International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 132 - Issue 12 |
Published: December 2015 |
Authors: Tarik Zeyad Ismaeel, Ahmed Saad Names |
![]() |
Tarik Zeyad Ismaeel, Ahmed Saad Names . A New Cryptosystem based on Fingerprint Features. International Journal of Computer Applications. 132, 12 (December 2015), 31-36. DOI=10.5120/ijca2015907662
@article{ 10.5120/ijca2015907662, author = { Tarik Zeyad Ismaeel,Ahmed Saad Names }, title = { A New Cryptosystem based on Fingerprint Features }, journal = { International Journal of Computer Applications }, year = { 2015 }, volume = { 132 }, number = { 12 }, pages = { 31-36 }, doi = { 10.5120/ijca2015907662 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2015 %A Tarik Zeyad Ismaeel %A Ahmed Saad Names %T A New Cryptosystem based on Fingerprint Features%T %J International Journal of Computer Applications %V 132 %N 12 %P 31-36 %R 10.5120/ijca2015907662 %I Foundation of Computer Science (FCS), NY, USA
Data encryption has become more important in the world of information, in order to secure the information during communicating or transmitting and to prevent an illegal person from achieving on the sensitive information. In this paper, fingerprint encryption algorithm is proposed which is used to encrypt data. Fingerprint image is used to generate three types of fingerprint keys which are derived from different types of fingerprint features. These keys are (bifurcation, ending and minutiae keys). The proposed fingerprint encryption algorithms use the fingerprint keys and table in encryption and decryption process. This method used the fingerprint key with a simple equation in order to generate the encryption key. The encryption key used to encrypt and decrypt data. The results show three different cipher texts in hexadecimal form which are encrypted by using the new algorithm. The differences among these texts are very large. The large differences due to use a larger look up table with (256×256) dimensions in encryption. The simulation results of the new encryption method give high security with a good performance.