SlideShare a Scribd company logo
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
DOI : 10.5121/ijasuc.2010.1404 38
Generate a key for MAC Algorithm using
Biometric Fingerprint
Dr.R.Seshadri1
and T.Raghu Trivedi2
1
Director, University Computer Center, S.V. University, Tirupathi, Andhra Pradesh,India.
ravalaseshadri@gmail.com
2
Research Scholar, University Computer Center, S.V. University, Tirupathi, Andhra
Pradesh,India.
tamirisa_t1@yahoo.com
Abstract
One of Authentication technique involves the use of a secret key to generate a small fixed size block of data
known as cryptographic checksum or MAC that is appended to the message.
The unauthorized thefts in our society have made the requirement for reliable information security
mechanisms. Information security can be accomplished with the help of a prevailing tool like cryptography,
protecting the cryptographic keys is one of the significant issues to be deal with. Here we proposed a
biometric-crypto system which generates a cryptographic key from the Finger prints for calculating the
MAC value of the information we considered fingerprint because it is unique and permanent through out a
person’s life.
Key words MAC, Fingerprint, Encryption, Decryption, Minutiae point, ROI.
1. Introduction
Message authentication code is a public function of the message and a secret key that produces a
fixed length value that serves as the authenticator. Protecting the secret key is major issue.we are
going to use the biometrics for generating /protecting the secret key. A fingerprint is made of a
number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments
of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge
endings and ridge bifurcations. Many types of minutiae exist, including dots. The uniqueness of
a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.
There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops
make up 60% of all fingerprints, whorls account for 30%, and arches for 10%.Fingerprints are
usually considered to be unique, with no two fingers having the exact same dermal ridge
characteristics. Here we use Novel method of biometrics based key generation technique.
Biometric crypto systems can operate in one of the following three modes 1.Key Release 2.Key
binding 3.Key generation. Here we use the key generation mode in which the key is derived
directly from the biometric data and is not stored in the data base.
2. MAC
This is one of the message authentication techniques. This technique assumes that two
communicating parties, say A,B share a common secret key k when A has a message to send to B,
it calculates the MAC as a function of the message and the key MAC=Ck((M). The message plus
MAC are transmitted to the intended recipient. The recipient performs the same calculation on the
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
39
received message, using the same secret key, to generate a new MAC. The received MAC is
compared to the calculated MAC.
If we assume that the receiver and the sender know the identity of the secret key. If received MAC
matches the calculated MAC then receiver is assured that message has not been altered and the
message is from alleged sender. MAC functions similar to encryption one difference is MAC
algorithm need not be reversible , as it must for decryption .To provide confidentiality message is
encrypted before the MAC algorithm .Here we need two separate keys, each of which shared by
sender and receiver [1] .
Figure1.Encryption and Decryption
3. How does fingerprint biometrics work
Maintaing and sharing the lengthy keys is critical problem. This can be overcome with the help of
biometric system [2].Here we will use finger print.
The main technologies used to capture the fingerprint image with sufficient detail are optical,
silicon, and ultrasound. There are two main algorithm families to recognize fingerprints:
K2
C
Compare
D M
K2
EK2[M]
CK1EK2[M]
K1
Receiver
K1
M ||
M
C
EK2[M]
CK1EK2[M]
Sender
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
40
Minutia matching compares specific details within the fingerprint ridges. At registration (also
called enrollment), the minutia points are located, together with their relative positions to each
other and their directions. At the matching stage, the fingerprint image is processed to extract its
minutia points, which are then compared with the registered template.
Pattern matching compares the overall characteristics of the fingerprints, not only individual
points. Fingerprint characteristics can include sub-areas of certain interest including ridge
thickness, curvature, or density. During enrollment, small sections of the fingerprint and their
relative distances are extracted from the fingerprint. Areas of interest are the area around a minutia
point, areas with low curvature radius, and areas with unusual combinations of ridges.
Key vector Is formed based on minutiae points (ridge ending and ridge bifurcation)
4. Generating key vector from finger print
Step1: Capture finger print image
Step2: Minutiae points’ extraction.
Step3: Key vector generation.
For key generation we need following concepts
4.1 Minutiae Points Extraction from Fingerprints
It is supposed that fingerprints are distinct across individuals and across the fingers of a particular
individual [3]. Minutiae points are feature points extracted from a raw fingerprint image
A fingerprint can be defined as a pattern of ridges and valleys on the tip of the finger. A fingerprint
is therefore described by the distinctiveness of the local ridge features and their relationships.
Minutiae points denote these local ridge characteristics that appear either at a ridge ending or a
ridge bifurcation. The point where the ridge comes to an abrupt end is known as ridge ending and
the ridge bifurcation is denoted as the point where the ridge divides into two or more branches [3].
Minutiae points’ extraction involves
• Segmentation
• Image Enhancement
• Minutiae Extraction
4.1.1Segmentation
The first step in the minutiae points’ extraction is segmentation. The input fingerprint image is
segmented from the background to actually extract the region comprising the fingerprint.
Segmentation of an image represents the division or separation of the image into regions that have
similar attributes. At first, the image is pre-processed. The pre-processing phase includes
histogram equalization and Median filter. The pre-processed image is divided into blocks and
segmentation is carried out.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
41
4.1.1. a Histogram Equalization
Histogram equalization amplifies the local contrast of the images, particularly when they are
represented with very close contrast values. Intensity is distributed through the histogram with the
aid of this regulation. Histogram equalization converts the input image so that out put image
