Submit Search
Upload
IRJET- End to End Message Encryption using Biometrics
•
0 likes
•
35 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i4/IRJET-V6I4330.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
Improved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
IAEME Publication
Recommended
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
Improved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
IAEME Publication
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IJERA Editor
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
IRJET Journal
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
Iciea08
Iciea08
Hanaa Salman
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
csandit
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
Introduction to Architecting Smart IoT Devices
Introduction to Architecting Smart IoT Devices
Muhammad Usman
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Instant messaging tech scet
Instant messaging tech scet
pankaj gamit
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
Offline Sms Internet
Offline Sms Internet
IRJET Journal
Secure instant messanger service
Secure instant messanger service
Aditya Gupta
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
Biometrics
Biometrics
Satish Chandra
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
More Related Content
What's hot
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IJERA Editor
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
IRJET Journal
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
Iciea08
Iciea08
Hanaa Salman
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
csandit
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
Introduction to Architecting Smart IoT Devices
Introduction to Architecting Smart IoT Devices
Muhammad Usman
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
Instant messaging tech scet
Instant messaging tech scet
pankaj gamit
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Harikrishna Patel
Offline Sms Internet
Offline Sms Internet
IRJET Journal
Secure instant messanger service
Secure instant messanger service
Aditya Gupta
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
LeMeniz Infotech
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
IJCSEA Journal
Biometrics
Biometrics
Satish Chandra
What's hot
(19)
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
Android Application for Mobile Attendance using NFC
Android Application for Mobile Attendance using NFC
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
Iciea08
Iciea08
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
Introduction to Architecting Smart IoT Devices
Introduction to Architecting Smart IoT Devices
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
Instant messaging tech scet
Instant messaging tech scet
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...
Offline Sms Internet
Offline Sms Internet
Secure instant messanger service
Secure instant messanger service
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
Biometrics
Biometrics
Similar to IRJET- End to End Message Encryption using Biometrics
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET Journal
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
IRJET Journal
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET Journal
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
IRJET- Document Digitization
IRJET- Document Digitization
IRJET Journal
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
IRJET Journal
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET Journal
Similar to IRJET- End to End Message Encryption using Biometrics
(20)
Fingerprint Based Voting
Fingerprint Based Voting
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET- Iot based Interactive Display Unit using Raspberry PI
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET- Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET- Document Digitization
IRJET- Document Digitization
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Authentication using Image Selection and Voice Recognition
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Recently uploaded
(20)
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
IRJET- End to End Message Encryption using Biometrics
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1552 END TO END MESSAGE ENCRYPTION USING BIOMETRICS Dr S. Brindha1, Ms B. Nivedetha2, Mr V. Dhivyadhanush3, Mr S. Karthi4, Mr M. Mukeshwaran4 1Head of Department, Department of Computer Networking, PSG Polytechnic College, Coimbatore, India 2Lecturer, Department of Computer Networking, PSG Polytechnic College, Coimbatore, India 345Student, Department of Computer Networking, PSG Polytechnic College, Coimbatore, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The messenger is used to send messages or to convey the message in different format .This messenger is similar to the existing messengers except the message is encrypted using face biometrics during the message exchange. The send message is encrypted and the received message is decrypted using the 128 bit key. In this proposed method, we have used face biometrics to unlock the encrypted messages, photos, voice message and also video messages Android application has been created using Android Studio, End to end message encryption between firebase server to client, Media sharing has been introduced to the mobile application. Key Words: Face biometrics, end to end Message encryption 1. INTRODUCTION Biometric Systems are automated methods of verifying or recognizing the identity of the living person on the basis of some physical characteristics, like a fingerprint or face pattern, or some of the