SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering and Applied Sciences (IJEAS)
ISSN: 2394-3661, Volume-3, Issue-7, July 2016
34 www.ijeas.org

Abstract— The human fingerprint always becomes the way to
verify the originality of the ownership. It can be connected to the
security methods to increase the security level. Hill Cipher in
one of the cryptography algorithms that can attach the digital
fingerprint pattern. There are several matrix sizes to implement
its process. This study focuses to a 3 x 3 matrix in the
application. It provides nine integer numbers to perform the
encryption which determinant has already been tested before.
The concept is to link the digital fingerprint pattern to produce
the automatic key generator. Not all the determinant value can
get the ciphertext back to the original message. A threshold is
used to adjust the determinant. It produces the different
numbers when to be shifted. The correct numbers will be
occupied in the matrix. When the numbers are available, the
cryptography process can be performed.
Index Terms— Fingerprint, Hill Cipher, Cryptography,
Security.
I. INTRODUCTION
Fingerprint technique is one of the most important
authentication technologies based on the pattern of ridges and
valleys. Various applications are using this technology, but
the security problems are still not fully solved [3]. Hill cipher
uses a matrix to calulate the plaintext and produce the
ciphertext. It contains nine cells. Each cell is given the integer
number. These can be generated randomly. The purpose is
replacing the producing technique. The digital fingerprint
pattern is split into nine segments. After the image is getting
thresholded, it forms a binary pattern. Each segment consists
of the value of "0" and "1" where "0" represents the white
color and "1" to the black or vise verse. It depends on the
commitment. The total of the value becomes the number
inserted to each cell in matrix. The threshold becomes the
secondary key to produces the same numbers when
decrypting the ciphertext.
In the digital era, the picture can be used as evidence or a key
[2]. Hill Cipher can combine the static image to authenticate
the user. Static, here, means the fingerprint is not captured in
real time, but it has already captured as a picture. The
fingerprint sample is not necessary. The image is scaled to a
specific dimension. Several image processing steps are
needed to process the bitmap into the binary data. This project
alternatively aims to generate numbers without calculating the
determinant manually.
Andysah Putera Utama Siahaan, Faculty of Computer Science
Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei
Sikambing, 20122, Medan, Sumatera Utara, Indonesia
II. THEORIES
A.Digital Fingerprint
A pattern of the fingerprint is generated when the finger is
pressed against a smooth surface. The most obvious structural
characteristics of the fingerprint are ridges and valleys. They
often run parallel, but they may bifurcate or terminate
unexpectedly sometimes [3]. Fingerprints are the curved
pattern in the skin fingertips. These streaks are not similar
among human being although they are identical. So that
fingerprints can be used to identify a person validity.
Electronic scanners capture the fingerprints based on light
reflections of the finger's ridges and valleys, ultrasonic’s, or
the electrical properties of the finger's ridges and valleys [4].
Fig. 1 Ridges and Valleys
Figure 1 show the ridges and valleys on a fingerprint. The
fingerprint of every people is different. The fingerprint
pattern has a different region among the model. It creates
special shapes respectively. These areas may be classified
into three models such as loop, delta, and whorl (Figure 2).
Fig. 2 Special regions and core points
A Fingerprint Pattern Approach to Hill Cipher
Implementation
Andysah Putera Utama Siahaan
A Fingerprint Pattern Approach to Hill Cipher Implementation
35 www.ijeas.org
B. Hill Cipher
Hill Cipher is one of the symmetric key cryptographic
algorithms in data encryption [1]. To avoid the key matrix is
not invertible, matrix keys are generated using a binomial
coefficients newton. The encryption process and descriptions
use the same key. The plaintext itself may use image, audio or
text. Hill Cipher algorithm uses a matrix of m x m as a key for
encryption and decryption. The basic theory of matrix used in
Hill Cipher include the multiplication between the matrix and
perform the inverse of the matrix. It is an application of
cryptography modulo arithmetic.
Hill Cipher invented by Lester S. Hill in 1929 [5]. This
cryptographic technique was created to produce the cipher
text that cannot be solved by using frequency analysis
techniques. It does not replace the plaintext alphabet with
another for the same ciphertext. Hill Cipher is a block cipher
as well. The plaintext will be divided into several blocks of a
certain size. Each character in the block will affect the other
characters in the encryption and decryption process. The same
characters in plaintext are not mapped to the same character in