comprises a uniform distribution of intensities The histogram, after the histogram equalization
transforms all the range from 0 to 255 which results if enhanced visualization effect [4].
Figure2. Fingerprint image before and after Histogram Equalization
Median filter is a non-linear digital filtering methodology frequently employed to eliminate noise
from images or other signals.
Preprocessed fingerprint image is divided into non-overlapping blocks of size 16x16 followed by
the calculation of gradient of each block. The standard deviation of gradients in X and Y direction
is computed and summed. Eventually, the resultant value is compared against a threshold value. If
it is greater than the threshold value the block is filled with ones, otherwise the block is filled with
zeros.
Fig3.Segmentation
4.1.2Minutiae Points Extraction
Minutiae points are extracted as follows:
• Binarization
• Morphological Operations
• Minutiae points’ extraction
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
42
Initially, the enhanced image is binarized. After binarization, morphological operations are
performed on the image to remove the obstacles and noise from it. Finally, the minutiae points are
extracted using the approach discussed.
4.1.2.1Binarization
The binary images with only two levels of interest: The black pixels that denote ridges and the
white pixels that denote valleys are employed by almost all minutiae extraction algorithms. A grey
level image is translated into a binary image in the process of binarization, by which the contrast
between the ridges and valleys in a fingerprint image is improved. The grey-level value of every
pixel in the enhanced image is analyzed in the binarization process. Then, the pixel value is set to a
binary value one when the value is greater than the global threshold, or else a zero is set as the
pixel value.
Fig4. Finger print before and after binarization
4.1.2.2 Morphological Operation
This eliminates any obstacles and noise from image, later it removes unnecessary spurs, bridges
and line breaks
Then thinning process is performed to reduce the thickness of the lines so that the lines are only
represented except the other regions of the image. Clean operator, Hbreak operator, Spur operator
and Thinning are the morphological operators applied.
Figure5.Morphological operation
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
43
4.1.2.3 Minutiae points’ extraction
Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide.
uses an iterative, parallel thinning algorithm. In each scan of the full fingerprint image, the
algorithm marks down redundant pixels in each small image window (3x3). And finally removes
all those marked pixels after several scans. . Marking minutia point is relatively easy after
thinning. For each 3X3 window, if the central pixel is 1 and has exactly 3 one-value neighbors,
then the central pixel is a ridge branch. if the central pixel is 1 and has only 1 one –value
neighbors , then the central pixel is ridge ending. Suppose both the uppermost pixel with value 1
and the rightmost pixel with value 1 have another neighbor outside the 3X3 window, so the two
pixels will be marked as branches too. Actually only one branch is located in the small region. So a
check routine requiring that none of the neighbors of a branch are branches is added.
Figure6.Minutiae points
False Minutia Removal
False ridge breaks due to insufficient amount of ink and ridge cross-connections due to over inking
are not totally eliminated. This false minutia will significantly affect the accuracy of matching if
they are simply regarded as genuine minutia. So some mechanisms of removing false minutia are
essential to keep the fingerprint verification system effective.
Key vector generation
Using above discussion the Key is generated in following process
The minutiae points extracted from the fingerprint image are represented as follows
Mp=Minutiae point set
N= number minutiae points
Mpi ( xi , yi) = ith minutiae point with x,y Co-ordinates
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
44
Mp1
.
.
.
Mp1
J=1….m Pi ≠ Pj
Distance between two points pi, pj are calculated as
√ (xi -xj)2
+(yi - yj)2
After calculation of the distances the values are stored in vector as
D1
D2
Dn
Sort the above vector name it as V
V = [ v1 , v2 . . . vn ]
Now V is divided into two equal parts
Va = [ v1 , v2 . . . vn/2]
Vb = [ vn/2+1 , . . . vn]
Va and Vb are shuffled and stored in Sa and Sb
Sd = Sa U Sb
Convert the Sd into a matrix form of size √n/2 * √n/2 and name it Md
IKV = {Ki : P(K)}, i =1,...., |Sd|
(P1,Pj)
(P2 ,pj)
.
(pn,pj).
d11 . . . d1m
d21. . . d2m
dn1 . . . dnm
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
45
Where
P(k) = | SMij | mod 2,
SMij = Md i, j : i +size, j+ size, -1 <i, j <√Sd
5. Conclusion
Document transmission between systems that are in distributed environment is common task.
System should ensure the security and authentication. There are number of cryptographic
Techniques. MAC algorithm is used for authentication. Here we have proposed a method for
generation of secured key for MAC algorithm using Novel approach for finger based cryptography
system. The key has been generated using fingerprint patterns, which is stable through out person’s
lifetime. Password can be hacked by trial and error basis. But it is not possible to break the
biometrics based security system.
REFERENCES
[1]. William Stallings, “Cryptography and Network Security Principles and practice”, 2nd Edition,Prentice
Hall,
[2].Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K .Jain “Biometric Cryptosystems Issues and
Challenges” Proceedings of the IEEE 2004.
[3]. N.Lalithamani, K.P.Soman “Irrevocable Cryptographic Key Generation from Cancelable Fingerprint
Templates: An Enhanced and Effective Scheme”. European Journal of Scientific Research ISSN 1450-216X
Vol.31 No.3 (2009), pp.372-387
[4] Jain, A.K.; Prabhakar, S.; Hong, L.; Pankanti, S., "Filter bank-based fingerprint matching”, IEEE
Transactions on Image Processing, vol. 9, no. 5, pp: 846-859, May 2000, Doi:10.1109/83.841531.
[5] P.Arul, Dr.A.Shanmugam “Generate a Key for AES Using Biometric For VOIP Network Security”
Journal of Theoretical and Applied Information Technology 2009.107-112.
Authors
Dr.R.Seshadri was born in Andhra Pradesh, India, in 1959. He received his
B.Tech degree from Nagarjuna University in 1981. He completed his Masters
degree in Control System Engineering from PSG College of Technology,
Coimbatore in 1984. He was awarded with PhD from Sri Venkateswara
University, Tirupati in 1998. He is currently Director, Computer Center,
S.V.University,Tirupati, India. He published number of papers in national and
international journals.
Mr.T.RaghuTrivedi received MCA degree from Andhra University, Vizag He
received his M.Tech in Computer Science from Nagarjuna University.He is a
research scholor in S.V.University,Tirupathi, Andhra Pradesh.

