Biometric Authentication-Based Data Encryption Using ECG Analysis and Diffie–Hellman Algorithm

  • Archana BhardwajEmail author
  • Shikha Chaudhary
  • Vijay Kumar Sharma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Data security is becoming the prime concern these days. In the daily and day-to-day activities, data is required to be shared, whether it is a simple chat message or even the crucial business message or mail. In this paper, the unique concept of using the ECG reports as the authentication medium is proposed. First, the ECG report of the person is analyzed using sin charts and compared with the database. Before processing to the next phase, the user has to validate the transaction ID and SHA key generated using the. The next phase of the message transfer is further secured by providing the transaction id and encryption key. After that, the fingerprints of the users are validated again using the SHA-based concept of validation, and then to transfer data, Diffie–Hellman algorithm is used. In the dissertation, the double level security is maintained and implemented by making use of ECG reports and using the fingerprints. From the previous approaches and base papers, we have speed up the comparison process and reduce the time involved by making use of SHA-based analysis, and the double authentication helps us to deal with hackers in the better ways as compared to the previous approaches as now double efforts will be requirement by the hackers to break through the whole process. The uniqueness of the ECG report will act as uniquely validating the identity of two persons.


ECG analysis Heartbeat charts Message transfer 


  1. 1.
    Dalvi, G.D., Wakde, D.G.: Facial images authentication in visual cryptography using sterilization algorithm. In: 2nd International Conference for Convergence in Technology (I2CT) (2017)Google Scholar
  2. 2.
    Agrawal, E., Pal, P.R.: A new and more authentic cryptographic based approach for securing short message. Int. J. Adv. Res. Comput. Sci. 8 (2017)Google Scholar
  3. 3.
    Kumari, S.: A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. IJECS 6 (2017)Google Scholar
  4. 4.
    Agrawal, A., Patankar, G.: Design of hybrid cryptography algorithm for secure communication. Int. Res. J. Eng. Technol. IRJET 3 (2016)Google Scholar
  5. 5.
    Gençoğlu, M.T.: Mathematical cryptanalysis of personalized information encryption using ECG signals with chaotic functions. In: 2017 International Conference on Computer Science and Engineering (UBMK), Antalya (2017)Google Scholar
  6. 6.
    Slimane, N.B., Bouallegue, K., Machhout, M.: A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1. In: 2017 International Conference on Control, Automation and Diagnosis (ICCAD), Hammamet (2017)Google Scholar
  7. 7.
    Tian, F., Xue, H., Haiyang, X.: A secure public key encryption from computational linear Diffe-Hellman problem. In: 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou (2012)Google Scholar
  8. 8.
    Shah, D.: Digital security using cryptographic message-digest algorithm. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 3 (2015)Google Scholar
  9. 9.
    Javheri, S., Kulkarni, R.: Secure data communication and cryptography based on DNA based message encoding. Int. J. Comput. Appl. IJCA 98 (2014)Google Scholar
  10. 10.
    Chaudhari, M.P., Patel, S.R.: A survey on cryptography algorithms. Int. J. Adv. Res. Comput. Sci. Manage. Stud. IJARCSMS 2 (2014)Google Scholar
  11. 11.
    Durairajan, M.S., Saravanan, R.: Biometrics based key generation using Diffie Hellman key exchange for enhanced security mechanism. Int. J. Chem. Tech. Res. 6 (2014)Google Scholar
  12. 12.
    Arora, S., Singh, L., Kumar, A.: Comparison of images using MIAC algorithm. KIET, IJICI (2014)Google Scholar
  13. 13.
    Mushtaque, M.A., Dhiman, H., Hussain, S.: A hybrid approach and implementation of a new encryption algorithm for data security in cloud computing. Int. J. Electron. Electr. Eng. (2014)Google Scholar
  14. 14.
    Aggarwal, S., Goyal, N., Aggarwal, K.: A review of comparative study of MD5 and SHA security algorithm. Int. J. Comput. Appl. IJCA 104 (2014)Google Scholar
  15. 15.
    Singh, P., Singh, K.: Image encryption and decryption using Blowfish algorithm in Matlab. Int. J. Sci. Eng. Res. 4 (2013)Google Scholar
  16. 16.
    Al-Hazaimeh, O.M.A.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Netw. Commun. IJCNC 5 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Archana Bhardwaj
    • 1
    Email author
  • Shikha Chaudhary
    • 1
  • Vijay Kumar Sharma
    • 1
  1. 1.Department of CSERajasthan Institute of Engineering and TechnologyJaipurIndia

Personalised recommendations