SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
DOI : 10.5121/ijnsa.2011.3209 111
A NOVEL DATA ENCRYPTION TECHNIQUE BY
GENETIC CROSSOVER OF ROBUST BIOMETRIC
KEY AND SESSION BASED PASSWORD
Tanmay Bhattacharya1
, Sirshendu Hore 2
, Ayan Mukherjee 3
and
S. R. Bhadra Chaudhuri
4
1
Sr. Lecturer, Dept. of IT, JIS College Engineering, Kalyani,
West Bengal, India.
tb.jisce@gmail.com
2
Lecturer, Dept. of CSE, Hooghly Engineering & Technology College,
Pipulpati,Hooghly, West Bengal, India.
shirshendu_hore@yahoo.com
3
Lecturer, Dept. of CSE, Institute of Science & Technology, Chandrakona
Town,Paschim Medinipur, West Bengal, India.
ayanmca@gmail.com
4
Professor, Dept. of E&TC Engg., Bengal Engineering & Science University, Shibpur,
Howrah, West Bengal, India.
prof.srbc@gmail.com
ABSTRACT
In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used
later on for the purpose of authentication. So this process does not provide very high security. This paper
proposes another level of security by using the concept of combined key. The key is obtained by crossing
over of the Session key generated from the password given by the legitimate user and the Biometric key
generated from the fingerprint of the same user. The proposed approach trained the system by Artificial
Neural Network in such a way that a small portion of the fingerprint is enough to generate the Biometric
key which minimizes the chance of false rejection. So in this approach there is a significant improvement
of the traditional authentication techniques.
KEYWORDS
ANN; Minutiae; Sessionbased; Training; SHA-512, Crossover;
1. INTRODUCTION
Fingerprints have long been used in the identification of individuals because of a well-known
fact that each person has a unique fingerprint. Classification is usually performed by noting
certain features. The lines that flow in various patterns across fingerprints are called ridges
and the spaces between ridges are valleys. The three basic patterns of fingerprint ridges are
Arch, Loop, and Whorl. Minutiae are local discontinuities in the fingerprint pattern. A total of
150 different minutiae types have been identified. In practice only ridge ending and ridge
bifurcation minutiae types are used in fingerprint identification. All popular AFIS are minutiae-
based [2] [4] [5] [6]. Usually each minutiae is described by the position in the coordinate, the
direction it flows and the type, whether it is ridge ending or bifurcation. [7] [8] [9] [10] [12]
[13].Figure 1 illustrates the structure of Minutiae.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
112
Figure 1: Minutiae (a) Ridge ending (b) Bifurcation
Artificial Neural Network: Artificial neural networks are constituted of artificial neurons. An
ANN is a system consisting of processing elements (PE) with links between them. A certain
arrangement of the PEs and links produce a certain ANN model, suitable for certain tasks [1]
[3]. A Multi-Layer Perceptron (MLP) is a kind of feed-forward ANN model consisting of three
adjacent layers; the input, hidden and output layers [1]. Each layer has several PEs. Figure 2
illustrates the structure of a MLP
Figure 2: A schematic diagram of a MLP neural network
2. PROPOSED ALGORITHM
Following are the main steps of proposed algorithm.
a. Biometric Key Generation
Step 1 Image Acquisition
Step 2 Enhancement of the Image
Step 3 Feature extraction
Step 4 Training with different sample images using ANN
Step 5 Template Finger print is obtained
Step 6 Biometric Key of 512 bit is generated from the given template.
b. Session Key generation
c. Generation of two intermediate keys by genetic crossing over of Biometric key and
Session key.
d. Final Encryption Key generation
e. Encryption of data using Final Encryption Key once fingerprint is match with the
template.
f. Decryption of data is done using the Encryption key after fingerprint is match with
the template.
The sequence of steps for complete authentication process is given in the schematic diagram.
Figure 3 illustrates the scheme.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
113
Figure 3: Schematic diagram: The sequence of fingerprint authentication process
3. EXPLANATION OF ALGORITHM
Following are the steps involved in the Biometric Key generation
Step 1: In the initial phase the Fingerprint image is obtained using Bio-sensor scanner which
is a flatbed scanner with 600 DPI.
Step 2: Then the image is preprocessed to remove the noise using various preprocessing
techniques like segmentation, Normalization, Orientation, Ridge frequency estimation and,
Gabor filtering. Figure 4 illustrate the Image enhancement process.