the ciphertext. Hill Cipher is the classic cryptographic
algorithm. It is very difficult to be solved by cryptanalyst if
they have the ciphertext only. However, this technique can be
solved quite easily when the cryptanalyst has the ciphertext
file and a plaintext file chunks. Cryptanalysis technique is
called known-plaintext attack [6].
III. PROPOSED WORK
In this step, it figures out how the method works. The
fingerprint is obtained from a scanner. The fingerprint image
must be converted into a grayscale picture because it does not
use a-three-layer color intensity. It must be cleaned from noise.
To do this, it has to convert the grayscale into a black and
white color mode. Afterward, the image is segmented into
nine sections. The limit of the segment is up to the
commitment. Since the fingerprint image is not square, the
segmentation is not square as well. The dimension of the
image is 120 x 180 pixels. The following figure is the image
taken by a scanner. It is still original. The color is all mixed.
There is no a threshold applied in the picture. The further
process is necessary.
Fig. 3 Original fingerprint
The image needs to be converted first. After the image has
been in the grayscale mode, it needs to convert it back to the
black and white. In this process, there a value to limit the color
intensity. It is called the threshold. After the processes are
done, the segmentation is carried out. Figure 4 illustrates the
segmentation after the image preprocessing. The amount of
the pixel in every segment is entirely different because the
shape of the finger is oval.
Fig. 4 Fingerprint segmentation
The fingerprint has nine segments. There are only two colors
in this stage such as red and white since it limits the color
intensity before.
Fig. 5 Numbered fingerprint segmentation
In Figure 5, there are nine segments. For example, in segment
number 1, there are many red pixels. Those indicate the value
will be used in Hill Cipher. Imagine that it contains 400 dots
in segment 5. This value has to face the modular expression to
make the number is suitable in Hill Cipher Process. Modulo
also adjusts the determinant to give the correct value. The
following formula explains how it works.
(1)
Where :
N : Integer Number
TP : Total pixel in a specific segment
TC : Maximum value of modular expression
The total pixel is obtained from how many red colors in the
segment. The computer program calculates the red pixel one
by one and store to the variable. It changes the pixels to
characters. The program changes the white color to “.” while
the red to “X” to make them clear. The following figure shows
a magnification of the fingerprint.
International Journal of Engineering and Applied Sciences (IJEAS)
ISSN: 2394-3661, Volume-3, Issue-7, July 2016
36 www.ijeas.org
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
........................................
...................................X.XX.
......................................XX
....................................X...
........................................
..............................X......X.X
...............................XX..X.XXX
...................................XXX..
.....................................X..
............................XX.X........
................................XX.....X
..............................X.XX.....X
.................................XXX.XXX
........................X.........XX.XXX
......................XXXXX.......XX....
............................XXXXXXX.X...
................................XXX.XXXX
.......................X.............XXX
....................X..X..XX....X.X.....
.........................X......X....XXX
............................X..XX....X..
...................XXXXX...XX..XX..XXXXX
....................XXXX...X.XXXXXXXXXXX
................XX...X........XX.XXX.XXX
.....................X.XX.......XXX....X
......................XXXXXXXXXXX.XXXX.X
.............X.XX.XX.XX.XX.X.XXXXXXXXXXX
.............XXXXXXXXXXX....XXXX.XXXXXXX
............X............XXXXXXXXXXX..X.
..........................XXXXXXXXXXXX.X
...............XX..XX.XXX..XXXX.XXXXXXXX
.......X...XXXX....XX.XX..XXXXX..XXX..XX
.................XXXXX.......XXXXXXX....
....................XXXXXXXXXXXXXXXXXXXX
...................XXX.XXXXXXXXXXXXXXX..
.............XXX..XXX.XXXXX...XXX.XXX..X
.......X.XX.XXXXX....XXXXXXXXX.XX.XX.XXX
.................XXXXXXXXX.XXX..XXXXX.XX
.........XX...X......XXXXX.XX...XX..X.XX
.........XX.XXXXXXXX..XXX....XXXXXXX.XXX
.............XX..XXXXXXXXX.XXXXXXXXXXXX.
.............X....X.X...XXXXX.X.XXXXXX..
..........XXXX.X...X..XXXXX...XXXXXXX..X
........X......XXXXXXXXXXXX...XXXXXXX.XX
........X........X.XXXXXXXXXXXX.X.XXXXXX
.........X..XXXXXX...XX..XXXXXXXXX...XXX
....X.......XXXXXX.XXX.XXXXXXX.XXXXXXXXX
..................XXXXXXXX.XX.X.XXXXXX.X
.........XXX.XXXXXXX..XXX.XXXXXX.XXX...X
.............XXXXXXX.XX.XX.XXXXXXXXX.XXX
........XX...X....X.XXX.XXX.XX...XXXXXXX
........XX.XXX.XXXXXXX..XXXXXX..X.X.XXXX
Figure 6. Extracted data from the first segment
