MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja

Size: px
Start display at page:

Download "MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja"

Transcription

1 MySQL and MATLAB Interfacing for Biometric Template Protection with Encryption M.Mani Roja Dr.Sudhir Sawarkar Research Scholar, Principal, Sant Gadge Baba Amravati University, Datta Meghe College of Engineering, Asso. Professor, TSEC, Mumbai Mumbai. Abstract A new approach for biometric database management is presented with enhanced security features. This paper attempts to improve the security of biometric database system by interfacing with MySQL server. The signature templates are acquired for the database using digital pen tablet, encrypted using a simple pseudo noise based algorithm and then stored on the MySQL server. During the authentication phase, the signatures are brought from the database for feature extraction. After decryption, they are compared with query template. Since, the database is password protected, it provides double security against adversary attacks. 1. Introduction Biometric recognition (recognizing of individuals based on their anatomical or behavioural traits) is emerging as the mainstay of person authentication. This is primarily driven by the inherent reliability and convenience of biometric systems over traditional authentication mechanisms (such as passwords or tokens) that can be easily shared, guessed, lost, or stolen. Traditionally, a combination of ID cards (tokenbased security) and PINs/passwords (knowledge-based security) has been used to validate the identity of an individual. These methods are, however, vulnerable to the wiles of an impostor and cannot be reliably used in large-scale applications such as border control, where the throughput is required to be in the order of thousands of users per day. The advent of biometrics has introduced a secure and efficient alternative to traditional authentication schemes. Biometrics is the science of establishing or determining an identity based on the physiological or behavioural traits of an individual. These traits include fingerprints, facial features, iris, hand geometry, voice, signature, etc. In conjunction with traditional authentication schemes, biometrics is a potent tool for establishing identity [1-4]. 2. Biometric System Modules Every biometric system is composed of four main modules [4-5]. 2.1 Sensor module Sensor is the interface between the user and the authentication system. Its function is to scan the biometric trait of a user and makes a digital description of it. 2.2 Feature extraction module This module processes the scanned biometric trait and generates the template. Feature vectors are extracted from the template. These feature vectors are useful in distinguishing between different users. 2.3 Matcher module The matcher module accepts two biometric feature sets, template and test image and outputs a match score indicating the correlation between the two sets. 2.4 Decision module The decision module makes the identity decision and initiates a response based on the matching score. 3. Biometric Security Attacks Ratha et.al [6] identified eight points of attack in a biometric system as shown in fig 1. Fig 1. Various attacks on Biometric System These attacks are 1. Sensor level attack: If the sensor is unable to distinguish between the fake and genuine 114

2 biometric traits, the adversary easily intrudes the system by presenting a fake biometric sample such as fake finger or a face mask, 2. Replay attack: This attack is also known as the attack on the channel between the scanner and the feature extractor. In this type, the adversary intercepts the unsecured communication channel between the sensor and the feature extractor to steal the biometric traits and store it somewhere. The adversary can replay the stolen biometric traits like an old copy of a signature image or a recorded voice sample to the feature extractor to bypass the scanner. 3. Trojan horse attack: This is an attack on the software module. The executable program in the feature extractor module is modified with a Trojan horse such that it always outputs the values desired by the adversary. Trojan Horses in general can be controlled remotely. Hence the adversary simply sends the commands to the Trojan horse to send desired feature values to matching module. 4. Spoofing the biometric feature: Here the adversary attacks the channel between the feature extraction module and matching module. This attack is similar to Trojan horse attack. The difference is that the adversary intercepts the communication channel to steal feature values of a legitimate user and replay them to the matching module at a later time 5. Attack on matching module: This attack is similar to Trojan horse attack. Here, the adversary replaces the matching module with a Trojan horse. He can control the Trojan horse to generate high matching scores and accepts the application to bypass the biometric authentication system. In a similar manner, the adversary can produce a very low matching score and send a rejection to the legitimate user all the time causing a denial of service. 6. Database attack: This is one of the most potentially damaging attacks on a biometric system. This attack targets the biometric templates stored in the system data base. Attacks on the template can lead to the following effects. A legitimate user s template can be replaced by an impostor s template. An adversary can delete the templates present in the data base or he can add new templates in the database. As a result, either an impostor is granted authentication or a legitimate user faces a denial of service. 7. Attack on the channel between the system data base and matching module: Since the stored templates are transmitted to the matching module through the communication channel, the adversary intercepts the channel to change the data present in the channel. 8. Attack on the decision process: In this type of attack, the final decision can be altered by the adversary. 4. Template Protection The template protection schemes proposed in the literature can be broadly classified into two categories namely feature transformation approach and biometric cryptosystem [7, 8]. In feature transform approach, a transformation function is applied to the biometric template and only the transformed template is stored in the database. The same transformation function is applied to the template under test and the transformed test template is directly matched against the transformed reference template. Biometric crypto systems are developed for the purpose of either securing a cryptographic key using biometric features or directly generating a cryptographic key from biometric features. Some template protection schemes make use of more than one approach. Such techniques are called as hybrid schemes. 5. Proposed System We have designed a signature based authentication system for low level authentication system. The signature samples are collected using Wacom digital pen tablet. We have collected 5 samples from 70 users. Hence our database consists of 350 samples. The signature is resized to a size of 128 by 256 and after applying pre-processing steps like binarization and thinning, biometric signature template is included in the database. Fig 2 Wacom Digital Pen tablet In our work, first we are using a simple Pseudo noise (PN) based encryption scheme for encrypting the 115

