Advertisement

ECC Based Biometric Encryption of Compressed Image for Security over Network Channels

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 222)

Abstract

This paper provides a way for secure transmission of data over networks. The security is initialized by means of using biometric data as private key, imposing the biometric data compression using 5- level Discrete wavelet transform is a way to minimize the key length, which were of large length as the standard requirements for implementing via RSA based hardware and software. As additional security measure Elliptic curve cryptography is used to encrypt the biometric data that is to be stored in and accessed from the database over networks.

Keywords

5-DWT ECC Biometrics Encryption Cryptography 

References

  1. 1.
    Mel HX, Baker D (2011) Cryptography decrypted. Addision-WesleyGoogle Scholar
  2. 2.
    Mohammadi S, Abedi S (2008) ECC based biometric signature : a new approach in electronic banking security. In: international symposium on electronic commerce and security (ISECS’07), pp 763–766, doi: 10.1109/ISECS.2008.98
  3. 3.
    Vein pattern recognition: www.fujitsu.com
  4. 4.
    Prasanalakshmi B, Kannammal A (2009) A secure cryptosystem from palm vein biometrics. In: Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human (ICIS ‘09). ACM, New York, pp 1401–1405. doi: 10.1145/1655925.1656183
  5. 5.
    Prasanalakshmi B, Kannammal A (2011) Frequency domain combination for preserving data in space specified token with high security. In: Communications in computer and information science, Springer, Berlin, pp 319–330, vol 251. doi:10.1007/978-3-642-25327-0_28 Google Scholar
  6. 6.
    Anoop MS (2008) Elliptic curve cryptography, an implementation tutorial, Tata Elexsi Ltd, Thiruvananthapuram, IndiaGoogle Scholar
  7. 7.
    Waang L, Leedham CG (2005) A thermal vein pattern verification systems, pattern recognition and image analysis. Lecture notes in computer science, vol 3687, Springer, Berlin, pp 58–65Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Department of CSEThirumalai Engineering CollegeKanchipuramIndia
  2. 2.Coimbatore Institute of TechnologyCoimbatoreIndia

Personalised recommendations