More Related Content

What's hot (19)

Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
IJRAT
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
idescitation
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
IJTET Journal
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
ijcisjournal
 
I010244853
I010244853I010244853
I010244853
IOSR Journals
 
El4301832837
El4301832837El4301832837
El4301832837
IJERA Editor
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
Dr. Vinayak Bharadi
 
A Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher ImplementationA Fingerprint Pattern Approach to Hill Cipher Implementation
A Fingerprint Pattern Approach to Hill Cipher Implementation
Universitas Pembangunan Panca Budi
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Publishing House
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
IJERA Editor
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a review
eSAT Journals
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walsh
Dr. Vinayak Bharadi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
L0816166
L0816166L0816166
L0816166
IOSR Journals
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Editor Jacotech
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
IJRAT
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
idescitation
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
IJTET Journal
 
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
An Optimized Approach for Fake Currency Detection Using Discrete Wavelet Tran...
ijcisjournal
 
Successive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature RecognitionSuccessive Geometric Center Based Dynamic Signature Recognition
Successive Geometric Center Based Dynamic Signature Recognition
Dr. Vinayak Bharadi
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Publishing House
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a review
eSAT Journals
 
Online signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walshOnline signature recognition using sectorization of complex walsh
Online signature recognition using sectorization of complex walsh
Dr. Vinayak Bharadi
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
Eswar Publications
 
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Analysis and Implementation Image Segmentation Through k-mean Algorithm with ...
Editor Jacotech
 

