Fuzzy Bio-Cryptography Key Generation
|
|
- Ursula Todd
- 5 years ago
- Views:
Transcription
1 11 Fuzzy Bio-Cryptography Key Generation HanaaM. A. Salman Computer Science Department,University of Technology, Iraq Abstract:Strength of Cryptographic systems security depends mainly upon the security of the used key, which is leads to generate big key space that is result in forget them easily. One solution to this problem is by using Bio-Cryptography key generation. Bio-Cryptography is the integration between cryptography and biometrics that can function in key release mode or in key generation mode. Insipid of the sensed biometric means the result feature vector for the same person is varies each time. This paper addresses solution for various types of security problems by introducing a fuzzy bio-cryptography key generation in a general form consist of: 1. sensor, 2. feature extraction, 3. Key generator. The key is generating dynamically with the help of fingerprint based cubic spline, which is fast and secure. This key is useable for any type of cryptography. Keywords:Bio-Cryptography Fingerprint Fuzzy Cubic Spline Key Generation 1. Introduction Key generation modes is more secure but it is difficult to apply because of large intra-class variations in The incapability of human users to remember strong biometric data due to absorb the differences inherent in cryptographic keys has been main factor limiting the the measurement of biometric or biometric themselves, security of these systems. Usually users can remember while generating the same key over andover again. only short passwords. Consequently they tend to choose Generally, it requires a technique designed for passwords that are easily guessed by dictionary attacks. particular biometrics used. This constraint could be deal with in a wide range This paper presents a fuzzy bio-cryptographic key of applications by generating strong cryptographic keys generation, by using biometric fingerprint local feature. from biometric data, perhaps in conjunction with the The fuzzy key generation achieved after applying two entry of a password. The effectiveness of this approach stages fuzzy feature extraction followed by cubic spline lies in the fact that they do not require the user to key generation. Fuzzy feature extraction stage achieved remember and can represent a much stronger keys from by applying fuzzy pre-processing for the input passwords. These keys could then be used in a wide fingerprint, minutiae extraction, and post processing, variety of applications, which include access to virtual the key generation stage is achieved by applying cubic private networks, file encryption,and user spline followed by key generation.all the authentication. Bio-cryptography integrates cryptography and implementation work has been done in MATLAB. The biometrics to take advantage of the strengths of both developed system is evaluated on a database with fingerprints from different people. fields. Bio-cryptographic techniques protected secret key by using biometric feature or generating a key from biometric features. In such systems, some public information is stored. Both the secret key and the templates are hidden in public information. However, it is computationally impossible to extract the key or the templates from the public information directly. There are two subcategories of bio-cryptographic techniques [1] as depicted in Figure 1), these are: 1. Key binding: If public information derived from binding the secret key or templates, it is key binding, see [2, 3], and 2. Key generation: If public information generated from templates only, while the secret key comes from the public information, and query it is key generation see [4, 5, and 6]. Figure 1a-b).two modes of combining biometrics with cryptography:a): key release and b): key generation [7]
2 2. Fingerprint Principals The surface of the finger formed so-called a fingerprint, which is formed of set of associated curves represents ridges dark curves) and the valleys bright curves), as depicted in Figure 2). The points on the finger surface where the ridges end or bifurcate formed so-called the Minutiae, as depicted in Figure 3), which is most common, and distinctive representation, from fingerprint local feature for each individual. a) Ending b) Bifurcation Figure 3 a-b). The Ridge [8] 3. Bio-Cryptography Key Generation Biometric based cryptographic key generation transform biometric features to a unique key that it is impossible to be regenerate from biometric features by imposters. The general framework of the Bio- Cryptographic key generation is composed of two phases as depicted in Figure 4). We extract the minutiae points from the offline fingerprint image and used that set of points for generating bio-cryptographic key. The database provided by FVC2004 Fingerprint Verification Competition 2004) [9], is used as a source to the input fingerprint, so no acquisition stage is used. The major steps involved in each phase are presented in the following sub sections. 