Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 1
Abstract
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES key is generated from Minutiae Points in fingerprint. By other way, we talk about biometric-cryptosystem, which is hybrid between one of the cryptosystems and biometric systems, such as fingerprint using for authentication as well as to generate cryptographic key to encrypt voice over IP by applying AES. In this paper, we define a new term which is Fingerprint Distribution Problem (FDP) based on Key Distribution Problem. Also, we suggest a solution for this problem by encrypted fingerprint before sending between users by using one of the public key cryptosystems which is RSA Algorithm.
Authors and Affiliations
Mohammad Fawaz Anagreh, Anwer Mustafa Hilal, Tarig Mohamed Ahmed
Spontaneous-braking and lane-changing effect on traffic congestion using cellular automata model applied to the two-lane traffic
In the real traffic situations, vehicle would make a braking as the response to avoid collision with another vehicle or avoid some obstacle like potholes, snow, or pedestrian that crosses the road unexpectedly. However,...
An Improved Grunwald-Letnikov Fractional Differential Mask for Image Texture Enhancement
Texture plays an important role in identification of objects or regions of interest in an image. In order to enhance this textural information and overcome the limitations of the classical derivative operators a tw...
A NEW APPROACH FOR HIDING DATA USING B-BOX
Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem fo...
An Efficient Algorithm for Enumerating all Minimal Paths of a Graph
The enumeration of all minimal paths between a terminal pair of a given graph is widely used in a lot of applications such as network reliability assessment. In this paper, we present a new and efficient algorithm to gen...
Simulation of Shunt Active Power Filter Controlled by SVPWM Connected to a Photovoltaic Generator
In this paper we study the shunt active power filter. This filter contains a voltage three-level inverter controlled by the SVPWM strategy supplied by a the DC bus powered by a solar array to improve the quality of elect...