Similar to Generate a key for MAC Algorithm using Biometric Fingerprint (20)

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
Er. Arpit Sharma
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
IJET - International Journal of Engineering and Techniques
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
KARTHIKEYAN V
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
IOSR Journals
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprints
Juhi Khandelwal
 
1834 1840
1834 18401834 1840
1834 1840
Editor IJARCET
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
IJERA Editor
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
INFOGAIN PUBLICATION
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
idescitation
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
ijfcstjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
Er. Arpit Sharma
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
KARTHIKEYAN V
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
IOSR Journals
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprints
Juhi Khandelwal
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
 
14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...14 offline signature verification based on euclidean distance using support v...
14 offline signature verification based on euclidean distance using support v...
INFOGAIN PUBLICATION
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
idescitation
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
SEGMENTATION AND RECOGNITION OF HANDWRITTEN DIGIT NUMERAL STRING USING A MULT...
ijfcstjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 

Recently uploaded (20)

How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
Not So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java WebinarNot So Common Memory Leaks in Java Webinar
Not So Common Memory Leaks in Java Webinar
Tier1 app
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...Explaining GitHub Actions Failures with Large Language Models Challenges, In...
Explaining GitHub Actions Failures with Large Language Models Challenges, In...
ssuserb14185
 
Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025Adobe After Effects Crack FREE FRESH version 2025
Adobe After Effects Crack FREE FRESH version 2025
kashifyounis067
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRYLEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
LEARN SEO AND INCREASE YOUR KNOWLDGE IN SOFTWARE INDUSTRY
NidaFarooq10
 
The Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdfThe Significance of Hardware in Information Systems.pdf
The Significance of Hardware in Information Systems.pdf
drewplanas10
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
How Valletta helped healthcare SaaS to transform QA and compliance to grow wi...
Egor Kaleynik
 
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...
Andre Hora
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
Expand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchangeExpand your AI adoption with AgentExchange
Expand your AI adoption with AgentExchange
Fexle Services Pvt. Ltd.
 
Automation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath CertificateAutomation Techniques in RPA - UiPath Certificate
Automation Techniques in RPA - UiPath Certificate
VICTOR MAESTRE RAMIREZ
 
Download Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With LatestDownload Wondershare Filmora Crack [2025] With Latest
Download Wondershare Filmora Crack [2025] With Latest
tahirabibi60507
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 