Figure 6 illustrates the data is retrieved from the first segment.
Since it is at the edge of the finger, the shape is round as well.
It needs to count how many “X” in the figure. The value is
inserted into the cell respectively.
IV. EVALUATION
The best way to prove the method is through a test. Assume
the Hill Cipher key is now empty. There are three columns
and rows in every key. It has to complete the step for nine
times. Table 1 below shows that the matrix model before
insertion. X11
to X33
are the cells where the integer numbers
are located.
TABLE I HILL CIPHER KEY
Key
X11
X12
X13
X21
X22
X23
X31
X32
X33
The experiment runs with three kinds of threshold. The first
threshold is 50, the second is 125 and the last is 200. The three
pictures give the different shape.
Figure 6. (a) Threshold = 50, (b) Threshold = 125,
(c) Threshold = 200
The pictures in Figure 6 have the different display. The
calculation of the red pixel shows the different result as well.
The set of the first threshold (50) can be seen in Table 2. From
the fingerprint, it produces 204, 242, 227, 166, 248, 223, 112,
220 and 84.
TABLE II KEY OF THRESHOLD 50
Key
20
4
24
2
22
7
16
6
24
8
22
3
11
2
22
0
84
Determinant
-1103880
248
The set of the second threshold (125) is in Table 3. The
fingerprint calculation produces 124, 84, 91, 214, 209, 105,
241, 29 and 39.
A Fingerprint Pattern Approach to Hill Cipher Implementation
37 www.ijeas.org
TABLE III KEY OF THRESHOLD 125
Key
12
4
84 91
21
4
20
9
10
5
24
1
29 39
Determinant
-1961133
83
The set of the first threshold (200) generates 77, 242, 84, 163,
239, 241, 34, 235 and 220. It is in Table 4.
TABLE IV KEY OF THRESHOLD 200
Key
77
24
2
84
16
3
23
9
24
1
34
23
5
22
0
Determinant
-4472371
205
There are three determinants. Remember, not all determinant
work. Why? It is only useful if the computer generates the odd
number. Those determinants show two sections. The real
determinants are -1103880, -1961133 and -4472371 as
showed in Tabel 2 to Table 4. The numbers have to be
normalized by modulo them with the ASCII length; that is
256. The numbers will turn into the positive number. The
determinant can be the odd and even number. Since it
produces the even number, the value can return the plaintext.
It will fail if the decryption process is done. From those tables,
there are only two sets of keys can be used as the encryption
keys. There are in Table 3 and Table 4. Those numbers are
showing the odd number, 83 and 205. Decrypting the even
number, the computer faced the forever repetition.
The research does not include the encryption and decryption
process because our focus is only to generate the key using the
fingerprint pattern. The readers must have been familiar with
the Hill Cipher algorithm. The fingerprint image can simplify
the distress of the key store. The user does not have to
remember such numbers and just keep the picture and the
threshold value when doing the encryption and decryption
process.
V. CONCLUSION
There are many ways to construct the key in Hill Cipher. One
of the techniques is using an image and threshold. The
numbers are adjustable to get the correct determinant. The
fingerprint has a plurality of segments. It has a pattern which
consists of a collection of dark and white pixels. This situation
can be utilized to produce the Hill Cipher key. The threshold
can be set as desired to generate the specific numbers.
Afterward, the numbers can be inserted into the Hill Cipher
cells. By providing the correct threshold, the decryption
process can be carried out.
REFERENCES
[1] A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher
Encryption Technique,” International Journal of Science and
Research, vol. 5, no. 7, 2016.
[2] A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image
Encryption," International Journal of Computer Science and
Engineering, vol. 3, no. 7, pp. 1-6, 2016.
[3] L. H. Thai dan N. N. Tam, “Fingerprint Recognition Using
Standardized Fingerprint Model,” International Journal of Computer
Science, vol. 7, no. 3, pp. 11-17, 2010.
[4] S. S. Mudholkar, P. M. Shende dan M. V. Sarode, “Biometrics
Authentication Technique For Intrusion Detection Systems Using
Fingerprint Recognition,” International Journal of Computer Science,
Engineering and Information Technology, vol. 2, no. 1, pp. 57-65,
2012.
[5] B. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006.
[6] H. Anton dan C. Rorres, Elementary Linear Algebra, 2011: John Wiley
& Sons.
AUTHOR PROFILE
Andysah Putera Utama Siahaan was born in Medan,
Indonesia, in 1980. He received the S.Kom. degree in
computer science from Universitas Pembangunan
Panca Budi, Medan, Indonesia, in 2010, and the
M.Kom. in computer science as well from the
University of Sumatera Utara, Medan, Indonesia, in
2012. In 2010, he joined the Department of
Engineering, Universitas Pembangunan Panca Budi,
as a Lecturer, and in 2012 became a junior researcher. He is applying for his
Ph. D. degree in 2016. He has written in several international journal and
conference. He is now active in writing papers and joining conferences.

