dc.contributor.author | Gobinath, Subramaniam | |
dc.contributor.author | Kalyani, Subramanian | |
dc.contributor.author | Senthil, Raja Balakrishnan | |
dc.contributor.author | Baskaran, Kaliaperumal | |
dc.date.accessioned | 2009-11-17T07:41:49Z | |
dc.date.available | 2009-11-17T07:41:49Z | |
dc.date.issued | 2009-10-11 | |
dc.identifier.citation | p.3A3 1 - 3A3 5 | en_US |
dc.identifier.uri | http://dspace.unimap.edu.my/123456789/7310 | |
dc.description | Organized by School of Mechatronic Engineering (UniMAP) & co-organized by The Institution of Engineering Malaysia (IEM), 11th - 13th October 2009 at Batu Feringhi, Penang, Malaysia. | en_US |
dc.description.abstract | Biometrics systems function to identify
individuals by matching a specific personal
characteristic, the biometrics identifier, with one previously recorded. Biometric identification considers individual physiological characteristics and/or typical behavioural patterns of a person to validate their authenticity. Fingerprints are used to
generate the key; this key value is used in the Data Encryption Standard (DES) algorithm. Initially the finger print image is converted into a pixel matrix. After the matrix conversion the matrix is applied into
the one way hash function. The hash code value is a 64 bit string value. This hash code value is passed into the DES algorithm as key for the encoding and decoding process. This 64-bit key value is converted
as a 56 bit key value by the DES algorithm
computational operations. The system also performs an authentication checking process in the decryption process to verify the correctness of the key value. Fingerprint Selection contains receiving finger print
data and conversion of finger print values into matrix tasks. This accepts the finger print data as an image file. Key Generation generates the key for the security system. Using the selected finger print image data
generates the key value. Encryption performs the document encoding task. The user can select any file for the encryption process. Decryption process is performed to retrieve the original document from the encoded document. Biometrics offers new perspectives in high-security applications while
supporting natural, user-friendly and fast
authentication. | en_US |
dc.description.sponsorship | Technical sponsored by IEEE Malaysia Section | en_US |
dc.language.iso | en | en_US |
dc.publisher | Universiti Malaysia Perlis | en_US |
dc.relation.ispartofseries | Proceedings of the International Conference on Man-Machine Systems (ICoMMS 2009) | en_US |
dc.subject | Data encryption standard | en_US |
dc.subject | Authentication | en_US |
dc.subject | Key generation | en_US |
dc.subject | Biometrics systems | en_US |
dc.subject | Biometry | en_US |
dc.subject | Identification -- Automation | en_US |
dc.subject | Biometric identification | en_US |
dc.subject | Fingerprints | en_US |
dc.title | Des enabled fingerprint system | en_US |
dc.type | Working Paper | en_US |