Figure 4: A schematic diagram of a Image Enhancement
Step 3: Enhanced image is then binaries and thinning operation is performed to make the ridges
single pixel width. Try to find the location of ā€œ1ā€ in the thinned image. The number ā€œ1ā€
basically represent the ridges. Taking a ā€˜3*3ā€™ window mask with 1 as a starting point finding the
absolute difference between the center pixel and neighborhoods pixel. If the value is 1(ridge
ending) or 3 (bifurcation) then find the angel at which the ridge is moving. Store the
coordinates, angles and the calculated values. Figure 5 illustrate enhanced image, Thinned
image and image with minutiae points.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
114
(a) (b) (c)
Figure 5: A schematic diagram of (a) Enhanced image, (b) Thinned Image
and (c) Minutiae Point
Step 4: Before the ANN training the data was divided into three datasets; the training,
validation and test. Here data are Minutiae points (ridge ending and bifurcation) which are
extracted from a set of fingerprint images. The training set was used to train the MLP, the
validation set was used for early-stopping of the training process and the test set was used to
evaluate the MLP performance after completion of the training process. The training data set
consist of different sample images.
Steps involved:
Forward propagation: The output of each node in the successive layers is calculated
O (output of a node) =1/ (1+exp (-Ī£Wij xi)) (a)
The Error E (Im) of an image pattern Im is calculated with respect to Target (T)
E (Im) =1/2(Ī£ T (Im)-O (Im)) 2 (b)
Reverse Propagation: The error Ī“ for the nodes in the output layer is calculated
Ī“(output layer) = o(T) - o( Im) (c)
The new weights between output layer and hidden layer are updated
W (n+1) =W (n) + Ī® Ī“(output layer) (d)
The training of the network is stopped when the desired mean square error (MSE)
is achieved
E (MSE) = Ī£E (Im) (e)
Step 5: A Template is created using the training sets .The implementation and simulation were
carried out with the aid of neural networks built in function using Matlab. (MATLAB7.5.0
(R2007 b)).
Step 6: A biometric key of length 512 bit is generated using SHA512 hash algorithm. With
SHA512 a variable-length message is converted into a fixed-length output of 512 bits. The input
message is broken up into chunks of 1024 -bit blocks (sixteen 64-bit little endian integers); the
message is padded so that its length is divisible by 1024. The padding works as follows: first a
single bit, 1, is appended to the end of the message. This is followed by as many zeros as are
required to bring the length of the message up to 128 bits less than a multiple of 1024. The
remaining bits are filled up with a 128-bit integer representing the length of the original
message; after initialization of SHA512 buffer with a Eight-word buffer ( A,B,C,D,E,F,G,H)
,compute the message digest and finally process message in 16-word blocks to get the output.
Figure 6 illustrates the Biometric key generation process. Figure 6-A illustrates the Key
Generation process with SHA512
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
115
Figure 6: A schematic diagram of Biometric key
Generation
Figure 6-A: A schematic diagram of key
Generation process with SHA512
Step 7: Taking a session based password from the user generate a session key of length 512 bit
with SHA512 key generation algorithm using step 6. Figure 7 illustrates the Session key
generation process.
Figure 7: A Session key of length 512 bit is generated
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
116
Step 8: Genetic Crossover operation is applied between the Biometric key (512 bit) and session
key (512 bit) to generate two combined keys. Figure 8 and Figure 18 illustrates the generation
process of Combined Key -1 and Combined Key -2.
Figure 8: Two combine keys are generated by Crossover
Step 9: The Final Encryption key of length 1024 bit is generated by combining Combined Key -
1 and Combined Key -2. Figure 9 and Figure 18 illustrate the Final Encryption Key generation
process.
Figure 9: A Final Encryption key of length 1024 bit is generated
Step 10: Taking the File from the user encrypts the data using the Final Encryption key. After
taking the file from the user store it in a temporary array after converting the character of the file
into their corresponding binary format. Stored the binary values in the 8x8 matrix which is filled
up row wise where each row corresponds to a single character. Perform columnar transposition
on the matrix. Finally perform the bitwise AND operation on the data using Encryption key.
Given file is now encrypted.