More Related Content

What's hot

A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingIJMTST Journal
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionIOSR Journals
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Gesture Recognition Based Mouse Events
Gesture Recognition Based Mouse EventsGesture Recognition Based Mouse Events
Gesture Recognition Based Mouse Eventsijcsit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Realitychirag patil
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging SystemVrushali Lanjewar
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methodsVrushali Lanjewar
 
El4301832837
El4301832837El4301832837
El4301832837IJERA Editor
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...ijcsit
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 

What's hot (18)

A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral RecognitionComparative study of two methods for Handwritten Devanagari Numeral Recognition
Comparative study of two methods for Handwritten Devanagari Numeral Recognition
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
B046030712
B046030712B046030712
B046030712
 
F0343545
F0343545F0343545
F0343545
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Gesture Recognition Based Mouse Events
Gesture Recognition Based Mouse EventsGesture Recognition Based Mouse Events
Gesture Recognition Based Mouse Events
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Reality
 
Performance Anaysis for Imaging System
Performance Anaysis for Imaging SystemPerformance Anaysis for Imaging System
Performance Anaysis for Imaging System
 
Comparison of thresholding methods
Comparison of thresholding methodsComparison of thresholding methods
Comparison of thresholding methods
 
El4301832837
El4301832837El4301832837
El4301832837
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
Project_2
Project_2Project_2
Project_2
 

Viewers also liked

The rail fence
The rail fenceThe rail fence
The rail fencegrahamwell
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionUniversitas Pembangunan Panca Budi
 
Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
Vernam Conjugated Manipulation of Bit-Plane Complexity SegmentationVernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
Vernam Conjugated Manipulation of Bit-Plane Complexity SegmentationUniversitas Pembangunan Panca Budi
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Universitas Pembangunan Panca Budi
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stjemillsunt
 
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm Universitas Pembangunan Panca Budi
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...Universitas Pembangunan Panca Budi
 
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round RobinComparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round RobinUniversitas Pembangunan Panca Budi
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Heuristic Programming in Scheduling Problem Using A* Algorithm
Heuristic Programming in Scheduling Problem Using A* AlgorithmHeuristic Programming in Scheduling Problem Using A* Algorithm
Heuristic Programming in Scheduling Problem Using A* AlgorithmUniversitas Pembangunan Panca Budi
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Swati Nagpal
 

