprint features, Fingerprint recognition, fingerprint ridges, fingerprints, Length measurement, Metrics, minutiae, minutiae points, pubcrawl, resilience, Resiliency, Scalability, smart cards |
Abstract | In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication. |
URL | https://ieeexplore.ieee.org/document/8368743 |
DOI | 10.1109/ICTAS.2018.8368743 |
Citation Key | ntshangase_encryption_2018 |
- Fingerprint recognition
- smart cards
- Scalability
- Resiliency
- resilience
- pubcrawl
- minutiae points
- minutiae
- Metrics
- Length measurement
- fingerprints
- fingerprint ridges
- biometric encryption
- fingerprint features
- fingerprint
- finger-code
- encryption keys
- encryption
- Elliptic curve cryptography
- Cryptography
- cryptographic key generation
- biometrics (access control)
- biometric key