3.1Biometric Phase The input isfingerprint image passesinthree main steps, for each step has other sub steps to form a biometric feature vector. The sub steps involved in each step are in the following sub section and these are [9]: 1. Pre-processing: a. Histogram Equalization b. Image Binarization c. Image Segmentation 2. Minutiae extraction: a. Image Thinning b. Minutiae Extraction c. Singularity Detection 3. Post processing: a. False minutiae Reduction Fingerprint Image pre-processing a: Histogram Equalization The first step in the minutiae extraction stage is fingerprint image enhancement, which it increases the contrast between ridges and furrows and connects the some of the false broken points of ridges due to insufficient amount of ink or poor quality of sensor input [10]. In this paper, a fuzzy image enhancement is used as presented in algorithm 1) [8], followed by the results as depicted in Figure 5). Figure 2. Fingerprint image [1] [8] Sensed Image Biometric Phase Key Generation Phase Bio-cryptographic key Figure 4. Bio-cryptographic key generation The input to the biometric phase is the sensed image, and the output is the biometric feature vector, while the input to the key generation phase is the biometric feature vector, and the output is the biocryptographic key. Algorithm 1): Fuzzy Image Enhancement Input: fingerprint image Output: enhanced fingerprint image. Process: Step1: Taking image and set membership function for each gray level as: Step1.1: Where L=max gray level Step 1.2: f x, y) = any gray level. Step 1.3: s =variance between gray values Step2: Get new membership function by putting: Step2.1: v x, y) = 2* µx, y)) 2 if µ x, y) 0.5 Step 2.2: v x, y ) = 1-2* 1 - µ x, y )) 2 if 0.5 µx, y) 1 Step3: Get new im age by s etting th e method as: gx,y)=l-s 2log vx, y) Step4: End
3 15 l t ch block, use roximation of = sk. win g fo rm loc k direc ) the same a s the wa y illustrated b a [10]. = w dicar ed n th )+ + ) ) 688
4 O ut: Minutia pointes P cess: Ste 1: calculate inter rid ge dista nce D = )) 689
5 17, ith [10 slate pect t o rota t e M a c al or ding t, n and T [10]: x y θ = gin 690
6 7. Conclusion 1. In this paper we have considered the fuzzy biocryptographic key generation. We have demonstrated the solution to the primary difficulty of variations inherent in measuring biometrics, or in the biometrics themselves, while generating the same key over and over again, which faced the most effective approach from the security point of view initialled biocryptographic key generation, which represents the most effective solution to the difficulty remembering the user's secret key. 2. We have proposed the fuzzy filter concept to overcome the difficulty of intra classes vibration. We have extracted the content based minutiae features using three main stage fuzzy filter pre-processing minutia extractions, postpre-processing. We have generated the key by using locations in the fingerprint image of the content based feature vector of the fingerprint locale feature, and then we have used the Fuzzy cubic spline to draw carved. The control pointes of the Fuzzy cubic spline are sending as a key generation. 3. This approach has eliminated the variations in intra classes variations inherent in measuring biometrics, or in the biometrics themselves, which result in capability of generating the same key over and over again. Acknowledgements The author s would like to thank the International Arab Conference on Information Technology, and CCIS, Zarqa University, Jordan for supporting this publication. References [1] Peter Stavroulakis, Mark Stamp: Handbook of Information and Communication Security. Springer 2010, ISBN [2] A. Juels, M. Wallenberg: A Fuzzy Commitment Scheme, Proc. 6th ACM Conference on Computer and Communications Security, Singapore 1999) pp [3] A. Juels, M. Sudan: A Fuzzy Vault Scheme, Proc. IEEE Int. Symposium on Information Theory, Lau-sanne 2002) p. 408 [4] Y.-J. Chang, W. Zhang, T. Chen: Biometrics Based Cryptographic Key Generation, Proc. IEEE Conference on Multimedia and Expo, Taipei, Vol ) pp [5] C. Vielhauer, R. Stcinmctz, A. Maycrhofcr: Biomctric Hash Based on Statistical Features of Online Signatures, Proc. 16th Int. Conference on Pattern Recognition, Quebec, Vol ) pp [6] Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Technical Report 235, Cryptology eprint Archive February 2006) [7] G Margarov, M Tolba, Biometrics based secret sharing using fuzzy vault. 7th IntConf on Computer Science and Information Technologies CSIT'09) 2009) [8] Pravesh Kumar Use of Fuzzy Set and Neural Network to Extract Fingerprint. Minutiae Points and Location, thesis, [9] [10] kushal veer singh, application of neural networks in fingerprint identification,2010,thesis [11] Maria Cristina Floreno, Giovanni Novelli, Implementing fuzzy polynomial interpolation FPI) and fuzzy linear regression LFR) ticle/view/426 Associate Prof. Dr. Hanaa M. A. Salman awarded her MSc and her PhD from University of technology Iraq in 2002, 2006 respectively. Currently she is a senior lecturer in computer science and a member of the scientific Committee and Promotion Committee in the Department of Computer Science. Dr. Hanaa has more than 15 years of experience and she supervise of graduate students and preliminary,her research interests include Cryptography, Computer Security, Biometrics, image processing, and Computer graphics. Prof. Dr. Hilal Hadi Saleh awarded his PhD in Information system from Higher Institute in Sofia, Bulgaria in1981. Currently he is a senior lecturer in computer science Department of Computer Science. Dr. Hilal has more than 40 years of experience and he supervise of graduate students and preliminary,his research interests include Cryptography, information system, image processing, and Computer graphics,sstatistics
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationCSE / 60537: Biometrics
CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 5 / Final Review 115 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/
More informationFingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask
Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationDevelopment of an Automated Fingerprint Verification System
Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini
More informationFingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav
Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each
More informationCSE / 60537: Biometrics
CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?