Viewers also liked (20)

Rail Fence Cryptography in Securing Information
Rail Fence  Cryptography in Securing InformationRail Fence  Cryptography in Securing Information
Rail Fence Cryptography in Securing Information
 
The rail fence
The rail fenceThe rail fence
The rail fence
 
Factorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret NumbersFactorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret Numbers
 
Effect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video TransmissionEffect Through Broadcasting System Access Point for Video Transmission
Effect Through Broadcasting System Access Point for Video Transmission
 
Profile Matching in Solving Rank Problem
Profile Matching in Solving Rank ProblemProfile Matching in Solving Rank Problem
Profile Matching in Solving Rank Problem
 
Tuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy TsukamotoTuition Reduction Determination Using Fuzzy Tsukamoto
Tuition Reduction Determination Using Fuzzy Tsukamoto
 
The Understanding of GOST Cryptography Technique
The Understanding of GOST Cryptography TechniqueThe Understanding of GOST Cryptography Technique
The Understanding of GOST Cryptography Technique
 
Virtualization Approach: Theory and Application
Virtualization Approach: Theory and ApplicationVirtualization Approach: Theory and Application
Virtualization Approach: Theory and Application
 
Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
Vernam Conjugated Manipulation of Bit-Plane Complexity SegmentationVernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
 
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
Determination of Thesis Preceptor and Examiner Based on Specification of Teac...
 
Digi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1stDigi tek project fiona presentation may 1st
Digi tek project fiona presentation may 1st
 
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
 
A Three-Layer Visual Hash Function Using Adler-32
A Three-Layer Visual Hash Function Using Adler-32A Three-Layer Visual Hash Function Using Adler-32
A Three-Layer Visual Hash Function Using Adler-32
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...
Optimasi Penjadwalan Mata Kuliah Dengan Algoritma Genetika Pada Fakultas Ilmu...
 
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round RobinComparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin
Comparison Analysis of CPU Scheduling : FCFS, SJF and Round Robin
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
Heuristic Programming in Scheduling Problem Using A* Algorithm
Heuristic Programming in Scheduling Problem Using A* AlgorithmHeuristic Programming in Scheduling Problem Using A* Algorithm
Heuristic Programming in Scheduling Problem Using A* Algorithm
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 

Similar to A Fingerprint Pattern Approach to Hill Cipher Implementation

Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Editor IJMTER
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle usingijfcstjournal
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING cscpconf
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodIOSR Journals
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...IOSR Journals
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 

Similar to A Fingerprint Pattern Approach to Hill Cipher Implementation (20)

Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...Proposed Method for Off-line Signature Recognition and Verification using Neu...
Proposed Method for Off-line Signature Recognition and Verification using Neu...
 
Tracking number plate from vehicle using
Tracking number plate from vehicle usingTracking number plate from vehicle using
Tracking number plate from vehicle using
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
B017640811
B017640811B017640811
B017640811
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
Bangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection MethodBangla Optical Digits Recognition using Edge Detection Method
Bangla Optical Digits Recognition using Edge Detection Method
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

