2016
DOI: 10.1088/2040-8978/18/11/115701
|View full text |Cite
|
Sign up to set email alerts
|

Securing information using optically generated biometric keys

Abstract: In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…The iteration process is stopped when convergence between the recovered image and the original image is completed [35]- [37], [41]. The above steps are used to encode each image into its phase-only function, respectively.…”
Section: Encryptionmentioning
confidence: 99%
“…The iteration process is stopped when convergence between the recovered image and the original image is completed [35]- [37], [41]. The above steps are used to encode each image into its phase-only function, respectively.…”
Section: Encryptionmentioning
confidence: 99%
“…Optical security techniques have also been used for securing biometric data, or to generate keys based on it for the protection of key personal data [22][23][24][25][26][27][28]. Biometrics comprise the unique biological traits required to establish the identity of a human being.…”
Section: Introductionmentioning
confidence: 99%
“…Biometrics comprise the unique biological traits required to establish the identity of a human being. If this information is compromised in any way, it is almost impossible to assign new security measures such as a password or keys, given that the subject possesses only a fixed number of biometric traits [22][23][24][25][26][27][28]. The development of secure and effective systems based on biometric identifiers are therefore in high demand, and an area of increasing interest among researchers.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations