A palmprint-based cryptosystem using double encryption

Amioy Kumar, Ajay Kumar, B.V.K. Vijaya Kumar, Salil Prabhakar, Arun A. Ross
2008 Biometric Technology for Human Identification V  
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryptions. The cipher text of any document is
more » ... by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Reed and Solomon codes are then used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the real palmprint images suggest its possible usage in an automated palmprint based key generation system.
doi:10.1117/12.778833 fatcat:cpcbdgraq5gpzmmgrbbb653dva