3 sample signatures collected from the users. This encryption gives first level of security. These encrypted templates are saved in password protected data base to give double protection with database attack to protect the templates which enhances the security of the system. The proposed block diagram is shown in fig 3. 1). Decide the password. For example, maniroja is taken as a password. 2).Allot the corresponding numerical values to the password. Assigning numerals 1 to 26 corresponding to the alphabets a to z, the values corresponding to maniroja are found as 13 for m, 1 for a, 14 for n and so on. 3). Add all the numerical values. For the selected example, we get 81. 4). The resulting number is reversed in order and will be used as a seed state. Hence we get 18 as the seed state for the PN sequence generator. Since the seed state is known only to the authorized user, an intruder trying to access the database will not be able to decrypt the templates. For generating the PN image we have used the following MATLAB command with the derived seed number 18, Randint (256, 256, [0,255], 18) This command produces a random image of size 256 x 256. The gray levels of the generated image are in the range 0 to 255. Fig 3. Bio Metric Database Management System 6. Encryption for Template Protection The role of Encryption is to secure information when it is stored or in transit [9]. In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually, referred to as a key. The result of this process is encrypted information (in cryptography, referred to as cipher text). 6.1 PN Sequence for encryption PN sequences look like a random noise but they are not purely random in nature. When we multiply the PN sequence with the signature template, the resulting image resembles noise. However, during decryption, this noise-like signal can be used to exactly reconstruct the original image by multiplying it by the same pseudorandom sequence. Using this scheme, the initial seed state which is nothing but the key is only needed to generate exactly the same sequence of length. We have decided the following algorithm to generate the seed state for the PN sequence generator. 7. MySQL for Database Management MySQL is the most popular open source SQL database management system distributed by Oracle Corporation. The SQL part of MySQL stands for structured Query language. MySQL server was originally developed to handle large databases much faster than existing solutions. Its connectivity, speed and security make MySQL server highly suited for accessing databases on the internet [10]. A data base is a structure that comes in two types: a flat data base and a relational database. A relational database is much oriented to the human mind and is often preferred over flat database that are just stored on the hard drives like a text file. MySQL is a relational database. In relational database, the data is stored in a tabular format. The columns define which kind of information will be stored in the table. An individual column must be created for each type of data you wish to store like age, weight and height. On the other hand, a row contains the actual values for these specified columns. Each row will have one value for each and every column. For example, a table with columns name, age and weight could have a row with values John, 15, 75. Important features of MySQL are 1. It works on different platforms. 116

