Development of Crypto-Biometric System using Fingerprint And RSA Model for Secure Communication

Noel Moses Dogonyaro*, Waziri Onomza Victor**, Sheidu Kaka Jumai***
*-*** Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
Periodicity:September - November'2019
DOI : https://doi.org/10.26634/jit.8.4.17251

Abstract

A communication system is a system model that describes a communication exchange between two stations, transmitter and receiver. The application of cryptography is treated as the most effective solution to ensure the secure transmission of data. Cryptographic drawbacks cause such systems to cryptanalysis by malicious individuals, resulting in most data breaches. As an alternative, this system proposes a framework that provides solution to communication system by integrating biometrics with cryptography. The system developed makes use of the combination of public key RSA system with fingerprint, which is the most popularly used biometric. This research work ensures the security of messages communicated between the two users and the maintenance of a secure authentication mechanism. The developed system is based on privacy-preserving architecture. It could be used as an access control system as well as an internal communication mechanism for many organizations.

Keywords

Biometric, Communication, Decryption, Encryption, Security.

How to Cite this Article?

Dogonyaro, N. M., Victor, W. O., and Jumai, S. K. (2019). Development of Crypto-Biometric System using Fingerprint And RSA Model for Secure Communication. i-manager's Journal on Information Technology, 8(4), 33-41. https://doi.org/10.26634/jit.8.4.17251

References

[1]. Aanjanadevi, S., Palanisamy, V., & Aanjankumar, S. (2019, April). An improved method for generating biometric-cryptographic system from face feature. In 2019, 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1076-1079). IEEE. https://doi. org/10.1109/ICOEI.2019.8862741
[2]. Adamovic, S., Milosavljevic, M., Veinovic, M., Sarac, M., & Jevremovic, A. (2016). Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biometrics, 6(2), 89-96.
[3]. Afriyie, O. K., & Arkorful, V. (2019). Enhancing security of automated teller machines using biometric authentication: A case of a Sub-Saharan University. Researchgate Publication, 9(7), 7-22. https://doi.org/10. 7176/IKM/9-7-02
[4]. Aggarwal, D., & Maurer, U. (2016). Breaking RSA generically is equivalent to factoring. IEEE Transactions on Information Theory, 62(11), 6251-6259. https://doi.org/10. 1109/TIT.2016.2594197
[5]. Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 1, 1-17. https://doi.org/10.1186/s13635-015-0020-1
[6]. Chebotareva, A. A., Chebotarev, V. E., & Rozanov, A. S. (2018). Communication society and security: current t h r e a t s a n d l e g a l m a i n t e n a n c e. I n D i g i t a l Communication Management. IntechOpen. https://doi. org/10.5772/intechopen.75756
[7]. Dwivedi, R., Dey, S., Sharma, M. A., & Goel, A. (2019). A fingerprint based crypto-biometric system for secure communication. Journal of Ambient Intelligence and Humanized Computing, 1-15. https://doi.org/10.1007/ s12652-019-01437-5
[8]. Jin, Z., Teoh, A. B. J., Goi, B. M., & Tay, Y. H. (2016). Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recognition, 56, 50-62. https:// doi.org/10.1016/j.patcog.2016.02.024
[9]. Osho, O., Musa, F. A., Misra, S., Uduimoh, A. A., Adewunmi, A., & Ahuja, R. (2019, October). Absolute secure: A tri-layered data security system. In International Conference on Information and Software Technologies (pp. 243-255). Springer, Cham. https://doi.org/10.1007/ 978-3-030-30275-7_19
[10]. Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. (2014). A simple encryption and decryption system. In Conference: International Conference on Science, Technology, Education, Arts, Management and Social Sciences (ISTEAMS), Ado-Ekiti, Nigeria (pp. 77-84).
[11]. Saad, A. M. S. E. (2019, November). A Systematical review study to investigate the use of biometric security techniques in automatic teller machines: Insight from the st past 15 years. In 2019, 1 International Informatics and Software Engineering Conference (UBMYK) (pp. 1-4). IEEE. https://doi.org/10.1109/UBMYK48245.2019.8965494
[12]. Shenoy, K. M., & Shaikh, S. G. (2019, July). An Approach to secure data transmission through the use of cryptography and steganography. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 1039-1043). IEEE. https://doi.org/10.1109/ ICCES45898.2019.9002029
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.