Data Encryption Standard Algorithm in Multimodal Biometric Image
DOI:
https://doi.org/10.26438/ijcse/v6i8.869874Keywords:
Cryptographic algorithm, Biometric traits, FAR, FRR, Data Encryption Standard, Cipher TextAbstract
In every field of technology there are major issues of security. Biometric images are used as input and then the features like edge, texture are extracted. This is done by applying feature extraction algorithms and data encryption standard cryptographic algorithm on Fingerprints, Iris, face and palm simultaneously. In this paper we have explained the information about multimodal biometrics, DES algorithm, and role of DES in multimodal. We have discussed the implementation of DES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Matching algorithm, time delay, FAR, FRR is also a major issue in multimodal biometrics.
References
[1] Abhishek Sharma, Narendra Kumar ,”Encryption of Text Using Fingerprints as Input to Various Algorithms”, International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, ISSN (Online): 2319-7064, pp. 418-421.
[2] Bk. Bala and Jl. Joanna, “Multi Modal Biometrics using Cryptographic Algorithm,” Eur. J. Acad. Essays, vol. 1, no. 1, pp. 6–10, 2014.
[3] B.Rajesh , G.S.Rath, “Real Time Implementation Of DES Algorithm By Using Tms3206713 DSK ” National Institute Of TechnologyRourkela 2008.
[4] Burrows M. and D. Wheeler, “A block-sorting lossless data compression algorithm,” Algorithm, Data Compression, no. 124, p. 18, 1994.
[5] C. M. Bishop, Pattern Recognition and Machine Learning, vol. 4, no. 4. 2006.
[6] Ieee, “IEEE Standard Specifications for Public-Key Cryptography,” IEEE Std 1363-2000. p. i, 2000.
[7] D. G. Lowe, “Object recognition from local scale-invariant features,” in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1150–1157 vol.2.
[8] Lumini and L. Nanni, “Overview of the combination of biometric matchers,” Information Fusion, vol. 33. pp. 71–85, 2017.
[9] S. S. More, B. Narain, and B. T. Jadahv, “A Comparative Analysis of Unimodal and Multimodal Biometric Systems,” in International Conference (ITESM-2017) On Innovative Trends in Engineering Science and Management, 2017, vol. 8, no. 5.
[10] S. S. More. and B. T. Jadhav, “Comparative Study of Biometric Devices,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 2, pp. 1302–1309, 2017.
[11] S. S and S. Mathew, “Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID,” Int. J. Cryptogr. Inf. Secur., vol. 6, no. 3/4, pp. 39–46, 2016.
[12] Sanjay Kumar , Sandeep Srivastava ,” Image Encryption using Simplified Data Encryption Standard (S-DES) ”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No.2, October 2014.
[13] S. S. More and B. T. Jadahv, “FUZZY LOGIC ALGORITHMS FOR EXTRACTING BIOMETRIC DATA,” in National Conference on Modern Approach for Green Electronics & Computing 29th and 30th September 2014 (MAGEC 2014) ISBN : 978-81-928732-2-0, 2014, pp. 200–204.
[14] S. S. More and B. T. Jadahv, “An Overview on Technologies Used in Biometric System,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no. 2, pp. 365–373, 2016.
[15] S. S. More, “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[16] Sharmila Shinde, J. Shinde, Kharade M and Kadam D. “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[17] Odinaka, P. H. Lai, A. D. Kaplan, J. A. O’Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, “ECG biometric recognition: A comparative analysis,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 6, pp. 1812–1824, 2012.
[18] R. Patil and M. a. Zaveri, “A Novel Approach for Fingerprint Matching Using Minutiae,” Math. Model. Comput. Simul. (AMS), 2010 Fourth Asia Int. Conf., 2010.
[19] Rupam Kumar Sharma , Generation of Biometric Key for Use in DES, https://arxiv.org/ftp/arxiv/papers/1302/1302.6424.pdf ,Bosco College Of Engineering and Technology, Assam India.
[20] Teena Joseph, Latha Parthiban, “Multimodal biometric based authentication for ensuring data security in Cloud Computing ”, Journal of Chemical and Pharmaceutical Sciences, Volume 9 Issue 4 , 2016, ISSN: 0974-2115.
[21] Wayman J., Biometric Systems: Technology, Design and Performance Evaluation. 2005.
[22] William E. B, C. Barker, “Data Encryption Algorithm,” Recomm. Triple Data Encryption Algorithm Block Cipher, no. January, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