4 2. It has lots of column types like signed and unsigned integers upto 8 bytes long, float double, blob, char and varchar 3. A privilege and password system which is very flexible and secure 4. Handles large database 8. Interfacing MATLAB with MySQL To improve the security of the system, we have stored our templates in the password protected MySQL server. Only the authorized user will be able to access the data base. Matlab database toolbox does not support the data types blob and long blob. Hence custom functions were developed in Matlab which were written in native java for long blob database calls. To store the templates in the server, we have followed the following steps. In the first step, we have initialized MySQL server by entering the server name, user name and the password. 1. Since we are dealing with signature recognition, we have created a table in the data base with the name, signature. 2. The row and columns of the table are initialized such that the row entry consists of the identity of the image and the column entry will have the binary values associated with the given image. Now the MySQL server is ready to accept the signature templates. 3. Through the following Matlab subroutine, the connection between the MYSQL server and Matlab is established. function con = getdbconnection() url 'jdbc:mysql://localhost:3306/'; Database = input('enter database name '); url = [url Database]; username = input('enter user name for database); password = input('enter password '); con java.sql.drivermanager.getconnection (url,username,password); 4. The templates which we want to protect in the data base have been imported to Matlab work space using the following subroutine function out = copyimg2workspace(di) cpdir = input('enter the directory path to copy '); imgdir = [pwd '\' di]; copyfile(cpdir,imgdir); addpath([pwd '\' di]); out = imgdir; 5. We have written the matlab function which will specify the source folder in Matlab workspace and the Destination folder in the database to copy the templates into the database. Once we run the function, the complete template folder will be moved into the database. function out = insertimg2db(con,imgdir,dbtable) import java.io.file import java.io.fileinputstream import java.sql.preparedstatement import javax.activation.mimetypesfiletypemap 6. To modify the database, another Matlab function is written which will specify a folder in Matlab workspace as a destination folder and the source folder as the database folder. Once the modifications are done like adding some templates and deleting some templates, again we can store the database in the server. function out = getdb2im (con,imgdir,format,imgtable) import java.io.file import java.sql.preparedstatement import java.awt.image.bufferedimage import javax.imageio.imageio query = ['SELECT * FROM ' imgtable]; smt = con.preparestatement(query); res = smt.executequery(); imgdir = [pwd '\' imgdir]; Since the entire operation is password protected, for an adversary without knowing the password, it will be difficult to access the database. Hence we have improved the security of our database. 9.Implementation and Results During the enrolment phase, the collected signature samples are preprocessed, and then encrypted using the PN image. The cipher templates thus generated are saved in the MySQL server. During the authentication phase, the person who wants to be authenticated is provided with the digital tablet for the purpose of collecting query signature sample. Feature vectors from this test signature are extracted using discrete wavelet transform (DWT) [11, 12]. Now the data base has been brought to Matlab workspace from MySQL server for comparison. Since the store templates are in encrypted form, first they are decrypted by combining with same the PN sequence which is generated using seed number 18. As 117

5 M Mani Roja et al,int.j.computer Techology & Applications,Vol 3 (1), a result, we get the original signature template. The following fig.4 shows the encryption and decryption process of an example signature template. Signature Template PN image 9. Acknowledgement Our sincere thanks to Mr. Jaikumar Bhambhwani, TSEC, who has contributed towards interfacing MATLAB with MySQL server. Encrypted Template Decrypted Template Fig 4: Encryption and Decryption of Signature Template Now the Feature vectors are extracted from the restored templates and compared with query template feature vectors. Match scores are generated using Euclidean distance classifier. If there is a match, authentication is granted otherwise, the person is rejected. Once the decision is taken, the data base signatures after encryption have been removed from the Matlab workspace and then sent back to MySQL server to maintain security. 8. Conclusion We have developed an easy and secure approach for the protection of biometric database protection using MySQL server. Since, the templates are stored in encrypted form; the security of the system is enhanced. Our system is found to be working successfully. In future to improve the security, we are planning to store the hash function of the given biometric template along with the template in the database. Once the image is called for training purpose from the database, the same hash function will be generated and it will be compared with the extracted database. REFERENCES [1] Anil K. Jain, Arun Ross and Salil Prabhakar, An Introduction to Biometric Recognition, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January [2] Sulochana Sonkamble, Ravindra Thool, Balwant Sonkamble, Survey of Biometric Recognition Systems and their applications, Journal of Theoretical and Applied Information Technology, [3] Payman Moallem1, Seyed Amirhassan Monadjemi, Dynamic Online Signatures Recognition using a novel Signature base normalized feature string and MLP Neural Network, Iranian Journal of Engineering sciences, Vol.1, No.1,2007. [4] Lin Hong and Anil Jain, Integrating Faces and Fingerprints for Personal Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.20, No.12, December [5] Arun Ross, Anil Jain, Information fusion in biometrics, Pattern Recognition Letters 24, (2003) [6] N. K. Ratha, J. H. Connell, and R. M. Bolle, An analysis of minutiae matching strength, in Proceedings of the 3rd International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA 01), pp , Halmstad, Sweden,June [7] Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, Volume 2008, Article ID [8]Manvjeet Kaur, Sanjeev Sofat and Deepak Saraswat, Template and Database Security in Biometric Systems: A Challenging Task, International Journal of Computer Applications, Volume 4-No.5, July [9] William Stallings Network Secrity and Cryptograpgy, Pearson Education 4 th editon. [10] reference date 28 th of May [11] Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing, 2 nd edition, Prentice Hall,Newyork, Sept [12] S. Jayaraman, S Esakkirajan, T Veerakumar, Digital Image Processing, by Mc Graw Hill,

