In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication.
Reference:
Ntshangase, C.S. and Shabalala, M.B. 2018. Encryption using finger-code generated from fingerprints. 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 8-9 March 2018
Ntshangase, C. S., & Shabalala, M. B. (2018). Encryption using finger-code generated from fingerprints. Encryption using finger-code generated from fingerprints. http://hdl.handle.net/10204/10429
Ntshangase, Cynthia S, and Meshack B Shabalala. "Encryption using finger-code generated from fingerprints." (2018): http://hdl.handle.net/10204/10429
Ntshangase CS, Shabalala MB, Encryption using finger-code generated from fingerprints; Encryption using finger-code generated from fingerprints; 2018. http://hdl.handle.net/10204/10429 .
Copyright: 2018 IEEE. Due to copyright restrictions, the attached PDF file contains the accepted version of the published paper. For access to the published item, please consult the publisher's website (https://ieeexplore.ieee.org/document/8368743/)