2 research outputs found

    Bio-cryptography using Zernike Moments and Key Generation by Cubic Splines

    Get PDF
    Cryptography is the process of protecting sensitive information and making it unreadable to unwanted parties. Since all algorithms that perform this task depend on the process of finding a suitable key, the key generation is considered the soul of powerful encryption. The traditionally generated keys are long and random, hence are difficult to memorize, and we need a database to store the keys. To alleviate this limitation, we use bio-cryptography that is combined of biometrics and cryptography. Using Bio-Cryptography generated keys provides the necessary security through powerful encryption and decryption of data. This paper uses cubic spline to generate a cryptographic key through extracting the features from fingerprint. The approach is based on extracting the features generated by using Zernike Moment on a biometric, and then sending these features to a Cubic-Spline Interpolator to generate the keys. A key encryption will be generated for every person through extracting the features from his / her biometric (fingerprint) and then applying these features on the cubic spline interpolator to obtain some points. These interpolated points will be used as keys to encrypt the information by using a suitable encryption algorithm.  The benefit presented by this approach is to ensure a high level of security to protect the information through generating secure keys ready to be used for unsecured channel. In this paper, we used fingerprints from Biometric Recognition Group - ATVS to examine the performance of this approach. Keywords: Biometrics, Key Generation, Zernike Moment, Cubic Spline, Cryptography, RSA, Fingerprint

    American standard code for information interchange mapping technique for text hiding in the RGB and gray images

    Get PDF
    One of the significant techniques for hiding important information (such as text, image, and audio) is steganography. Steganography is used to keep this information as secret as possible, especially the sensitive ones after the massive expansion of data transmission through the Internet inside a conventional, non-secret, file, or message. This paper uses the American standard code for information interchange (ASCII) mapping technique (AMT) to hide the data in the color and grey image by converting it in a binary form, also convert the three levels of the red, green, and blue (RGB) image and grey image in the binary form, and then hide the data through hiding every two bits of the text in the two bits of one of the levels from the RGB image and grey image that means the text will be distributed throughout the images and allows hiding large amounts of data. That will send the information in a good securing way
    corecore