Security of electronic transaction over insecure communication channel is a challenging task that
Background: Fingerprints are the impressions left on any material by the volar surface also called finger bulbs of the fingers. As per the law of individuality, each individual has a unique set of tiny raised ridges or friction ridges that have been considered necessary in individualization in forensic work. Friction ridges over their surfaces bear the small openings known as sweat pores. The latter are connected to ducts of sweat glands. These pores are also unique to each individual as per many studies and vary in their shape, size, location, and frequency over the friction ridges. Poroscopy is a method of personal identification in which the characteristics of sweat pores on the friction ridge impression of palmar and plantar surfaces are examined. The present study aimed to uncover the similarities in the sweat pores present on the friction ridges of an individual in respect to their position 'middle or periphery' and to their frequency per unit length and per unit area. Materials and methods: A total number of 50 samples were collected randomly from different male individuals (graduate and postgraduate students at Amity University). Rolled fingerprint impressions were collected on FBI fingerprint cards. The collected samples were then analyzed through a stereo-microscope and photomicrography for the shape, position, and the number of sweat pores on the friction ridges per unit length and per unit area. Besides, the number of pores present on three different fingers 'Thumb, Index, Ring' of an individual were considered for this study. Results: Our results report that no relationship exists between the position and frequency of sweat pores occurring per unit length and per unit area. However, a significant correlation exists between the number of pores per unit length and per unit area of the Thumb and Ring fingers for the middle position. Also, a significant correlation was observed between the number of pores per unit length and per unit area of the Index and Ring fingers for the periphery position. Conclusions: This study may provide useful information about sweat pores present on friction ridges and their utilization for personal identification up to an extent in the cases where very few ridges will be encountered on the crime scene. These data can further be used in forensic research involving individual identification from poroscopy.
Abstract-Data Security is a challenging issue of data communications today that touches many areas including secure communication channel, strong data encryption technique and trusted third party to maintain the database. The rapid development in information technology, the secure transmission of confidential data herewith gets a great deal of attention. The conventional methods of encryption can only maintain the data security. The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/ decryption methods to enhance data security. The multiple encryption techniques of present time cannot provide sufficient security. In this research paper, the new encryption technique named as -Multiphase Encryption is proposed. In this encryption technique, original data is encrypted many times with different strong encryption algorithms at each phase. This encryption technique enhances the complexity in encryption algorithm at large extent.Index Terms-Multiphase encryption, data security, multiple encryption.
Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the inventor's identity. There are many other algorithms which are based on the prime factorization and discrete logarithms problem but different weaknesses and attacks have been developed against those algorithms. This Research paper presents proposed scheme of digital signature algorithm which is based on factoring the product of two large prime numbers, the factoring problem with RSA algorithm using minimum two integer numbers. Proposed scheme of RSA have better security feature that involves the use of multiple integer numbers. As RSA has its own security issues that only a single integer number is used and is capable of generating single signature only. So for the purpose of security, proposed scheme has been presented which is comparatively much more secure and involves the use of multiple integer numbers to the primary integer number and increases difficulty of decryption key. The significant aspect of this proposed idea is that multiple public key exponents and private key exponents are used.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.