A Fingerprint Pattern Approach to Hill Cipher Implementation

  • 1. International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-3, Issue-7, July 2016 34 www.ijeas.org  Abstract— The human fingerprint always becomes the way to verify the originality of the ownership. It can be connected to the security methods to increase the security level. Hill Cipher in one of the cryptography algorithms that can attach the digital fingerprint pattern. There are several matrix sizes to implement its process. This study focuses to a 3 x 3 matrix in the application. It provides nine integer numbers to perform the encryption which determinant has already been tested before. The concept is to link the digital fingerprint pattern to produce the automatic key generator. Not all the determinant value can get the ciphertext back to the original message. A threshold is used to adjust the determinant. It produces the different numbers when to be shifted. The correct numbers will be occupied in the matrix. When the numbers are available, the cryptography process can be performed. Index Terms— Fingerprint, Hill Cipher, Cryptography, Security. I. INTRODUCTION Fingerprint technique is one of the most important authentication technologies based on the pattern of ridges and valleys. Various applications are using this technology, but the security problems are still not fully solved [3]. Hill cipher uses a matrix to calulate the plaintext and produce the ciphertext. It contains nine cells. Each cell is given the integer number. These can be generated randomly. The purpose is replacing the producing technique. The digital fingerprint pattern is split into nine segments. After the image is getting thresholded, it forms a binary pattern. Each segment consists of the value of "0" and "1" where "0" represents the white color and "1" to the black or vise verse. It depends on the commitment. The total of the value becomes the number inserted to each cell in matrix. The threshold becomes the secondary key to produces the same numbers when decrypting the ciphertext. In the digital era, the picture can be used as evidence or a key [2]. Hill Cipher can combine the static image to authenticate the user. Static, here, means the fingerprint is not captured in real time, but it has already captured as a picture. The fingerprint sample is not necessary. The image is scaled to a specific dimension. Several image processing steps are needed to process the bitmap into the binary data. This project alternatively aims to generate numbers without calculating the determinant manually. Andysah Putera Utama Siahaan, Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia II. THEORIES A.Digital Fingerprint A pattern of the fingerprint is generated when the finger is pressed against a smooth surface. The most obvious structural characteristics of the fingerprint are ridges and valleys. They often run parallel, but they may bifurcate or terminate unexpectedly sometimes [3]. Fingerprints are the curved pattern in the skin fingertips. These streaks are not similar among human being although they are identical. So that fingerprints can be used to identify a person validity. Electronic scanners capture the fingerprints based on light reflections of the finger's ridges and valleys, ultrasonic’s, or the electrical properties of the finger's ridges and valleys [4]. Fig. 1 Ridges and Valleys Figure 1 show the ridges and valleys on a fingerprint. The fingerprint of every people is different. The fingerprint pattern has a different region among the model. It creates special shapes respectively. These areas may be classified into three models such as loop, delta, and whorl (Figure 2). Fig. 2 Special regions and core points A Fingerprint Pattern Approach to Hill Cipher Implementation Andysah Putera Utama Siahaan
  • 2. A Fingerprint Pattern Approach to Hill Cipher Implementation 35 www.ijeas.org B. Hill Cipher Hill Cipher is one of the symmetric key cryptographic algorithms in data encryption [1]. To avoid the key matrix is not invertible, matrix keys are generated using a binomial coefficients newton. The encryption process and descriptions use the same key. The plaintext itself may use image, audio or text. Hill Cipher algorithm uses a matrix of m x m as a key for encryption and decryption. The basic theory of matrix used in Hill Cipher include the multiplication between the matrix and perform the inverse of the matrix. It is an application of cryptography modulo arithmetic. Hill Cipher invented by Lester S. Hill in 1929 [5]. This cryptographic technique was created to produce the cipher text that cannot be solved by using frequency analysis techniques. It does not replace the plaintext alphabet with another for the same ciphertext. Hill Cipher is a block cipher as well. The plaintext will be divided into several blocks of a certain size. Each character in the block will affect the other characters in the encryption and decryption process. The same characters in plaintext are not mapped to the same character in the