International Journal on Data Science and Technology

| Peer-Reviewed |

A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data

Received: 02 June 2016    Accepted: 09 July 2016    Published: 16 August 2016
Views:       Downloads:

Share This Article

Abstract

In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.

DOI 10.11648/j.ijdst.20160204.12
Published in International Journal on Data Science and Technology (Volume 2, Issue 4, July 2016)
Page(s) 46-50
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cryptography, Decryption, Hybrid Encryption Method, Image Processing, Plain-Text to the Cipher Text

References
[1] L. Devnath, A. K Paul, M. R Islam, (2016). “A Study on Binary Number of Gender Identification Based on Fingerprints”, “International Journal of Scientific & Engineering Research, Volume 7, Issue 2, Pages 338-342.
[2] Liddell, H. George, Scott, Robert, Jones, H. Stuart; McKenzie, Roderick. (1984). A Greek-English Lexicon. Oxford University Press.
[3] Bellare, Mihir, Rogaway, Phillip. (2005). "Introduction". Introduction to Modern Cryptography Page 10, https://en.wikipedia.org/wiki/Cryptography.
[4] P. Kuppuswamy, Saeed Q. Y. Al-Khalidi. (2014). “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, National Chengchi University & Airiti Press Inc, Vol. 19, No. 2, Pages 1-13.
[5] B. Adida, M. Bond, J. Clulow, A. Lin, Ross J. Anderson, and Ronald L. Rivest. (2007). On the security of the EMV secure messaging API (extended abstract). In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 5964 of Lecture Notes in Computer Science, Pages 147–149. Springer.
[6] A. Agrawal, G. Patankar. (2016). “Design of Hybrid Cryptography Algorithm for Secure Communication”, International Research Journal of Engineering and Technology, Volume: 03 Issue: 01.
[7] D. Harinath, M V Ramana Murthy, B Chitra. (2015). “Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7.
[8] S. Bhati, A. Bhati, S. K. Sharma. (2012). “A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithm”, Proceedings of the World Congress on Engineering and Computer Science, Vol II .
[9] D. Pointcheval, (2002). “Asymmetric Cryptography and Practical Security”, Journal of Telecommunications and Information Technology. Volume 4, Pages 41-56.
[10] J. M. Pollard. (July 1978). “Monte Carlo Methods for Index Computation (mod p)”, Mathematics of Computation, 32 (143), Pages 918-924.
Author Information
  • Mathematics Discipline, Khulna University, Khulna, Bangladesh

  • Mathematics Discipline, Khulna University, Khulna, Bangladesh

  • Mathematics Discipline, Khulna University, Khulna, Bangladesh

Cite This Article
  • APA Style

    Arindam Kumar Paul, Liton Devnath, Md. Rafiqul Islam. (2016). A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. International Journal on Data Science and Technology, 2(4), 46-50. https://doi.org/10.11648/j.ijdst.20160204.12

    Copy | Download

    ACS Style

    Arindam Kumar Paul; Liton Devnath; Md. Rafiqul Islam. A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. Int. J. Data Sci. Technol. 2016, 2(4), 46-50. doi: 10.11648/j.ijdst.20160204.12

    Copy | Download

    AMA Style

    Arindam Kumar Paul, Liton Devnath, Md. Rafiqul Islam. A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. Int J Data Sci Technol. 2016;2(4):46-50. doi: 10.11648/j.ijdst.20160204.12

    Copy | Download

  • @article{10.11648/j.ijdst.20160204.12,
      author = {Arindam Kumar Paul and Liton Devnath and Md. Rafiqul Islam},
      title = {A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data},
      journal = {International Journal on Data Science and Technology},
      volume = {2},
      number = {4},
      pages = {46-50},
      doi = {10.11648/j.ijdst.20160204.12},
      url = {https://doi.org/10.11648/j.ijdst.20160204.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ijdst.20160204.12},
      abstract = {In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data
    AU  - Arindam Kumar Paul
    AU  - Liton Devnath
    AU  - Md. Rafiqul Islam
    Y1  - 2016/08/16
    PY  - 2016
    N1  - https://doi.org/10.11648/j.ijdst.20160204.12
    DO  - 10.11648/j.ijdst.20160204.12
    T2  - International Journal on Data Science and Technology
    JF  - International Journal on Data Science and Technology
    JO  - International Journal on Data Science and Technology
    SP  - 46
    EP  - 50
    PB  - Science Publishing Group
    SN  - 2472-2235
    UR  - https://doi.org/10.11648/j.ijdst.20160204.12
    AB  - In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.
    VL  - 2
    IS  - 4
    ER  - 

    Copy | Download

  • Sections