Crypto key generation using contour graph algorithm

M. S. Al-Tarawneh*, L. C. Khor, W. L. Woo, S. S. Dlay

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Cryptography and biometrics have been identified as two of the most important aspects of digital security environment, for various types of security problems the merging between cryptography and biometrics has led to the development of Bio-Crypto technology. In this paper we propose a cryptography key generating methodology based on graph construction and adjacency matrix of extracted minutiae. The formation of graph relies on contour division of minutiae points area. Minutiae points area is studied on both scenarios (with singular point, and without singular point detection). Results show that with singular point detection the average of minutiae points area dimension is less than in the other case and at some points of threshold, it show an improvement performance comparing to the other one. 100% uniqueness key was achieved on both cases.

Original languageEnglish
Title of host publicationProceedings of the Third IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
PublisherACM
Pages95-98
Number of pages4
Volume2006
ISBN (Print)0-88986-580-9
Publication statusPublished - 15 Feb 2006
Event3rd IASTED International Conference on Signal Processing, Pattern Recognition, and Applications - Innsbruck, Austria
Duration: 15 Feb 200617 Feb 2006

Conference

Conference3rd IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Country/TerritoryAustria
CityInnsbruck
Period15/02/0617/02/06

Keywords

  • Adjacency matrix
  • Biometric
  • Contouring
  • Fingerprint
  • Minutiae
  • Security
  • String matching

Fingerprint

Dive into the research topics of 'Crypto key generation using contour graph algorithm'. Together they form a unique fingerprint.

Cite this