Loading

Cryptographic Security Approach for Biometric Verification System
Akinribido C.T1, Olabode O.O2, Adetunmbi O.A3, Adewumi Moradeke. Grace4

1Akinribido C.T, Department of Computer Science, Federal University, Oye Ekiti.

2Olabode O.O, Department of Computer Science, Federal University of Technology, Akure.

3Adetunmbi O.A, Department of Computer Science, Federal University of Technology, Akure.

4Adewumi Moradeke. Grace, Department of Computer Science, Bamidele Olumilua University of Education, Science and Technology, Ikere – Ekiti.

Manuscript received on 03 July 2023 | Revised Manuscript received on 07 November 2023 | Manuscript Accepted on 15 November 2023 | Manuscript published on 30 December 2023 | PP: 7-13 | Volume-3 Issue-2, November 2023 | Retrieval Number: 100.1/ijcns.C78540912323 | DOI: 10.54105/ijcns.C7854.113223

Open Access | Ethics and Policies | Cite | Zenodo | Indexing and Abstracting
© The Authors. Published by Lattice Science Publication (LSP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.

Keywords: Cryptography, Verification, Fingerprint, Pixel Value
Scope of the Article: Cryptographic Protocols