Data Encryption Standard Algorithm in Multimodal Biometric Image
Sharmila S.More1 , Bhawna Narain2 , B.T.Jadhav 3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 869-874, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.869874
Online published on Aug 31, 2018
Copyright © Sharmila S.More, Bhawna Narain, B.T.Jadhav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sharmila S.More, Bhawna Narain, B.T.Jadhav, “Data Encryption Standard Algorithm in Multimodal Biometric Image,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.869-874, 2018.
MLA Style Citation: Sharmila S.More, Bhawna Narain, B.T.Jadhav "Data Encryption Standard Algorithm in Multimodal Biometric Image." International Journal of Computer Sciences and Engineering 6.8 (2018): 869-874.
APA Style Citation: Sharmila S.More, Bhawna Narain, B.T.Jadhav, (2018). Data Encryption Standard Algorithm in Multimodal Biometric Image. International Journal of Computer Sciences and Engineering, 6(8), 869-874.
BibTex Style Citation:
@article{S.More_2018,
author = {Sharmila S.More, Bhawna Narain, B.T.Jadhav},
title = {Data Encryption Standard Algorithm in Multimodal Biometric Image},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {869-874},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2787},
doi = {https://doi.org/10.26438/ijcse/v6i8.869874}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.869874}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2787
TI - Data Encryption Standard Algorithm in Multimodal Biometric Image
T2 - International Journal of Computer Sciences and Engineering
AU - Sharmila S.More, Bhawna Narain, B.T.Jadhav
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 869-874
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
680 | 355 downloads | 285 downloads |
Abstract
In every field of technology there are major issues of security. Biometric images are used as input and then the features like edge, texture are extracted. This is done by applying feature extraction algorithms and data encryption standard cryptographic algorithm on Fingerprints, Iris, face and palm simultaneously. In this paper we have explained the information about multimodal biometrics, DES algorithm, and role of DES in multimodal. We have discussed the implementation of DES algorithm by using MATLAB on parameters of captured images according to age and gender. Parameters such as key size, input size, time taken, simulation, memory requirement, CPU usage. Matching algorithm, time delay, FAR, FRR is also a major issue in multimodal biometrics.
Key-Words / Index Term
Cryptographic algorithm; Biometric traits; FAR, FRR; Data Encryption Standard; Cipher Text
References
[1]. Abhishek Sharma, Narendra Kumar ,”Encryption of Text Using Fingerprints as Input to Various Algorithms”, International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, ISSN (Online): 2319-7064, pp. 418-421.
[2]. Bk. Bala and Jl. Joanna, “Multi Modal Biometrics using Cryptographic Algorithm,” Eur. J. Acad. Essays, vol. 1, no. 1, pp. 6–10, 2014.
[3]. B.Rajesh , G.S.Rath, “Real Time Implementation Of DES Algorithm By Using Tms3206713 DSK ” National Institute Of TechnologyRourkela 2008.
[4]. Burrows M. and D. Wheeler, “A block-sorting lossless data compression algorithm,” Algorithm, Data Compression, no. 124, p. 18, 1994.
[5]. C. M. Bishop, Pattern Recognition and Machine Learning, vol. 4, no. 4. 2006.
[6]. Ieee, “IEEE Standard Specifications for Public-Key Cryptography,” IEEE Std 1363-2000. p. i, 2000.
[7]. D. G. Lowe, “Object recognition from local scale-invariant features,” in Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, pp. 1150–1157 vol.2.
[8]. Lumini and L. Nanni, “Overview of the combination of biometric matchers,” Information Fusion, vol. 33. pp. 71–85, 2017.
[9]. S. S. More, B. Narain, and B. T. Jadahv, “A Comparative Analysis of Unimodal and Multimodal Biometric Systems,” in International Conference (ITESM-2017) On Innovative Trends in Engineering Science and Management, 2017, vol. 8, no. 5.
[10]. S. S. More. and B. T. Jadhav, “Comparative Study of Biometric Devices,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 5, no. 2, pp. 1302–1309, 2017.
[11]. S. S and S. Mathew, “Multimodal Biometric Authentication : Secured Encryption of IRIS Using Fingerprint ID,” Int. J. Cryptogr. Inf. Secur., vol. 6, no. 3/4, pp. 39–46, 2016.
[12]. Sanjay Kumar , Sandeep Srivastava ,” Image Encryption using Simplified Data Encryption Standard (S-DES) ”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No.2, October 2014.
[13]. S. S. More and B. T. Jadahv, “FUZZY LOGIC ALGORITHMS FOR EXTRACTING BIOMETRIC DATA,” in National Conference on Modern Approach for Green Electronics & Computing 29th and 30th September 2014 (MAGEC 2014) ISBN : 978-81-928732-2-0, 2014, pp. 200–204.
[14]. S. S. More and B. T. Jadahv, “An Overview on Technologies Used in Biometric System,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 4, no. 2, pp. 365–373, 2016.
[15]. S. S. More, “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[16]. Sharmila Shinde, J. Shinde, Kharade M and Kadam D. “Biometrics: Overview and potential use for E- Governance Services,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 4, no. 6, pp. 1145–1151, 2014.
[17]. Odinaka, P. H. Lai, A. D. Kaplan, J. A. O’Sullivan, E. J. Sirevaag, and J. W. Rohrbaugh, “ECG biometric recognition: A comparative analysis,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 6, pp. 1812–1824, 2012.
[18]. R. Patil and M. a. Zaveri, “A Novel Approach for Fingerprint Matching Using Minutiae,” Math. Model. Comput. Simul. (AMS), 2010 Fourth Asia Int. Conf., 2010.
[19]. Rupam Kumar Sharma , Generation of Biometric Key for Use in DES, https://arxiv.org/ftp/arxiv/papers/1302/1302.6424.pdf ,Bosco College Of Engineering and Technology, Assam India.
[20]. Teena Joseph, Latha Parthiban, “Multimodal biometric based authentication for ensuring data security in Cloud Computing ”, Journal of Chemical and Pharmaceutical Sciences, Volume 9 Issue 4 , 2016, ISSN: 0974-2115.
[21]. Wayman J., Biometric Systems: Technology, Design and Performance Evaluation. 2005.
[22]. William E. B, C. Barker, “Data Encryption Algorithm,” Recomm. Triple Data Encryption Algorithm Block Cipher, no. January, 2012.