Skip to main content

Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Abstract

Data security is becoming the prime concern these days. In the daily and day-to-day activities, data is required to be shared, whether it is a simple chat message or even the crucial business message or mail. In this paper, the unique concept of using the ECG reports as the authentication medium is proposed. First, the ECG report of the person is analyzed using sin charts and compared with the database. Before processing to the next phase, the user has to validate the transaction ID and SHA key generated using the. The next phase of the message transfer is further secured by providing the transaction id and encryption key. After that, the fingerprints of the users are validated again using the SHA-based concept of validation, and then to transfer data, Diffie–Hellman algorithm is used. In the dissertation, the double level security is maintained and implemented by making use of ECG reports and using the fingerprints. From the previous approaches and base papers, we have speed up the comparison process and reduce the time involved by making use of SHA-based analysis, and the double authentication helps us to deal with hackers in the better ways as compared to the previous approaches as now double efforts will be requirement by the hackers to break through the whole process. The uniqueness of the ECG report will act as uniquely validating the identity of two persons.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dalvi, G.D., Wakde, D.G.: Facial images authentication in visual cryptography using sterilization algorithm. In: 2nd International Conference for Convergence in Technology (I2CT) (2017)

    Google Scholar 

  2. Agrawal, E., Pal, P.R.: A new and more authentic cryptographic based approach for securing short message. Int. J. Adv. Res. Comput. Sci. 8 (2017)

    Google Scholar 

  3. Kumari, S.: A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. IJECS 6 (2017)

    Google Scholar 

  4. Agrawal, A., Patankar, G.: Design of hybrid cryptography algorithm for secure communication. Int. Res. J. Eng. Technol. IRJET 3 (2016)

    Google Scholar 

  5. Gençoğlu, M.T.: Mathematical cryptanalysis of personalized information encryption using ECG signals with chaotic functions. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya (2017)

    Google Scholar 

  6. Slimane, N.B., Bouallegue, K., Machhout, M.: A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet (2017)

    Google Scholar 

  7. Tian, F., Xue, H., Haiyang, X.: A secure public key encryption from computational linear Diffe-Hellman problem. In: 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou (2012)

    Google Scholar 

  8. Shah, D.: Digital security using cryptographic message-digest algorithm. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 3 (2015)

    Google Scholar 

  9. Javheri, S., Kulkarni, R.: Secure data communication and cryptography based on DNA based message encoding. Int. J. Comput. Appl. IJCA 98 (2014)

    Google Scholar 

  10. Chaudhari, M.P., Patel, S.R.: A survey on cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 2 (2014)

    Google Scholar 

  11. Durairajan, M.S., Saravanan, R.: Biometrics based key generation using Diffie Hellman key exchange for enhanced security mechanism. Int. J. Chem. Tech. Res. 6 (2014)

    Google Scholar 

  12. Arora, S., Singh, L., Kumar, A.: Comparison of images using MIAC algorithm. KIET, IJICI (2014)

    Google Scholar 

  13. Mushtaque, M.A., Dhiman, H., Hussain, S.: A hybrid approach and implementation of a new encryption algorithm for data security in cloud computing. Int. J. Electron. Electr. Eng. (2014)

    Google Scholar 

  14. Aggarwal, S., Goyal, N., Aggarwal, K.: A review of comparative study of MD5 and SHA security algorithm. Int. J. Comput. Appl. IJCA 104 (2014)

    Google Scholar 

  15. Singh, P., Singh, K.: Image encryption and decryption using Blowfish algorithm in Matlab. Int. J. Sci. Eng. Res. 4 (2013)

    Google Scholar 

  16. Al-Hazaimeh, O.M.A.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Netw. Commun. IJCNC 5 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Archana Bhardwaj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhardwaj, A., Chaudhary, S., Sharma, V.K. (2019). Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_46

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5934-7_46

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5933-0

  • Online ISBN: 978-981-13-5934-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics