Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective Retinal Features based Cryptographic Algorithm for Enhanced Security

M. Suresh Kumar, N. Kamalraj


Security break and transaction fraud is increasing, so that in a daily secure identification and personal verification technology came into picture. Every Organization needs to protect their secured information from either internal or external threat. Various biometric techniques have been developed for having secured information in the organization. Recently, Biometric techniques are integrated with the cryptographic technique for better security and authentication. This paper concentrates on the integration of biometric features with cryptographic techniques for better security and authentication using the retinal biometrics. Retina is considered as the most accurate and secure biometric feature. The retinal feature is extracted based on the steps like Extraction of Retinal Vascular Tree, Thinning and Joining, Feature Extraction. Reed–Solomon (RS) error correcting algorithm is utilized to encrypt and decrypt the data. The performance of the proposed approach is compared with the existing approach which uses iris feature and the results confirms that the proposed approach has better FAR (False Acceptance Ratio) and FRR (False Reject Ratio).


Security, Retinal Vascular Tree, Reed–Solomon (RS), FAR (False Acceptance Ratio) and FRR (False Reject Ratio)

Full Text:



Rajibul Islam, M.; Shohel Sayeed, M.; Samraj, A.; ―Multimodality to improve security and privacy in fingerprint authentication system‖, International Conference on Intelligent and Advanced Systems (ICIAS), Pp. 753 – 757, 2007.

Wayman, J.L.; ―Biometrics in Identity Management Systems‖, IEEE Security & Privacy, Vol. 6, No. 2, Pp. 30 – 37, 2008.

Ratha, N. K.; Connell, J. H.; Bolle, R. M.; ―Enhancing security and privacy in biometrics-based authentication systems‖, IBM Systems Journal, Vol. 40, No. 3, Pp. 614 – 634, 2001.

Sangkyu Kang; Abidi, B.; Abidi, M.; ―Integration of color and shape for detecting and tracking security breaches in airports‖, 38th Annual International Carnahan Conference on Security Technology, Pp. 289 – 294, 2004.

Nithyanandam, S.; Gayathri, K.S.; Raja, K.; Priyadarsini, P.L.K.; ―Recent Trends in Secure Personal Authentication for Iris Recognition Using Novel Cryptographic Algorithmic Techniques‖, International Conference on Process Automation, Control and Computing (PACC), Pp. 1 – 6, 2011.

Fenn, S.T.J.; Benaissa, M.; Taylor, D.; ―Decoding double-error-correcting Reed-Solomon codes‖, IEE Proceedings-Communications, Vol. 142, No. 6, Pp. 345 – 348, 1995.

Andrew B. J. Teoh, Kar-Ann Toh and Wai Kuan Yip. ―2^N Discretisation of BioPhasor in Cancellable Biometrics‖, 2nd International Conference on Biometrics, Korea University Seoul Korea, LNCS 4642, Pp. 435-444, 2007.

Tulyakov, S.; Farooq, F. and Govindaraju, V. Symmetric Hash Functions for Fingerprint Minutiae. International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Vol. 3687, Pp. 30-38. 2005.

Emanuele Maiorana, Patrizio Campisi, Alessandro Neri, ―Template protection for dynamic time warping based biometric signature authentication‖, Proceedings of the 16th international conference on Digital Signal Processing Santorini, Greece, 2009

M. G. Linnartz and P. Tuyls, ―New shielding functions to enhance privacy and prevent misuse of biometric templates‖, In AVBPA, Pp. 393–402, 2003.

Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, and Adam Smith, ―Secure remote authentication using biometric data‖, In Ronald Cramer, editor, Advances in Cryptology— EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, Pp. 147–163, 2005.

F. Hao, R. Anderson, and J. Daugman, ―Combining crypto with biometrics effectively," IEEE Transactions on Computers, Vol. 55, Pp. 1081-1088, 2006.

K. Bae, S. Noh, and J. Kim, ―Iris feature extraction using independent component analysis,‖ in Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA ’03), Vol. 2688, Pp. 1059–1060, Guildford, UK, June 2003.

N. K. Ratha, J. H. Connell, R. M. Bolle, ―Enhancing security and privacy in biometrics-based authentication systems‖, IBM Systems Journal, Vol. 40, No. 3, Pp. 614-634, 2001.

Zhaofeng He, Tieniu Tan, Zhenan Sun and Xianchao Qiu, ―Toward Accurate and Fast Iris Segmentation for Iris Biometrics,‖ IEEE

Transactions on Pattern Analysis and Machine Intelligence, Vol. 31, No. 9, Pp. 1670 – 1684, 2009.

K. Saraswathi, B. Jayaram and Dr. R. Balasubramanian, ―Retinal Biometrics based Authentication and Key Exchange System‖, International Journal of Computer Applications (0975 – 8887), Volume 19– No.1, April 2011.

Mamidi, S.; Schulte, M.J.; Iancu, D.; Iancu, A.; Glossner, J.; ―Instruction set extensions for Reed-Solomon encoding and decoding‖, 16th IEEE International Conference on Application-Specific Systems, Architecture Processors (ASAP), Pp. 364 – 369, 2005.

Ayasun, S.; Nwankpa, C.O.; Kwantny, H.G.; ―Numerical issues in the location of singularity-induced bifurcation points‖, IEEE Power Engineering Society 1999 Winter Meeting, Vol. 1, Pp. 707 – 712, 1999.

Kao, R.-S.; Gibbs, V.L.; ―A fast Reed-Solomon and cyclic redundancy check encoding algorithm for optical disk error control‖, Proceedings., Seventh Annual IEEE International ASIC Conference and Exhibit, Pp. 250 – 253, 1994.

Real Time Retinal data set []


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.