Integrity, non repudiation, confidentiality, and authentication are important entities in information security . cryptography is the field of writing a secret code . Biometric identity authentication systems are based on the biological uniqueness of a person like face, voice, finger print, iris, gait, hand geometry or signature. Identity authentication using the face or the voice information is a challenging research area that is currently very active.In this paper progress on new method using combination of PCA and ECC to identify and authenticate a person based on face. ECC is very effient interms of its performance and operations with respective constrained devices. Using this we can simply identify a person based on his/her face . as this is the simple method to implement and required less computational time.This method of implementation is economy and also effieceint.
ECC, XOR, Encryption, Decryption
Share This Article
© The Author(s) 2015. Open Access. This article is distributed under the terms of the Creative Commons Attribution 4.0 International License which permits unrestricted use, sharing, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.