Abstract
Data security is becoming the prime concern these days. In the daily and day-to-day activities, data is required to be shared, whether it is a simple chat message or even the crucial business message or mail. In this paper, the unique concept of using the ECG reports as the authentication medium is proposed. First, the ECG report of the person is analyzed using sin charts and compared with the database. Before processing to the next phase, the user has to validate the transaction ID and SHA key generated using the. The next phase of the message transfer is further secured by providing the transaction id and encryption key. After that, the fingerprints of the users are validated again using the SHA-based concept of validation, and then to transfer data, Diffie–Hellman algorithm is used. In the dissertation, the double level security is maintained and implemented by making use of ECG reports and using the fingerprints. From the previous approaches and base papers, we have speed up the comparison process and reduce the time involved by making use of SHA-based analysis, and the double authentication helps us to deal with hackers in the better ways as compared to the previous approaches as now double efforts will be requirement by the hackers to break through the whole process. The uniqueness of the ECG report will act as uniquely validating the identity of two persons.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dalvi, G.D., Wakde, D.G.: Facial images authentication in visual cryptography using sterilization algorithm. In: 2nd International Conference for Convergence in Technology (I2CT) (2017)
Agrawal, E., Pal, P.R.: A new and more authentic cryptographic based approach for securing short message. Int. J. Adv. Res. Comput. Sci. 8 (2017)
Kumari, S.: A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. IJECS 6 (2017)
Agrawal, A., Patankar, G.: Design of hybrid cryptography algorithm for secure communication. Int. Res. J. Eng. Technol. IRJET 3 (2016)
Gençoğlu, M.T.: Mathematical cryptanalysis of personalized information encryption using ECG signals with chaotic functions. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya (2017)
Slimane, N.B., Bouallegue, K., Machhout, M.: A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet (2017)
Tian, F., Xue, H., Haiyang, X.: A secure public key encryption from computational linear Diffe-Hellman problem. In: 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou (2012)
Shah, D.: Digital security using cryptographic message-digest algorithm. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 3 (2015)
Javheri, S., Kulkarni, R.: Secure data communication and cryptography based on DNA based message encoding. Int. J. Comput. Appl. IJCA 98 (2014)
Chaudhari, M.P., Patel, S.R.: A survey on cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 2 (2014)
Durairajan, M.S., Saravanan, R.: Biometrics based key generation using Diffie Hellman key exchange for enhanced security mechanism. Int. J. Chem. Tech. Res. 6 (2014)
Arora, S., Singh, L., Kumar, A.: Comparison of images using MIAC algorithm. KIET, IJICI (2014)
Mushtaque, M.A., Dhiman, H., Hussain, S.: A hybrid approach and implementation of a new encryption algorithm for data security in cloud computing. Int. J. Electron. Electr. Eng. (2014)
Aggarwal, S., Goyal, N., Aggarwal, K.: A review of comparative study of MD5 and SHA security algorithm. Int. J. Comput. Appl. IJCA 104 (2014)
Singh, P., Singh, K.: Image encryption and decryption using Blowfish algorithm in Matlab. Int. J. Sci. Eng. Res. 4 (2013)
Al-Hazaimeh, O.M.A.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Netw. Commun. IJCNC 5 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhardwaj, A., Chaudhary, S., Sharma, V.K. (2019). Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_46
Download citation
DOI: https://doi.org/10.1007/978-981-13-5934-7_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5933-0
Online ISBN: 978-981-13-5934-7
eBook Packages: EngineeringEngineering (R0)