Generate a key for MAC Algorithm using Biometric Fingerprint

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 DOI : 10.5121/ijasuc.2010.1404 38 Generate a key for MAC Algorithm using Biometric Fingerprint Dr.R.Seshadri1 and T.Raghu Trivedi2 1 Director, University Computer Center, S.V. University, Tirupathi, Andhra Pradesh,India. [email protected] 2 Research Scholar, University Computer Center, S.V. University, Tirupathi, Andhra Pradesh,India. [email protected] Abstract One of Authentication technique involves the use of a secret key to generate a small fixed size block of data known as cryptographic checksum or MAC that is appended to the message. The unauthorized thefts in our society have made the requirement for reliable information security mechanisms. Information security can be accomplished with the help of a prevailing tool like cryptography, protecting the cryptographic keys is one of the significant issues to be deal with. Here we proposed a biometric-crypto system which generates a cryptographic key from the Finger prints for calculating the MAC value of the information we considered fingerprint because it is unique and permanent through out a person’s life. Key words MAC, Fingerprint, Encryption, Decryption, Minutiae point, ROI. 1. Introduction Message authentication code is a public function of the message and a secret key that produces a fixed length value that serves as the authenticator. Protecting the secret key is major issue.we are going to use the biometrics for generating /protecting the secret key. A fingerprint is made of a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings and ridge bifurcations. Many types of minutiae exist, including dots. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%.Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics. Here we use Novel method of biometrics based key generation technique. Biometric crypto systems can operate in one of the following three modes 1.Key Release 2.Key binding 3.Key generation. Here we use the key generation mode in which the key is derived directly from the biometric data and is not stored in the data base. 2. MAC This is one of the message authentication techniques. This technique assumes that two communicating parties, say A,B share a common secret key k when A has a message to send to B, it calculates the MAC as a function of the message and the key MAC=Ck((M). The message plus MAC are transmitted to the intended recipient. The recipient performs the same calculation on the
  • 2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 39 received message, using the same secret key, to generate a new MAC. The received MAC is compared to the calculated MAC. If we assume that the receiver and the sender know the identity of the secret key. If received MAC matches the calculated MAC then receiver is assured that message has not been altered and the message is from alleged sender. MAC functions similar to encryption one difference is MAC algorithm need not be reversible , as it must for decryption .To provide confidentiality message is encrypted before the MAC algorithm .Here we need two separate keys, each of which shared by sender and receiver [1] . Figure1.Encryption and Decryption 3. How does fingerprint biometrics work Maintaing and sharing the lengthy keys is critical problem. This can be overcome with the help of biometric system [2].Here we will use finger print. The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound. There are two main algorithm families to recognize fingerprints: K2 C Compare D M K2 EK2[M] CK1EK2[M] K1 Receiver K1 M || M C EK2[M] CK1EK2[M] Sender
  • 3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 40 Minutia matching compares specific details within the fingerprint ridges. At registration (also called enrollment), the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template. Pattern matching compares the overall characteristics of the fingerprints, not only individual points. Fingerprint characteristics can include sub-areas of certain interest including ridge thickness, curvature, or density. During enrollment, small sections of the fingerprint and their relative distances are extracted from the fingerprint. Areas of interest are the area around a minutia point, areas with low curvature radius, and areas with unusual combinations of ridges. Key vector Is formed based on minutiae points (ridge ending and ridge bifurcation) 4. Generating key vector from finger print Step1: Capture finger print image Step2: Minutiae points’ extraction. Step3: Key vector generation. For key generation we need following concepts 4.1 Minutiae Points Extraction from Fingerprints It is supposed that fingerprints are distinct across individuals and across the fingers of a particular individual [3]. Minutiae points are feature points extracted from a raw fingerprint image A fingerprint can be defined as a pattern of ridges and valleys on the tip of the finger. A fingerprint is therefore described by the distinctiveness of the local ridge features and their relationships. Minutiae points denote these local ridge characteristics that appear either at a ridge ending or a ridge bifurcation. The point where the ridge comes to an abrupt end is known as ridge ending and the ridge bifurcation is denoted as the point where the ridge divides into two or more branches [3]. Minutiae points’ extraction involves • Segmentation • Image Enhancement • Minutiae Extraction 4.1.1Segmentation The first step in the minutiae points’ extraction is segmentation. The input fingerprint image is segmented from the background to actually extract the region comprising the fingerprint. Segmentation of an image represents the division or separation of the image into regions that have similar attributes. At first, the image is pre-processed. The pre-processing phase includes histogram equalization and Median filter. The pre-processed image is divided into blocks and segmentation is carried out.