ciphertext. Hill Cipher is the classic cryptographic algorithm. It is very difficult to be solved by cryptanalyst if they have the ciphertext only. However, this technique can be solved quite easily when the cryptanalyst has the ciphertext file and a plaintext file chunks. Cryptanalysis technique is called known-plaintext attack [6]. III. PROPOSED WORK In this step, it figures out how the method works. The fingerprint is obtained from a scanner. The fingerprint image must be converted into a grayscale picture because it does not use a-three-layer color intensity. It must be cleaned from noise. To do this, it has to convert the grayscale into a black and white color mode. Afterward, the image is segmented into nine sections. The limit of the segment is up to the commitment. Since the fingerprint image is not square, the segmentation is not square as well. The dimension of the image is 120 x 180 pixels. The following figure is the image taken by a scanner. It is still original. The color is all mixed. There is no a threshold applied in the picture. The further process is necessary. Fig. 3 Original fingerprint The image needs to be converted first. After the image has been in the grayscale mode, it needs to convert it back to the black and white. In this process, there a value to limit the color intensity. It is called the threshold. After the processes are done, the segmentation is carried out. Figure 4 illustrates the segmentation after the image preprocessing. The amount of the pixel in every segment is entirely different because the shape of the finger is oval. Fig. 4 Fingerprint segmentation The fingerprint has nine segments. There are only two colors in this stage such as red and white since it limits the color intensity before. Fig. 5 Numbered fingerprint segmentation In Figure 5, there are nine segments. For example, in segment number 1, there are many red pixels. Those indicate the value will be used in Hill Cipher. Imagine that it contains 400 dots in segment 5. This value has to face the modular expression to make the number is suitable in Hill Cipher Process. Modulo also adjusts the determinant to give the correct value. The following formula explains how it works. (1) Where : N : Integer Number TP : Total pixel in a specific segment TC : Maximum value of modular expression The total pixel is obtained from how many red colors in the segment. The computer program calculates the red pixel one by one and store to the variable. It changes the pixels to characters. The program changes the white color to “.” while the red to “X” to make them clear. The following figure shows a magnification of the fingerprint.
  • 3. International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-3, Issue-7, July 2016 36 www.ijeas.org ........................................ ........................................ ........................................ ........................................ ........................................ ........................................ ........................................ ........................................ ........................................ ...................................X.XX. ......................................XX ....................................X... ........................................ ..............................X......X.X ...............................XX..X.XXX ...................................XXX.. .....................................X.. ............................XX.X........ ................................XX.....X ..............................X.XX.....X .................................XXX.XXX ........................X.........XX.XXX ......................XXXXX.......XX.... ............................XXXXXXX.X... ................................XXX.XXXX .......................X.............XXX ....................X..X..XX....X.X..... .........................X......X....XXX ............................X..XX....X.. ...................XXXXX...XX..XX..XXXXX ....................XXXX...X.XXXXXXXXXXX ................XX...X........XX.XXX.XXX .....................X.XX.......XXX....X ......................XXXXXXXXXXX.XXXX.X .............X.XX.XX.XX.XX.X.XXXXXXXXXXX .............XXXXXXXXXXX....XXXX.XXXXXXX ............X............XXXXXXXXXXX..X. ..........................XXXXXXXXXXXX.X ...............XX..XX.XXX..XXXX.XXXXXXXX .......X...XXXX....XX.XX..XXXXX..XXX..XX .................XXXXX.......XXXXXXX.... ....................XXXXXXXXXXXXXXXXXXXX ...................XXX.XXXXXXXXXXXXXXX.. .............XXX..XXX.XXXXX...XXX.XXX..X .......X.XX.XXXXX....XXXXXXXXX.XX.XX.XXX .................XXXXXXXXX.XXX..XXXXX.XX .........XX...X......XXXXX.XX...XX..X.XX .........XX.XXXXXXXX..XXX....XXXXXXX.XXX .............XX..XXXXXXXXX.XXXXXXXXXXXX. .............X....X.X...XXXXX.X.XXXXXX.. ..........XXXX.X...X..XXXXX...XXXXXXX..X ........X......XXXXXXXXXXXX...XXXXXXX.XX ........X........X.XXXXXXXXXXXX.X.XXXXXX .........X..XXXXXX...XX..XXXXXXXXX...XXX ....X.......XXXXXX.XXX.XXXXXXX.XXXXXXXXX ..................XXXXXXXX.XX.X.XXXXXX.X .........XXX.XXXXXXX..XXX.XXXXXX.XXX...X .............XXXXXXX.XX.XX.XXXXXXXXX.XXX ........XX...X....X.XXX.XXX.XX...XXXXXXX ........XX.XXX.XXXXXXX..XXXXXX..X.X.XXXX Figure 6. Extracted data from the first segment Figure 6 illustrates the data is retrieved from the first segment. Since it is at the edge of the finger, the shape is round as well. It needs to count how many “X” in the figure. The value is inserted into the cell respectively. IV. EVALUATION The best way to prove the method is through a test. Assume the Hill Cipher key is now empty. There are three columns and rows in every key. It has to complete the step for nine times. Table 1 below shows that the matrix model before insertion. X11 to X33 are the cells where the integer numbers are located. TABLE I HILL CIPHER KEY Key X11 X12 X13 X21 X22 X23 X31 X32 X33 The experiment runs with three kinds of threshold. The first threshold is 50, the second is 125 and the last is 200. The three pictures give the different shape. Figure 6. (a) Threshold = 50, (b) Threshold = 125, (c) Threshold = 200 The pictures in Figure 6 have the different display. The calculation of the red pixel shows the different result as well. The set of the first threshold (50) can be seen in Table 2. From the fingerprint, it produces 204, 242, 227, 166, 248, 223, 112, 220 and 84. TABLE II KEY OF THRESHOLD 50 Key 20 4 24 2 22 7 16 6 24 8 22 3 11 2 22 0 84 Determinant -1103880 248 The set of the second threshold (125) is in Table 3. The fingerprint calculation produces 124, 84, 91, 214, 209, 105, 241, 29 and 39.
  • 4. A Fingerprint Pattern Approach to Hill Cipher Implementation 37 www.ijeas.org TABLE III KEY OF THRESHOLD 125 Key 12 4 84 91 21 4 20 9 10 5 24 1 29 39 Determinant -1961133 83 The set of the first threshold (200) generates 77, 242, 84, 163, 239, 241, 34, 235 and 220. It is in Table 4. TABLE IV KEY OF THRESHOLD 200 Key 77 24 2 84 16 3 23 9 24 1 34 23 5 22 0 Determinant -4472371 205 There are three determinants. Remember, not all determinant work. Why? It is only useful if the computer generates the odd number. Those determinants show two sections. The real determinants are -1103880, -1961133 and -4472371 as showed in Tabel 2 to Table 4. The numbers have to be normalized by modulo them with the ASCII length; that is 256. The numbers will turn into the positive number. The determinant can be the odd and even number. Since it produces the even number, the value can return the plaintext. It will fail if the decryption process is done. From those tables, there are only two sets of keys can be used as the encryption keys. There are in Table 3 and Table 4. Those numbers are showing the odd number, 83 and 205. Decrypting the even number, the computer faced the forever repetition. The research does not include the encryption and decryption process because our focus is only to generate the key using the fingerprint pattern. The readers must have been familiar with the Hill Cipher algorithm. The fingerprint image can simplify the distress of the key store. The user does not have to remember such numbers and just keep the picture and the threshold value when doing the encryption and decryption process. V. CONCLUSION There are many ways to construct the key in Hill Cipher. One of the techniques is using an image and threshold. The numbers are adjustable to get the correct determinant. The fingerprint has a plurality of segments. It has a pattern which consists of a collection of dark and white pixels. This situation can be utilized to produce the Hill Cipher key. The threshold can be set as desired to generate the specific numbers. Afterward, the numbers can be inserted into the Hill Cipher cells. By providing the correct threshold, the decryption process can be carried out. REFERENCES [1] A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and Research, vol. 5, no. 7, 2016. [2] A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016. [3] L. H. Thai dan N. N. Tam, “Fingerprint Recognition Using Standardized Fingerprint Model,” International Journal of Computer Science, vol. 7, no. 3, pp. 11-17, 2010. [4] S. S. Mudholkar, P. M. Shende dan M. V. Sarode, “Biometrics Authentication Technique For Intrusion Detection Systems Using Fingerprint Recognition,” International Journal of Computer Science, Engineering and Information Technology, vol. 2, no. 1, pp. 57-65, 2012. [5] B. Forouzan, Cryptography and Network Security, McGraw-Hill, 2006. [6] H. Anton dan C. Rorres, Elementary Linear Algebra, 2011: John Wiley & Sons. AUTHOR PROFILE Andysah Putera Utama Siahaan was born in Medan, Indonesia, in 1980. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and the M.Kom. in computer science as well from the University of Sumatera Utara, Medan, Indonesia, in 2012. In 2010, he joined the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2012 became a junior researcher. He is applying for his Ph. D. degree in 2016. He has written in several international journal and conference. He is now active in writing papers and joining conferences.