Step 11: Taking the Sample fingerprint from the user extract the feature and compare it with the
template to find whether the matching score is within the threshold. If it is within the range then
generate the Biometric key (512 bit) from the template. A session key (512 bit) is created after
accepting the password from the user. The Final Encryption key (1024) is generated using the
combined key -1 and combined key-2. Decrypt the encrypted file using the Final Encryption
key.
4. RESULTS AND DISCUSSIONS
In this section, we have presented the experimental results of the proposed approach, which is
implemented in MATLAB (Matlab7.5.0 (R2007b)) we have tested the proposed approach with
different sets of input images. Initially Fingerprints are scanned using standard Bio-sensor
scanner with required resolution. As there can be some imperfection in the capture of fingerprint
due to lighting condition as well as dirt in the fingerprint enhancement has been done followed
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
117
by binarization and thinning. Minutiae points are than extracted from the fingerprint. Figure 10
illustrate the different stage of the fingerprint image.
Figure 10: (a) Raw Image, (b) Enhanced Image, (c) Thinned Image and (d) Image with
Minutiae points.
The Figure 11 illustrates the schematic diagram of training process using ANN based on
extracted Minutiae points
Figure 11: ANN Training process (Learning Performance Vs Epoch on extracted Minutiae
points)
Figure 12 and 14 shows the data that are not match with the template data while figure 13, 15
shows data that are closely matched with the template. Figure 16 shows Biometric key
generated from template while figure 17 shows session key and figure 18 shows combine key
generation process.
Figure 12: Showing result that is not matched with template (Target output vs. Computed
output on Test data)
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
118
Figure 13: Showing result that is closely matched with template (Target output vs. Computed
output on Test data)
Figure 14: Showing result that is not matched with template (Compersion between Actual
data and Predicted data)
Figure 15: Showing result that is closely matched with template (Compersion between Actual
data and Ppredicted data)
Figure 16: Biometric key generated from template.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
119
Figure 17: Session Key after accepting password from the user.
Figure 18: (a) & (b) Combined Key generation by Crossing over of Biometric Key & Session
key (c) Final Encryption key (1024 bit) generation by mixing keys (a) and (b)
5. CONCLUSIONS
The proposed approach minimizes the shortcomings of fingerprint based authentication
technique by using ANN. Most of the applications use full fingerprint but in this approach a
portion of the Fingerprint is good enough to generate the biometric key and hence minimizes
False Rejection Ratio (FRR). In this approach traditional session based password technique is
also applied to eliminate the limitation of static biometric key encryption. So using this
approach sensitive data can be made more secure than any traditional technique. Experimental
results are also satisfactory. This research has may be further extended using more reliable
biometric features.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
120
6. REFERENCES
[1] B.Jayaraman, C.Puttamadappa , E.Anbalagan ,E.Mohan and Srinivasarao Madane, Fingerprint
Authentication using Back-propagation Algorithm of International Journal of Soft Computing
3(4) :282-287, 2008 ISSN:1816-9503.
[2] Junita Mohamad-Saleh and Brian S. Hoyle: Improved Neural Network Performance Using
Principal Component Analysis on Matlab: International Journal of The Computer, the Internet
and Management Vol.16. N.o.2 (May-August, 2008) pp 1-8.
[3] Younhee Gil, Dosung Ahn, Sungbum Pan, Yongwha Chung: Access Control System with High
Level Security Using Fingerprints: Proceedings of the 32nd Applied Imagery Pattern
Recognition Workshop (AIPRā€™03)0-7695-2029-4/03 $ 17.00 Ā© 2003 IEEE .
[4] Zhang Tanghui, Tian Jie, He Yuliang, Yang Xin, "A Combined Fingerprint Matching Algorithm
Based on Similarity Histogram",Chinese Journal of Computers, 2005, Vol.28(10), pp.1728-
1733.
[5] Anil Jain, Arun Ross, "Fingerprint Matching Using Minutiae and Texture Features", ICIP, 2001,
pp.282-285.
[6] Zsolt Miklos Kovocs-Vajna" A Fingerprint Verification System Based on Triangular Matching
and Dynamic Time Warping"IEEE Tranā€™s on.PAMI, 2000, Vol.22 (11), pp.1266-1276.
[7] Anil K. Jain, Salil Prabhakar, Lin Hong, Sharath Pankanti, "Filterbankbased Fingerprint
Matching", IEEE Tans on. Image Precessing, 2000, Vol.9 (5), pp.846-859.
