700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ ReadersThis Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)
Research Article Open Access
In recent days, for secure information transaction through internet, the most used term is cryptography. Where encryption algorithm, decryption algorithm, key generation algorithm and key matching algorithms are used for proper secure transaction from sender to receiver, avoiding any middle attacker. Here the main concept of the paper comes from cryptography, which is combined with the fingerprint geometry, which is the current leader of Biometric Authentication. Here the fingerprint geometry is used for key generation, information deduction from the key. Here the fingerprint matching algorithm would be used for information deduction from key. To implement the above concept, sender’s recent fingerprint geometry would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are already kept by receiver at receiver’s end would be used. Here the fingerprint matching algorithms would be used, which are applied on the binary conversion of the fingerprint images. For this purpose the whole technique is applicable on the binary form. So, for another part of cryptography, means for encryption and decryption process, the binary form of the data is taken. So the steps may be applicable on any type of data, means text, image, multimedia, graphics data etc.