behavior, like hand writing or key stroke patterns. Some of the most used biometric characteristicsare shown in the figure 1. A biometric system based on physical characteristics than one which even if the latter may be easier to integrate within certain specific applications. Fig 1 Block diagram 2. PROPOSED SYSTEM The messenger is used to send message with the normal security system. The message like text, video, voice etc.., is encrypted with end to end encryption using AES encryption method for security to avoid the third party entry. The encryption used for the messenger with 128 bits of 10 rounds of encryption. The encryption already breakers is 32bit and 64bit. The messengers like this are much secured when third party uses the phone. Biometrics are measures of biological quantities or pattern but also means measurements of an individual’s features, such as fingerprints, that can identity or authenticate a person. 3. LITERATURE SURVEY Automated person identification is highly researched in recent years because of its applications, like protected access to computer systems, buildings, cellular phones, ATMs and video surveillance. Person identification is the process of associating an identity to the individual. Person identification techniques are there classified into three, namely knowledge based, token based, and biometric based. A knowledge-based approach depends on something an individual knows to make a personal identification, like a password or a personal identification number (PIN). Token-basedapproachesare basedonsomethingan individual have to make a personal identification like a passport, driver’s license, ID card, credit card, orkeys.These two approaches have several demerits: tokens may be stolen, lost, forgotten or misplaced. The password or PIN code can be forgotten by an authenticated person or predicted by an attacker. 4. MESSENGER APPLICATION The application is build using the software android studio. It is the best android application development platform. The following paragraph describes about the application.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1553 Fig 2 KINT App Application is built using any androidversionabove 5.0. The android application is named as KINT the application name is referred to “Keep IN Touch”. The Application logo and the login page are shown in figure 2 .The application supports the media transformation such as picture, video, audio and voice. It supports the voice call and video call. The message history and database is also stored like firebase databases. The message is shown in figure 3. Fig 3 Messenger Application The message is encrypted and decrypted using the AES (Advanced Encryption Standard) algorithm of 128 bit key size. The encryption is done with thekeygeneratedfrom the real-time face biometrics. This key is compared with the face biometrics saved in the database, if they are same then the message is encrypted. During the message transmission, the message is encrypted and authenticated using face biometrics. The decryption of message is done only when the face is matched with the image in the database. The authentication fails if the captured face does not match with the database image. When the face biometric isnotmatched, the messages in the messenger are in encrypted form which are unreadable by humans so it remains more secured and safety. 5. DATABASE The database of the application is designed by the firebase database. It is the familiar database forthereal time storage and Encryption as shown in Figure 4 Fig 4 Real Time Storing Firebase's first product was the Firebase Real-time Database, an API that synchronizes application data across iOS, Android, and Web devices, and stores it on Firebase’s cloud. The product assists software developers in building real-time, collaborative applications as shown in figure 5. Fig 5 Database 4. AUTHENTICATION The authentication for this messenger is based on the login page the authenticated phone number and the following OTP are used to login and for the account verification. The encrypted message will be displayed in human unreadable form as shown in the figure 6.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1554 Fig 6 Encrpted Message 6. CONCLUSION Biometric Systems are automated methods of verifying or recognizing the identity of a living persononthe basis of some physical characteristics, like a fingerprint or face pattern, or some aspects of behavior, like hand writing or key stroke patterns. Some of the most used biometric characteristics are shown in the figure. A biometric system based on physical characteristics.Thanone whichevenif the latter may be easier to integrate within certain specific applications. ACKNOWLEDGEMENT I express my sincere thanks to Dr. B. Giriraj, Principal, PSG Polytechnic College,Coimbatore,forproviding me an opportunity to take up this Mini Project Report. I also express our sincere thanks to Mr. Jeevanantham, Jasper KeyPlay for the support and the guidance to take up this project. I also express our sincere thanks to our Facultyand Friends for their kind support and encouragement during the project. BIOGRAPHIES Dr.S.Brindha Head of Department Department of Computer Networking, PSG Polytechnic College Coimbatore, India. Ms.B.Nivedetha,ME Lecturer Department of Computer Networking PSG Polytechnic College Coimbatore, India. Mr.V.Dhivyadhanush, Student Department of Computer Networking PSG Polytechnic College Coimbatore, India. Mr.S.Karthi, Student Department of Computer Networking PSG Polytechnic College Coimbatore, India. Mr.M.Mukeshwaran, Student Department of Computer Networking PSG Polytechnic College Coimbatore, India.
Download now