  • 4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 41 4.1.1. a Histogram Equalization Histogram equalization amplifies the local contrast of the images, particularly when they are represented with very close contrast values. Intensity is distributed through the histogram with the aid of this regulation. Histogram equalization converts the input image so that out put image comprises a uniform distribution of intensities The histogram, after the histogram equalization transforms all the range from 0 to 255 which results if enhanced visualization effect [4]. Figure2. Fingerprint image before and after Histogram Equalization Median filter is a non-linear digital filtering methodology frequently employed to eliminate noise from images or other signals. Preprocessed fingerprint image is divided into non-overlapping blocks of size 16x16 followed by the calculation of gradient of each block. The standard deviation of gradients in X and Y direction is computed and summed. Eventually, the resultant value is compared against a threshold value. If it is greater than the threshold value the block is filled with ones, otherwise the block is filled with zeros. Fig3.Segmentation 4.1.2Minutiae Points Extraction Minutiae points are extracted as follows: • Binarization • Morphological Operations • Minutiae points’ extraction
  • 5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 42 Initially, the enhanced image is binarized. After binarization, morphological operations are performed on the image to remove the obstacles and noise from it. Finally, the minutiae points are extracted using the approach discussed. 4.1.2.1Binarization The binary images with only two levels of interest: The black pixels that denote ridges and the white pixels that denote valleys are employed by almost all minutiae extraction algorithms. A grey level image is translated into a binary image in the process of binarization, by which the contrast between the ridges and valleys in a fingerprint image is improved. The grey-level value of every pixel in the enhanced image is analyzed in the binarization process. Then, the pixel value is set to a binary value one when the value is greater than the global threshold, or else a zero is set as the pixel value. Fig4. Finger print before and after binarization 4.1.2.2 Morphological Operation This eliminates any obstacles and noise from image, later it removes unnecessary spurs, bridges and line breaks Then thinning process is performed to reduce the thickness of the lines so that the lines are only represented except the other regions of the image. Clean operator, Hbreak operator, Spur operator and Thinning are the morphological operators applied. Figure5.Morphological operation
  • 6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 43 4.1.2.3 Minutiae points’ extraction Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. uses an iterative, parallel thinning algorithm. In each scan of the full fingerprint image, the algorithm marks down redundant pixels in each small image window (3x3). And finally removes all those marked pixels after several scans. . Marking minutia point is relatively easy after thinning. For each 3X3 window, if the central pixel is 1 and has exactly 3 one-value neighbors, then the central pixel is a ridge branch. if the central pixel is 1 and has only 1 one –value neighbors , then the central pixel is ridge ending. Suppose both the uppermost pixel with value 1 and the rightmost pixel with value 1 have another neighbor outside the 3X3 window, so the two pixels will be marked as branches too. Actually only one branch is located in the small region. So a check routine requiring that none of the neighbors of a branch are branches is added. Figure6.Minutiae points False Minutia Removal False ridge breaks due to insufficient amount of ink and ridge cross-connections due to over inking are not totally eliminated. This false minutia will significantly affect the accuracy of matching if they are simply regarded as genuine minutia. So some mechanisms of removing false minutia are essential to keep the fingerprint verification system effective. Key vector generation Using above discussion the Key is generated in following process The minutiae points extracted from the fingerprint image are represented as follows Mp=Minutiae point set N= number minutiae points Mpi ( xi , yi) = ith minutiae point with x,y Co-ordinates
  • 7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 44 Mp1 . . . Mp1 J=1….m Pi ≠ Pj Distance between two points pi, pj are calculated as √ (xi -xj)2 +(yi - yj)2 After calculation of the distances the values are stored in vector as D1 D2 Dn Sort the above vector name it as V V = [ v1 , v2 . . . vn ] Now V is divided into two equal parts Va = [ v1 , v2 . . . vn/2] Vb = [ vn/2+1 , . . . vn] Va and Vb are shuffled and stored in Sa and Sb Sd = Sa U Sb Convert the Sd into a matrix form of size √n/2 * √n/2 and name it Md IKV = {Ki : P(K)}, i =1,...., |Sd| (P1,Pj) (P2 ,pj) . (pn,pj). d11 . . . d1m d21. . . d2m dn1 . . . dnm
  • 8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010 45 Where P(k) = | SMij | mod 2, SMij = Md i, j : i +size, j+ size, -1 <i, j <√Sd 5. Conclusion Document transmission between systems that are in distributed environment is common task. System should ensure the security and authentication. There are number of cryptographic Techniques. MAC algorithm is used for authentication. Here we have proposed a method for generation of secured key for MAC algorithm using Novel approach for finger based cryptography system. The key has been generated using fingerprint patterns, which is stable through out person’s lifetime. Password can be hacked by trial and error basis. But it is not possible to break the biometrics based security system. REFERENCES [1]. William Stallings, “Cryptography and Network Security Principles and practice”, 2nd Edition,Prentice Hall, [2].Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K .Jain “Biometric Cryptosystems Issues and Challenges” Proceedings of the IEEE 2004. [3]. N.Lalithamani, K.P.Soman “Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme”. European Journal of Scientific Research ISSN 1450-216X Vol.31 No.3 (2009), pp.372-387 [4] Jain, A.K.; Prabhakar, S.; Hong, L.; Pankanti, S., "Filter bank-based fingerprint matching”, IEEE Transactions on Image Processing, vol. 9, no. 5, pp: 846-859, May 2000, Doi:10.1109/83.841531. [5] P.Arul, Dr.A.Shanmugam “Generate a Key for AES Using Biometric For VOIP Network Security” Journal of Theoretical and Applied Information Technology 2009.107-112. Authors Dr.R.Seshadri was born in Andhra Pradesh, India, in 1959. He received his B.Tech degree from Nagarjuna University in 1981. He completed his Masters degree in Control System Engineering from PSG College of Technology, Coimbatore in 1984. He was awarded with PhD from Sri Venkateswara University, Tirupati in 1998. He is currently Director, Computer Center, S.V.University,Tirupati, India. He published number of papers in national and international journals. Mr.T.RaghuTrivedi received MCA degree from Andhra University, Vizag He received his M.Tech in Computer Science from Nagarjuna University.He is a research scholor in S.V.University,Tirupathi, Andhra Pradesh.