A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Fingerprint bio-Crypto key generation using Scale Invariant Feature Transform (SIFT)
2016
International Journal of Computer Applications
Network security has become a great threat to the network accessible resources that consists of policies to prevent, monitor unauthorized access, modification, and misuse of computer network. Several algorithms and techniques were proposed for the secure transmission of data and to protect user"s privacy. Secret-key cryptography and public-key cryptography are the techniques used for the protection of security issues. However, such a key needs to be stored in a protected place or it should be
doi:10.5120/ijca2016912129
fatcat:r2dcoqdgxve5hlewxnmj23jhn4