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA Pravin M.Sonsare

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

BIOMETRIC TECHNOLOGY: A REVIEW

BIOMETRIC TECHNOLOGY: A REVIEW International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Encryption of Text Using Fingerprints

Encryption of Text Using Fingerprints Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

A Study on Attacks and Security Against Fingerprint Template Database

A Study on Attacks and Security Against Fingerprint Template Database A Study on Attacks and Security Against Fingerprint Template Database Abstract: Biometric based authentication, the science of using physical or behavioral characteristics for identity verification is

More information

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

Biometric Template Security Attack: A Review

Biometric Template Security Attack: A Review IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 04-08 National Symposium on engineering and Research Biometric Template Security Attack: A Review Mrs.Swati A.Jadhav M.E.[computer]student,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

How to Attack Biometric Systems in Your Spare Time

How to Attack Biometric Systems in Your Spare Time How to Attack Biometric Systems in Your Spare Time Ahmed Obied Department of Computer Science University of Calgary 2500 University Drive NW Calgary, Alberta, Canada T2N 1N4 obieda@cpscucalgaryca ABSTRACT

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

CSE / 60537: Biometrics

CSE / 60537: Biometrics CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?

More information

Biometric Security Technique: A Review

Biometric Security Technique: A Review ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.

More information

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Biometric Quality on Finger, Face and Iris Identification

Biometric Quality on Finger, Face and Iris Identification Biometric Quality on Finger, Face and Iris Identification M.Chandrasekhar Reddy PG Scholar, Department of ECE, QIS College of Engineering & Technology, Ongole, Andhra Pradesh, India. Abstract: Most real-life

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Level of Fusion

More information

Multimodal Biometric Authentication using Face and Fingerprint

Multimodal Biometric Authentication using Face and Fingerprint IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow

More information

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion

K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India

More information

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system

More information

Cryptosystem based Multimodal Biometrics Template Security

Cryptosystem based Multimodal Biometrics Template Security Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation

More information

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future

More information

Multimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology

Multimodal Biometric Approaches to Handle Privacy and Security Issues in Radio Frequency Identification Technology Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

Authentication Objectives People Authentication I

Authentication Objectives People Authentication I Authentication Objectives People Authentication I Dr. Shlomo Kipnis December 15, 2003 User identification (name, id, etc.) User validation (proof of identity) Resource identification (name, address, etc.)

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

Double Encryption Based Secure Biometric Authentication System

Double Encryption Based Secure Biometric Authentication System Double Encryption Based Secure Biometric Authentication System S.Kavin hari hara sudhan (1), Prof.S.Ramamoorthy (2) (1) M.Tech student in Computer Science and Engineering (2) Professor in Computer Science

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Enhanced Authentication for Self-organizing Software platform using Smart SSD. Im Y. Jung, Gil-Jin Jang, Jung-Min Yang

Enhanced Authentication for Self-organizing Software platform using Smart SSD. Im Y. Jung, Gil-Jin Jang, Jung-Min Yang Enhanced Authentication for Self-organizing Software platform using Smart SSD Im Y. Jung, Gil-Jin Jang, Jung-Min Yang School of Electronics Engineering, Kyungpook National University, Republic of Korea