[8] Anil K. Jain, Salil Prabhakar, Shaoyun Chen, "Combining Multiple Matchers for A High
Security Fingerprint Verification System", Pattern Recognition Letters, 1999, Vol.20 (11-13),
pp.1371-1379.
[9] A. K. Jain, L. Hong, S. Pantanki and R. Bolle, An Identity Authentication System Using
Fingerprints, Proc of the IEEE, vol, 85, no.9,1365-1388, 1997.
[10] Hong, L., Y.Wan and A.K.Jain, 1998. Fingerprint Image Enhancement: Algorithm and
performance Evaluation. IEEE. Trabs. PAMI, 20(8): 777-789.
[11] Jain, A., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Trans. on Pattern
Analysis and Machine Intelligence, Vol.19, No.4 (1997) 302ā€“313.
[12] Anil K. Jain, Salil Prabhakar, Lin Hong "A Multichannel Approach to Fingerprint
Classification", IEEE Trans on. PAMI, 1999, Vol.21 (4), pp.348-359.
[13] Tanmay Bhattacharya, Sirshendu Hore , Ayan Mukherjee ,S. R. Bhadra Chaudhuri ā€œA Novel
Highly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based
Authenticationā€ Advances in Networks & Communications, CCSIT Part 2 (2011) pp 422-431,
Springer.

More Related Content

What's hot

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
Ā 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
Ā 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Ā 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
Ā 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
Ā 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
Ā 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
Ā 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
Ā 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Pointpaperpublications3
Ā 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalIRJET Journal
Ā 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
Ā 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...ijcseit
Ā 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
Ā 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETcscpconf
Ā 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manetcsandit
Ā 
B.tech it _curriculum-_for_whole_4_yrs
B.tech it _curriculum-_for_whole_4_yrsB.tech it _curriculum-_for_whole_4_yrs
B.tech it _curriculum-_for_whole_4_yrsSujith Sam
Ā 

What's hot (18)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Ā 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
Ā 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Ā 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
Ā 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
Ā 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
Ā 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
Ā 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
Ā 
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-PointGraphical Password Authentication Using Modified Persuasive Cued Click-Point
Graphical Password Authentication Using Modified Persuasive Cued Click-Point
Ā 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Ā 
Coding Instead of Encryption
Coding Instead of EncryptionCoding Instead of Encryption
Coding Instead of Encryption
Ā 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
Ā 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
Ā 
H364752
H364752H364752
H364752
Ā 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
Ā 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
Ā 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
Ā 
B.tech it _curriculum-_for_whole_4_yrs
B.tech it _curriculum-_for_whole_4_yrsB.tech it _curriculum-_for_whole_4_yrs
B.tech it _curriculum-_for_whole_4_yrs
Ā 

Similar to A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KEY AND SESSION BASED PASSWORD

11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
Ā 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGIJNSA Journal
Ā 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Ā 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Ā 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkIRJET Journal
Ā 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
Ā 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
Ā 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
Ā 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
Ā 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
Ā 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
Ā 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
Ā 
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...IJECEIAES
Ā 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
Ā 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
Ā 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationIOSR Journals
Ā 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
Ā 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
Ā 

Similar to A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KEY AND SESSION BASED PASSWORD (20)

11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
Ā 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
Ā 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
Ā 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
Ā 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Ā 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
Ā 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Ā 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
Ā 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Ā 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
Ā 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
Ā 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
Ā 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
Ā 
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...
