dc.contributor.author |
Ntshangase, Cynthia S
|
|
dc.contributor.author |
Shabalala, Meshack B
|
|
dc.date.accessioned |
2018-10-01T10:13:28Z |
|
dc.date.available |
2018-10-01T10:13:28Z |
|
dc.date.issued |
2018-03 |
|
dc.identifier.citation |
Ntshangase, C.S. and Shabalala, M.B. 2018. Encryption using finger-code generated from fingerprints. 2018 Conference on Information Communications Technology and Society (ICTAS), Durban, South Africa, 8-9 March 2018 |
en_US |
dc.identifier.isbn |
978-1-5386-1001-5 |
|
dc.identifier.isbn |
978-1-5386-1000-8 |
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/8368743/
|
|
dc.identifier.uri |
DOI: 10.1109/ICTAS.2018.8368743
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/10429
|
|
dc.description |
Copyright: 2018 IEEE. Due to copyright restrictions, the attached PDF file contains the accepted version of the published paper. For access to the published item, please consult the publisher's website (https://ieeexplore.ieee.org/document/8368743/) |
en_US |
dc.description.abstract |
In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Encryption using finger-code generated from fingerprints |
en_US |
dc.relation.ispartofseries |
Worklist;21353 |
|
dc.subject |
Cryptography |
en_US |
dc.subject |
Fingerprint |
en_US |
dc.subject |
Finger-code |
en_US |
dc.subject |
Minutiae |
en_US |
dc.title |
Encryption using finger-code generated from fingerprints |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Ntshangase, C. S., & Shabalala, M. B. (2018). Encryption using finger-code generated from fingerprints. Encryption using finger-code generated from fingerprints. http://hdl.handle.net/10204/10429 |
en_ZA |
dc.identifier.chicagocitation |
Ntshangase, Cynthia S, and Meshack B Shabalala. "Encryption using finger-code generated from fingerprints." (2018): http://hdl.handle.net/10204/10429 |
en_ZA |
dc.identifier.vancouvercitation |
Ntshangase CS, Shabalala MB, Encryption using finger-code generated from fingerprints; Encryption using finger-code generated from fingerprints; 2018. http://hdl.handle.net/10204/10429 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Ntshangase, Cynthia S
AU - Shabalala, Meshack B
AB - In this paper, the literature survey of different algorithms for generating encryption keys using fingerprints is presented. The focus is on fingerprint features called minutiae points where fingerprint ridges end or bifurcate. Minutiae points require less memory and are processed faster than other fingerprint features. In addition, presented is the proposed efficient method for cryptographic key generation using finger-codes. The results show that the length of the key, computing time and the memory it requires is efficient for use as a biometric key or even as a password during verification and authentication.
DA - 2018-03
DB - ResearchSpace
DP - CSIR
KW - Cryptography
KW - Fingerprint
KW - Finger-code
KW - Minutiae
LK - https://researchspace.csir.co.za
PY - 2018
SM - 978-1-5386-1001-5
SM - 978-1-5386-1000-8
T1 - Encryption using finger-code generated from fingerprints
TI - Encryption using finger-code generated from fingerprints
UR - http://hdl.handle.net/10204/10429
ER -
|
en_ZA |