Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points

被引:0
|
作者
Anagreh, Mohammad Fawaz [1 ]
Hilal, Anwer Mustafa [1 ,2 ]
Ahmed, Tarig Mohamed [1 ,3 ]
机构
[1] Prince Sattam Bin Abdulaziz Univ, Dept Comp & Self Dev, Kharj, Saudi Arabia
[2] Omdurman Islamic Univ, Fac Comp Sci & Informat Technol, Khartoum, Sudan
[3] Univ Khartoum, Dept Comp Sci, Khartoum, Sudan
关键词
IP; cryptography; fingerprint; minutiae Advance Encryption Standard (AES); RSA; information security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES key is generated from Minutiae Points in fingerprint. By other way, we talk about biometric-cryptosystem, which is hybrid between one of the cryptosystems and biometric systems, such as fingerprint using for authentication as well as to generate cryptographic key to encrypt voice over IP by applying AES. In this paper, we define a new term which is Fingerprint Distribution Problem (FDP) based on Key Distribution Problem. Also, we suggest a solution for this problem by encrypted fingerprint before sending between users by using one of the public key cryptosystems which is RSA Algorithm.
引用
收藏
页码:151 / 154
页数:4
相关论文
共 17 条
  • [1] Directional Area Based Minutiae Selection and Cryptographic Key Generation Using Biometric Fingerprint
    Panchal, Gaurang
    Samanta, Debasis
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 491 - 499
  • [2] Fingerprint Cryptosystem Using Variable Selection of Minutiae Points
    Sandhya, Mulagala
    Dileep, Mulagala
    Murthy, Akurathi Narayana
    Misbahuddin, Md
    DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 : 359 - 369
  • [3] Fingerprint matching using minutiae coordinate systems
    Benhammadi, F
    Hentous, H
    Bey-Beghdad, K
    Aissani, M
    PATTERN RECOGNITION AND IMAGE ANALYSIS, PT 2, PROCEEDINGS, 2005, 3523 : 529 - 536
  • [4] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [5] Using Fingerprint Features as Personalized Cryptographic key in Personal Health Record Systems
    Ma Guoqiang
    Liu Juan
    Ni Bin
    CHINA COMMUNICATIONS, 2011, 8 (07) : 128 - 135
  • [6] Multibiometrics Approach on Biometric Passport Pictures by Using Fingerprint Minutiae Points
    Aygun, Sercan
    Akcay, Muammer
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 89 - 94
  • [7] A Novel Key Generation Scheme for Biometric Cryptosystems Using Fingerprint Minutiae
    Andalib, Ahmed Shayer
    Abdulla-Al-Shami, Md.
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [8] An Integrated Approach to Fingerprint Indexing Using Spectral Clustering Based on Minutiae Points
    Mngenge, Ntethelelo A.
    Mthembu, Linda
    Nelwamondo, Fulufhelo V.
    Ngejane, Cynthia H.
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1222 - 1229
  • [9] PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
    Krish, Ram P.
    Fierrez, Julian
    Ramos, Daniel
    Ortega-Garcia, Javier
    Bigun, Josef
    2ND INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF2014), 2014,
  • [10] A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters
    Basak, Sarnali
    Islam, Md. Imdadul
    Amin, M. R.
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2012, 8 (03): : 421 - 436