Ā 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Ā 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
Ā 
B017110713
B017110713B017110713
B017110713
Ā 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
Ā 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
Ā 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Ā 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĆ£o Esperancinha
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
Ā 
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
Ā 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerAnamika Sarkar
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
Ā 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Serviceyoung call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
Ā 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Ā 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Ā 
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Ā 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
Ā 

A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KEY AND SESSION BASED PASSWORD

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 DOI : 10.5121/ijnsa.2011.3209 111 A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KEY AND SESSION BASED PASSWORD Tanmay Bhattacharya1 , Sirshendu Hore 2 , Ayan Mukherjee 3 and S. R. Bhadra Chaudhuri 4 1 Sr. Lecturer, Dept. of IT, JIS College Engineering, Kalyani, West Bengal, India. tb.jisce@gmail.com 2 Lecturer, Dept. of CSE, Hooghly Engineering & Technology College, Pipulpati,Hooghly, West Bengal, India. shirshendu_hore@yahoo.com 3 Lecturer, Dept. of CSE, Institute of Science & Technology, Chandrakona Town,Paschim Medinipur, West Bengal, India. ayanmca@gmail.com 4 Professor, Dept. of E&TC Engg., Bengal Engineering & Science University, Shibpur, Howrah, West Bengal, India. prof.srbc@gmail.com ABSTRACT In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is obtained by crossing over of the Session key generated from the password given by the legitimate user and the Biometric key generated from the fingerprint of the same user. The proposed approach trained the system by Artificial Neural Network in such a way that a small portion of the fingerprint is enough to generate the Biometric key which minimizes the chance of false rejection. So in this approach there is a significant improvement of the traditional authentication techniques. KEYWORDS ANN; Minutiae; Sessionbased; Training; SHA-512, Crossover; 1. INTRODUCTION Fingerprints have long been used in the identification of individuals because of a well-known fact that each person has a unique fingerprint. Classification is usually performed by noting certain features. The lines that flow in various patterns across fingerprints are called ridges and the spaces between ridges are valleys. The three basic patterns of fingerprint ridges are Arch, Loop, and Whorl. Minutiae are local discontinuities in the fingerprint pattern. A total of 150 different minutiae types have been identified. In practice only ridge ending and ridge bifurcation minutiae types are used in fingerprint identification. All popular AFIS are minutiae- based [2] [4] [5] [6]. Usually each minutiae is described by the position in the coordinate, the direction it flows and the type, whether it is ridge ending or bifurcation. [7] [8] [9] [10] [12] [13].Figure 1 illustrates the structure of Minutiae.
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 112 Figure 1: Minutiae (a) Ridge ending (b) Bifurcation Artificial Neural Network: Artificial neural networks are constituted of artificial neurons. An ANN is a system consisting of processing elements (PE) with links between them. A certain arrangement of the PEs and links produce a certain ANN model, suitable for certain tasks [1] [3]. A Multi-Layer Perceptron (MLP) is a kind of feed-forward ANN model consisting of three adjacent layers; the input, hidden and output layers [1]. Each layer has several PEs. Figure 2 illustrates the structure of a MLP Figure 2: A schematic diagram of a MLP neural network 2. PROPOSED ALGORITHM Following are the main steps of proposed algorithm. a. Biometric Key Generation Step 1 Image Acquisition Step 2 Enhancement of the Image Step 3 Feature extraction Step 4 Training with different sample images using ANN Step 5 Template Finger print is obtained Step 6 Biometric Key of 512 bit is generated from the given template. b. Session Key generation c. Generation of two intermediate keys by genetic crossing over of Biometric key and Session key. d. Final Encryption Key generation e. Encryption of data using Final Encryption Key once fingerprint is match with the template. f. Decryption of data is done using the Encryption key after fingerprint is match with the template. The sequence of steps for complete authentication process is given in the schematic diagram. Figure 3 illustrates the scheme.
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 113 Figure 3: Schematic diagram: The sequence of fingerprint authentication process 3. EXPLANATION OF ALGORITHM Following are the steps involved in the Biometric Key generation Step 1: In the initial phase the Fingerprint image is obtained using Bio-sensor scanner which is a flatbed scanner with 600 DPI. Step 2: Then the image is preprocessed to remove the noise using various preprocessing techniques like segmentation, Normalization, Orientation, Ridge frequency estimation and, Gabor filtering. Figure 4 illustrate the Image enhancement process. Figure 4: A schematic diagram of a Image Enhancement Step 3: Enhanced image is then binaries and thinning operation is performed to make the ridges single pixel width. Try to find the location of ā€œ1ā€ in the thinned image. The number ā€œ1ā€ basically represent the ridges. Taking a ā€˜3*3ā€™ window mask with 1 as a starting point finding the absolute difference between the center pixel and neighborhoods pixel. If the value is 1(ridge ending) or 3 (bifurcation) then find the angel at which the ridge is moving. Store the coordinates, angles and the calculated values. Figure 5 illustrate enhanced image, Thinned image and image with minutiae points.
