F. Encryption of the captured images
As in this research the biometric triaits are being
transmitted over the channel to a cloud service,
protectingthese traits is of great concern on host computer itself before transmission. End-to-End encryption process is used to
defend the biometric traits.
In this work, Advanced Encryption Standard-256algorithm is used. AES is based on a design principle
known as a substitution-permutation network, a
combination of both substiton and permutation, and is
fast in both software and hardware. Unlike its predecessor
DES, AES does not use a Feistel network. AES has a fixed
block size of 128 bits, and a key size of 128.192 or 256
bits. For more security, AES 256 is used