Volume 2, Issue 4, July 2016, Page: 46-50
A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data
Arindam Kumar Paul, Mathematics Discipline, Khulna University, Khulna, Bangladesh
Liton Devnath, Mathematics Discipline, Khulna University, Khulna, Bangladesh
Md. Rafiqul Islam, Mathematics Discipline, Khulna University, Khulna, Bangladesh
Received: Jun. 2, 2016;       Accepted: Jul. 9, 2016;       Published: Aug. 16, 2016
DOI: 10.11648/j.ijdst.20160204.12      View  4091      Downloads  150
Abstract
In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.
Keywords
Cryptography, Decryption, Hybrid Encryption Method, Image Processing, Plain-Text to the Cipher Text
To cite this article
Arindam Kumar Paul, Liton Devnath, Md. Rafiqul Islam, A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data, International Journal on Data Science and Technology. Vol. 2, No. 4, 2016, pp. 46-50. doi: 10.11648/j.ijdst.20160204.12
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Reference
[1]
L. Devnath, A. K Paul, M. R Islam, (2016). “A Study on Binary Number of Gender Identification Based on Fingerprints”, “International Journal of Scientific & Engineering Research, Volume 7, Issue 2, Pages 338-342.
[2]
Liddell, H. George, Scott, Robert, Jones, H. Stuart; McKenzie, Roderick. (1984). A Greek-English Lexicon. Oxford University Press.
[3]
Bellare, Mihir, Rogaway, Phillip. (2005). "Introduction". Introduction to Modern Cryptography Page 10, https://en.wikipedia.org/wiki/Cryptography.
[4]
P. Kuppuswamy, Saeed Q. Y. Al-Khalidi. (2014). “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, National Chengchi University & Airiti Press Inc, Vol. 19, No. 2, Pages 1-13.
[5]
B. Adida, M. Bond, J. Clulow, A. Lin, Ross J. Anderson, and Ronald L. Rivest. (2007). On the security of the EMV secure messaging API (extended abstract). In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 5964 of Lecture Notes in Computer Science, Pages 147–149. Springer.
[6]
A. Agrawal, G. Patankar. (2016). “Design of Hybrid Cryptography Algorithm for Secure Communication”, International Research Journal of Engineering and Technology, Volume: 03 Issue: 01.
[7]
D. Harinath, M V Ramana Murthy, B Chitra. (2015). “Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7.
[8]
S. Bhati, A. Bhati, S. K. Sharma. (2012). “A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithm”, Proceedings of the World Congress on Engineering and Computer Science, Vol II .
[9]
D. Pointcheval, (2002). “Asymmetric Cryptography and Practical Security”, Journal of Telecommunications and Information Technology. Volume 4, Pages 41-56.
[10]
J. M. Pollard. (July 1978). “Monte Carlo Methods for Index Computation (mod p)”, Mathematics of Computation, 32 (143), Pages 918-924.
Browse journals by subject