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 114 (a) (b) (c) Figure 5: A schematic diagram of (a) Enhanced image, (b) Thinned Image and (c) Minutiae Point Step 4: Before the ANN training the data was divided into three datasets; the training, validation and test. Here data are Minutiae points (ridge ending and bifurcation) which are extracted from a set of fingerprint images. The training set was used to train the MLP, the validation set was used for early-stopping of the training process and the test set was used to evaluate the MLP performance after completion of the training process. The training data set consist of different sample images. Steps involved: Forward propagation: The output of each node in the successive layers is calculated O (output of a node) =1/ (1+exp (-Ī£Wij xi)) (a) The Error E (Im) of an image pattern Im is calculated with respect to Target (T) E (Im) =1/2(Ī£ T (Im)-O (Im)) 2 (b) Reverse Propagation: The error Ī“ for the nodes in the output layer is calculated Ī“(output layer) = o(T) - o( Im) (c) The new weights between output layer and hidden layer are updated W (n+1) =W (n) + Ī® Ī“(output layer) (d) The training of the network is stopped when the desired mean square error (MSE) is achieved E (MSE) = Ī£E (Im) (e) Step 5: A Template is created using the training sets .The implementation and simulation were carried out with the aid of neural networks built in function using Matlab. (MATLAB7.5.0 (R2007 b)). Step 6: A biometric key of length 512 bit is generated using SHA512 hash algorithm. With SHA512 a variable-length message is converted into a fixed-length output of 512 bits. The input message is broken up into chunks of 1024 -bit blocks (sixteen 64-bit little endian integers); the message is padded so that its length is divisible by 1024. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 128 bits less than a multiple of 1024. The remaining bits are filled up with a 128-bit integer representing the length of the original message; after initialization of SHA512 buffer with a Eight-word buffer ( A,B,C,D,E,F,G,H) ,compute the message digest and finally process message in 16-word blocks to get the output. Figure 6 illustrates the Biometric key generation process. Figure 6-A illustrates the Key Generation process with SHA512
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 115 Figure 6: A schematic diagram of Biometric key Generation Figure 6-A: A schematic diagram of key Generation process with SHA512 Step 7: Taking a session based password from the user generate a session key of length 512 bit with SHA512 key generation algorithm using step 6. Figure 7 illustrates the Session key generation process. Figure 7: A Session key of length 512 bit is generated
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 116 Step 8: Genetic Crossover operation is applied between the Biometric key (512 bit) and session key (512 bit) to generate two combined keys. Figure 8 and Figure 18 illustrates the generation process of Combined Key -1 and Combined Key -2. Figure 8: Two combine keys are generated by Crossover Step 9: The Final Encryption key of length 1024 bit is generated by combining Combined Key - 1 and Combined Key -2. Figure 9 and Figure 18 illustrate the Final Encryption Key generation process. Figure 9: A Final Encryption key of length 1024 bit is generated Step 10: Taking the File from the user encrypts the data using the Final Encryption key. After taking the file from the user store it in a temporary array after converting the character of the file into their corresponding binary format. Stored the binary values in the 8x8 matrix which is filled up row wise where each row corresponds to a single character. Perform columnar transposition on the matrix. Finally perform the bitwise AND operation on the data using Encryption key. Given file is now encrypted. Step 11: Taking the Sample fingerprint from the user extract the feature and compare it with the template to find whether the matching score is within the threshold. If it is within the range then generate the Biometric key (512 bit) from the template. A session key (512 bit) is created after accepting the password from the user. The Final Encryption key (1024) is generated using the combined key -1 and combined key-2. Decrypt the encrypted file using the Final Encryption key. 4. RESULTS AND DISCUSSIONS In this section, we have presented the experimental results of the proposed approach, which is implemented in MATLAB (Matlab7.5.0 (R2007b)) we have tested the proposed approach with different sets of input images. Initially Fingerprints are scanned using standard Bio-sensor scanner with required resolution. As there can be some imperfection in the capture of fingerprint due to lighting condition as well as dirt in the fingerprint enhancement has been done followed
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 117 by binarization and thinning. Minutiae points are than extracted from the fingerprint. Figure 10 illustrate the different stage of the fingerprint image. Figure 10: (a) Raw Image, (b) Enhanced Image, (c) Thinned Image and (d) Image with Minutiae points. The Figure 11 illustrates the schematic diagram of training process using ANN based on extracted Minutiae points Figure 11: ANN Training process (Learning Performance Vs Epoch on extracted Minutiae points) Figure 12 and 14 shows the data that are not match with the template data while figure 13, 15 shows data that are closely matched with the template. Figure 16 shows Biometric key generated from template while figure 17 shows session key and figure 18 shows combine key generation process. Figure 12: Showing result that is not matched with template (Target output vs. Computed output on Test data)
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 118 Figure 13: Showing result that is closely matched with template (Target output vs. Computed output on Test data) Figure 14: Showing result that is not matched with template (Compersion between Actual data and Predicted data) Figure 15: Showing result that is closely matched with template (Compersion between Actual data and Ppredicted data) Figure 16: Biometric key generated from template.
