Visible to the public Encryption Using Finger-Code Generated from Fingerprints

TitleEncryption Using Finger-Code Generated from Fingerprints
Publication TypeConference Paper
Year of Publication2018
AuthorsNtshangase, C. S., Shabalala, M. B.
Conference Name2018 Conference on Information Communications Technology and Society (ICTAS)
ISBN Number978-1-5386-1001-5
Keywordsbiometric encryption, biometric key, biometrics (access control), cryptographic key generation, cryptography, Elliptic curve cryptography, Encryption, encryption keys, finger-code, fingerprint, fingerprint features, Fingerprint recognition, fingerprint ridges, fingerprints, Length measurement, Metrics, minutiae, minutiae points, pubcrawl, resilience, Resiliency, Scalability, smart cards
Abstract

In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication.

URLhttps://ieeexplore.ieee.org/document/8368743
DOI10.1109/ICTAS.2018.8368743
Citation Keyntshangase_encryption_2018