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

Decision Level Fusion of Face and Palmprint Images for User Identification

Decision Level Fusion of Face and Palmprint Images for User Identification XI Biennial Conference of the International Biometric Society (Indian Region) on Computational Statistics and Bio-Sciences, March 8-9, 2012 83 Decision Level Fusion of Face and Palmprint Images for User

More information

Biometrics Technology: Multi-modal (Part 2)

Biometrics Technology: Multi-modal (Part 2) Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates Joseph Mwema, Michael Kimwele, Stephen Kimani School of Computing and Information

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations H B Kekre 1, Department of Computer Engineering, V A Bharadi 2, Department of Electronics and Telecommunication**

More information

AUTHENTICATION SYSTEM USING IRIS RECOGNITION

AUTHENTICATION SYSTEM USING IRIS RECOGNITION AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of

More information

Biometrics- Fingerprint Recognition

Biometrics- Fingerprint Recognition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint

More information

Digital Signature Generation using Fingerprint, Password and Smart Card

Digital Signature Generation using Fingerprint, Password and Smart Card Digital Signature Generation using Fingerprint, Password and Smart Card FAWAD AHMED and MOHAMMED YAKOOB SIYAL School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang

More information

Chapter 6. Multibiometrics

Chapter 6. Multibiometrics 148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,

More information

Dual Fingerprints Fusion for Cryptographic Key Generation

Dual Fingerprints Fusion for Cryptographic Key Generation Dual Fingerprints Fusion for Cryptographic Key Generation M.Marimuthu Assistant Professor Coimbatore Institute of Technology A.Kannammal Professor Coimbatore Institute of Technology ABSTRACT Secured data

More information

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT

Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT Fake Biometric System For Fingerprint, Iris, and face using QDA and SIFT 1 Gummadidala Ravi Babu, 2 Nagandla Prasad 1 (M.Tech),DECS, Sai Thirumala NVR engineering College, Narasaraopeta, AP, INDIA. 2 Asst

More information

Image Quality Assessment for Fake Biometric Detection

Image Quality Assessment for Fake Biometric Detection Image Quality Assessment for Fake Biometric Detection R.Appala Naidu PG Scholar, Dept. of ECE(DECS), ACE Engineering College, Hyderabad, TS, India. S. Sreekanth Associate Professor, Dept. of ECE, ACE Engineering

More information

IJITKM Volume 7 Number 1 December 2013 pp (ISSN )

IJITKM Volume 7 Number 1 December 2013 pp (ISSN ) Biometric Recognition Challenges Dr. Chander Kant, Archana Toky Assistant Professor, Deptt. of computer Science & Appl. K.U. Kurukshetra Faculty, Deptt. Of Computer Science, Govt. College for women, Hisar

More information

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept Implementation of Based Fingerprint Identification System using Crossing Number Concept Atul S. Chaudhari #1, Dr. Girish K. Patnaik* 2, Sandip S. Patil +3 #1 Research Scholar, * 2 Professor and Head, +3

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

wavelet packet transform

wavelet packet transform Research Journal of Engineering Sciences ISSN 2278 9472 Combining left and right palmprint for enhanced security using discrete wavelet packet transform Abstract Komal Kashyap * and Ekta Tamrakar Department

More information

Biometric Detection in Fingerprint, Iris, and 2D face using hybrid of IQA and SIFT

Biometric Detection in Fingerprint, Iris, and 2D face using hybrid of IQA and SIFT International Journal of Innovative Research in Electronics and Communications (IJIREC) Volume 2, Issue 8, 2015, PP 1-8 ISSN 2349-4042 (Print) & ISSN 2349-4050 (Online) www.arcjournals.org Biometric Detection

More information

A protection scheme for enhancing biometric template security and discriminability

A protection scheme for enhancing biometric template security and discriminability A protection scheme for enhancing biometric template security and discriminability Marco GRASSI a,1, Marcos FAUNDEZ-ZANUY b,2 a D.I.B.E.T. Università Politecnica delle Marche, Ancona, Italy b Escola Universitària

More information

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Hiding Fingerprint Minutiae in Images

