JOURNAL ARTICLE

Fingerprint bio-Crypto key generation using Scale Invariant Feature Transform (SIFT)

S. PartheebaN. Radha

Year: 2016 Journal:   International Journal of Computer Applications Vol: 153 (8)Pages: 35-41

Abstract

Network security has become a great threat to the network accessible resources that consists of policies to prevent, monitor unauthorized access, modification, and misuse of computer network.Several algorithms and techniques were proposed for the secure transmission of data and to protect user"s privacy.Secret-key cryptography and public-key cryptography are the techniques used for the protection of security issues.However, such a key needs to be stored in a protected place or it should be transported by a shared communication line.So generation of cryptographic key using biometric traits of both sender and receiver during communication avoids key storing and improves security strength.The proposed approach for detecting the quality of fingerprint by using the method called orientation certainty level (OCL).If the image has good quality then feature extraction will be done using Scale Invariant Feature Transform, otherwise poor quality image will get ignored.By using cover image the obtained cancellable template will get hidden.Then the hidden image will be transmitted from sender to receiver and receiver to receiver to sender by using Variable Least Significant Bit techniques.Finally the performance metrics like FAR (False Acceptance Rate), FRR (False Rejection Rate), and Accuracy of the proposed work is compared with the existing system.

Keywords:
Computer science Key generation Communication source Key (lock) Cryptography Public-key cryptography Biometrics Fingerprint (computing) Computer security Scale-invariant feature transform Data mining Feature extraction Computer network Artificial intelligence Encryption

Metrics

3
Cited By
0.00
FWCI (Field Weighted Citation Impact)
10
Refs
0.12
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing
Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

Scale-Invariant Feature Transform (SIFT)

Wilhelm BurgerMark J. Burge

Texts in computer science Year: 2016 Pages: 609-664
BOOK-CHAPTER

Scale-Invariant Feature Transform (SIFT)

Wilhelm BurgerMark J. Burge

Texts in computer science Year: 2022 Pages: 709-763
JOURNAL ARTICLE

Palm Pattern Recognition using Scale Invariant Feature Transform (SIFT)

A KalaiselviV. SangeethaM Kasiselvanathan

Journal:   International Journal of Intelligence and Sustainable Computing Year: 2018 Vol: 1 (1)Pages: 1-1
JOURNAL ARTICLE

Texture image classification using scale invariant feature transform (SIFT) method

Haider S. KaduhmHameed M. Abduljabbar

Journal:   AIP conference proceedings Year: 2023 Vol: 2769 Pages: 020029-020029
JOURNAL ARTICLE

$n$-SIFT: $n$-Dimensional Scale Invariant Feature Transform

Warren CheungGhassan Hamarneh

Journal:   IEEE Transactions on Image Processing Year: 2009 Vol: 18 (9)Pages: 2012-2021
© 2026 ScienceGate Book Chapters — All rights reserved.