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 119 Figure 17: Session Key after accepting password from the user. Figure 18: (a) & (b) Combined Key generation by Crossing over of Biometric Key & Session key (c) Final Encryption key (1024 bit) generation by mixing keys (a) and (b) 5. CONCLUSIONS The proposed approach minimizes the shortcomings of fingerprint based authentication technique by using ANN. Most of the applications use full fingerprint but in this approach a portion of the Fingerprint is good enough to generate the biometric key and hence minimizes False Rejection Ratio (FRR). In this approach traditional session based password technique is also applied to eliminate the limitation of static biometric key encryption. So using this approach sensitive data can be made more secure than any traditional technique. Experimental results are also satisfactory. This research has may be further extended using more reliable biometric features.
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 120 6. REFERENCES [1] B.Jayaraman, C.Puttamadappa , E.Anbalagan ,E.Mohan and Srinivasarao Madane, Fingerprint Authentication using Back-propagation Algorithm of International Journal of Soft Computing 3(4) :282-287, 2008 ISSN:1816-9503. [2] Junita Mohamad-Saleh and Brian S. Hoyle: Improved Neural Network Performance Using Principal Component Analysis on Matlab: International Journal of The Computer, the Internet and Management Vol.16. N.o.2 (May-August, 2008) pp 1-8. [3] Younhee Gil, Dosung Ahn, Sungbum Pan, Yongwha Chung: Access Control System with High Level Security Using Fingerprints: Proceedings of the 32nd Applied Imagery Pattern Recognition Workshop (AIPRā€™03)0-7695-2029-4/03 $ 17.00 Ā© 2003 IEEE . [4] Zhang Tanghui, Tian Jie, He Yuliang, Yang Xin, "A Combined Fingerprint Matching Algorithm Based on Similarity Histogram",Chinese Journal of Computers, 2005, Vol.28(10), pp.1728- 1733. [5] Anil Jain, Arun Ross, "Fingerprint Matching Using Minutiae and Texture Features", ICIP, 2001, pp.282-285. [6] Zsolt Miklos Kovocs-Vajna" A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping"IEEE Tranā€™s on.PAMI, 2000, Vol.22 (11), pp.1266-1276. [7] Anil K. Jain, Salil Prabhakar, Lin Hong, Sharath Pankanti, "Filterbankbased Fingerprint Matching", IEEE Tans on. Image Precessing, 2000, Vol.9 (5), pp.846-859. [8] Anil K. Jain, Salil Prabhakar, Shaoyun Chen, "Combining Multiple Matchers for A High Security Fingerprint Verification System", Pattern Recognition Letters, 1999, Vol.20 (11-13), pp.1371-1379. [9] A. K. Jain, L. Hong, S. Pantanki and R. Bolle, An Identity Authentication System Using Fingerprints, Proc of the IEEE, vol, 85, no.9,1365-1388, 1997. [10] Hong, L., Y.Wan and A.K.Jain, 1998. Fingerprint Image Enhancement: Algorithm and performance Evaluation. IEEE. Trabs. PAMI, 20(8): 777-789. [11] Jain, A., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol.19, No.4 (1997) 302ā€“313. [12] Anil K. Jain, Salil Prabhakar, Lin Hong "A Multichannel Approach to Fingerprint Classification", IEEE Trans on. PAMI, 1999, Vol.21 (4), pp.348-359. [13] Tanmay Bhattacharya, Sirshendu Hore , Ayan Mukherjee ,S. R. Bhadra Chaudhuri ā€œA Novel Highly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authenticationā€ Advances in Networks & Communications, CCSIT Part 2 (2011) pp 422-431, Springer.