Hiding Fingerprint Minutiae in Images Hiding Fingerprint Minutiae in Images Anil K. Jain and Umut Uludag Computer Science and Engineering Department, Michigan State University 3115 Engineering Building, East Lansing, MI, 48824, USA {jain,

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Iris Recognition using Orthogonal Transforms

Iris Recognition using Orthogonal Transforms Iris Recognition using Orthogonal Transforms M.Mani Roja #1, Dr.Sudhir Sawarkar *, # Research scholar, Amravati University Associate Professor, TSEC, Mumbai, India. 1 maniroja@yahoo.com * Principal, DMCE

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A Biometric Authentication Based Secured ATM Banking System Shouvik

More information

Multimodal Biometrics Information Fusion for Efficient Recognition using Weighted Method

Multimodal Biometrics Information Fusion for Efficient Recognition using Weighted Method Multimodal Biometrics Information Fusion for Efficient Recognition using Weighted Method Shalini Verma 1, Dr. R. K. Singh 2 1 M. Tech scholar, KNIT Sultanpur, Uttar Pradesh 2 Professor, Dept. of Electronics

More information

Lecture 9 User Authentication

Lecture 9 User Authentication Lecture 9 User Authentication RFC 4949 RFC 4949 defines user authentication as: The process of verifying an identity claimed by or for a system entity. Authentication Process Fundamental building block

More information

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Enhanced Iris Recognition System an Integrated Approach to Person Identification Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Secure Access System Using Signature Verification over Tablet PC

Secure Access System Using Signature Verification over Tablet PC Secure Access System Using Signature Verification over Tablet PC Fernando Alonso-Fernandez, Julian Fierrez-Aguilar, Javier Ortega-Garcia & Joaquin Gonzalez-Rodriguez Universidad Autonoma de Madrid ABSTRACT

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

SECURE MODULAR AUTHENTICATION SYSTEMS BASED ON CONVENTIONAL XOR BIOMETRICS

SECURE MODULAR AUTHENTICATION SYSTEMS BASED ON CONVENTIONAL XOR BIOMETRICS The 9 th International Conference on Business Information Security (BISEC-2017), 18 th October 2017, Belgrade, Serbia SECURE MODULAR AUTHENTICATION SYSTEMS BASED ON CONVENTIONAL XOR BIOMETRICS NEMANJA

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

Multimodal Biometric System in Secure e- Transaction in Smart Phone

Multimodal Biometric System in Secure e- Transaction in Smart Phone Multimodal Biometric System in Secure e- Transaction in Smart Phone Amit Kumar PG Student Department of computer science.,sssist, Sehore Kailash Patidar Professor Department of computer science,sssist,

More information

Available online at ScienceDirect. Procedia Computer Science 92 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 92 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 92 (2016 ) 481 486 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) Srikanta

More information

Advanced Authentication Scheme using Multimodal Biometric Scheme

Advanced Authentication Scheme using Multimodal Biometric Scheme Advanced Authentication Scheme using Multimodal Biometric Scheme Shreya Mohan Karunya University Coimbatore, India Ephin M Karunya University Coimbatore, India Abstract: Fingerprint recognition has attracted

More information

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image

An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,

More information

Keywords Palmprint recognition, patterns, features

Keywords Palmprint recognition, patterns, features Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm

More information

A Systematic Analysis of Face and Fingerprint Biometric Fusion

A Systematic Analysis of Face and Fingerprint Biometric Fusion 113 A Systematic Analysis of Face and Fingerprint Biometric Fusion Sukhchain Kaur 1, Reecha Sharma 2 1 Department of Electronics and Communication, Punjabi university Patiala 2 Department of Electronics

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,

More information

Fingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy Ria Mathews 1 Bino Thomas 2

Fingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy Ria Mathews 1 Bino Thomas 2 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 09, 2015 ISSN (online): 2321-0613 Fingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy Ria Mathews

More information

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to

More information

Authentication. Chapter 2

Authentication. Chapter 2 Authentication Chapter 2 Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand how CHAP works Understand what mutual authentication

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta

DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:

More information

Hybrid Biometric Person Authentication Using Face and Voice Features

Hybrid Biometric Person Authentication Using Face and Voice Features Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person

More information