More informationBiometric Cryptosystem Using Online Signatures
Biometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci University Faculty of Engineering and Natural Sciences Istanbul 34956, Turkey alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationFingerprint Identification System Based On Neural Network
Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India
More informationKeywords Fingerprint recognition system, Fingerprint, Identification, Verification, Fingerprint Image Enhancement, FFT, ROI.
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Approach
More informationLocal Correlation-based Fingerprint Matching
Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationA Remote Biometric Authentication Protocol for Online Banking
International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information
More informationBiometric Cryptography: Key Generation Using Feature and Parametric Aggregation
Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation Christopher Ralph Costanzo School of Engineering and Applied Sciences Department of Computer Science The George Washington
More informationFingerprint Verification System using Minutiae Extraction Technique
Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on
More informationInternational Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018.
MULTI-VISUAL CRYPTOGRAPHY FOR BIOMETRICS(FINGERPRINT & IRIS) USING LION OPTIMIZATION ALGORITHM Mr. S. Rajesh, Assistant Professor, Department of CSE, Avvaiyar College of Engineering & Technology for Women,
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationTemplate Protection and its Implementation in 3D Face Recognition Systems
Template Protection and its Implementation in 3D Face Recognition Systems Xuebing Zhou Fraunhofer IGD, Fraunhoferstr. 5, 64283 Darmstadt, Germany E-mail: xuebing.zhou@igd.fhg.de ABSTRACT As biometric recognition
More informationA Fuzzy Implementation of Biometrics With Five Factor Authentication System For Secured Banking
` A Fuzzy Implementation of Biometrics With Five Factor Authentication System For Secured Banking S. Hemamalini & M. L. Alphin Ezhil Manuel Department of Computer Science and Engineering, Alpha College
More informationKeywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm
More informationI. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching
A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationPersonal Information in Strategic Data Sharing and Communication Protocols
Personal Information in Strategic Data Sharing and Communication Protocols Lidia Ogiela and Marek R. Ogiela Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology,
More informationDigital Signature Generation using Fingerprint, Password and Smart Card
Digital Signature Generation using Fingerprint, Password and Smart Card FAWAD AHMED and MOHAMMED YAKOOB SIYAL School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationMahmood Fathy Computer Engineering Department Iran University of science and technology Tehran, Iran
1 Alignment-Free Fingerprint Cryptosystem Based On Multiple Fuzzy Vault and Minutia Local Structures Ali Akbar Nasiri Computer Engineering Department Iran University of science and technology Tehran, Iran
More informationMultimodal Biometric Authentication using Face and Fingerprint
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Increasing The Accuracy Of An Existing Fingerprint Recognition
More informationKeywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach
More informationTemplate Protection for PCA-LDA-based 3D Face Recognition Systems
Template Protection for PCA-LDA-based 3D Face Recognition Systems Daniel Hartung Email: hartung.dani@gmail.com Abstract: Authentication based on biometrics became significantly important over the last
More informationMINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION
MINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION 1 S.NITHYA, 2 K.VELMURUGAN 1 P.G Scholar, Oxford Engineering College, Trichy. 2 M.E., Assistant Professor,
More informationSecurity Analysis of Key Binding Biometric Cryptosystems
Security Analysis of Key Binding Biometric Cryptosystems Maryam Lafkih 1, Mounia Mikram 1,2, Sanaa Ghouzali 1,3, and Mohamed El Haziti 4 1 LRIT, Faculty of Sciences, Mohammed V University, Rabat, Morocco
More informationAn approach for Fingerprint Recognition based on Minutia Points
An approach for Fingerprint Recognition based on Minutia Points Vidita Patel 1, Kajal Thacker 2, Ass. Prof. Vatsal Shah 3 1 Information and Technology Department, BVM Engineering College, patelvidita05@gmail.com
More informationMinutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System
Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification
More informationThe Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,
More informationA Geometric Transformation to Protect Minutiae-Based Fingerprint Templates
A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates Yagiz Sutcu a, Husrev T. Sencar b and Nasir Memon b a Polytechnic University, Electrical & Computer Engineering Dept., Brooklyn,
More informationFUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION. Yongjin Wang, K.N. Plataniotis
FUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION Yongjin Wang, K.N. Plataniotis The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, 1 King s College
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationComparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint
More informationBIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS
BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,
More informationThumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password
Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,
More informationFingerprint Feature Extraction Using Hough Transform and Minutiae Extraction
International Journal of Computer Science & Management Studies, Vol. 13, Issue 05, July 2013 Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction Nitika 1, Dr. Nasib Singh Gill
More informationChapter 3: User Authentication
Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process
More informationDesigning of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation
Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Navjot Kaur #1, Mr. Gagandeep Singh #2 #1 M. Tech:Computer Science Engineering, Punjab Technical University
More informationMultibiometric Template Security Using Fuzzy Vault
Multibiometric Template Security Using Fuzzy Vault Karthik Nandakumar and Anil K. Jain Abstract Template security is a critical issue in biometric systems because biometric templates cannot be easily revoked
More informationRandom Password Generation of OTP System using Changed Location and Angle of Fingerprint Features
Random Password Generation of OTP System using Changed Location and Angle of Fingerprint Features ByungRae Cha*, KyungJun Kim, HyunShik Na** Dept. of Computer Eng.*, Dept. of Radio Mobile Communication
More informationFingerprint Recognition using Texture Features
Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient
More informationAn Approach to Demonstrate the Fallacies of Current Fingerprint Technology
An Approach to Demonstrate the Fallacies of Current Fingerprint Technology Pinaki Satpathy 1, Banibrata Bag 1, Akinchan Das 1, Raj Kumar Maity 1, Moumita Jana 1 Assistant Professor in Electronics & Comm.
More informationInternational Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015
International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Multi-Purpose Key Generation Using Combination of Fingerprints Sharda Singh
More informationMechanism-based PKI - A real-time key generation from fingerprints -
Mechanism-based PKI - A real-time key generation from fingerprints - Yoichi Shibata Graduate School of Science and Engineering Shizuoka University Hamamatsu-shi, Shizuoka, JAPAN cs9042@s.inf.shizuoka.
More informationA Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri
More informationOn the Security of a Certificateless Public-Key Encryption
On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080,
More informationImplementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept
Implementation of Based Fingerprint Identification System using Crossing Number Concept Atul S. Chaudhari #1, Dr. Girish K. Patnaik* 2, Sandip S. Patil +3 #1 Research Scholar, * 2 Professor and Head, +3
More informationFaculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT
Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Scientific Coordinator, PhD. Prof. Eng. Tiberiu Ștefan Leția Chapter
More informationBiometric Security Technique: A Review
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.
More informationSecure Biometrics Via Syndromes
Secure Biometrics Via Syndromes Emin Martinian, Sergey Yekhanin, Jonathan S. Yedidia Mitsubishi Electric Research Labs Cambridge, MA 02139 {martinian,yedidia}@merl.com, yekhanin@mit.edu Abstract We consider
More informationBipartite Biotokens: Definition, Implementation, and Analysis
Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer 2,1, and T.E. Boult 1,2,, 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO - 80918 2 Securics Inc, Colorado Springs,
More informationUser Identification by Hierarchical Fingerprint and Palmprint Matching
User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationEfficient Rectification of Malformation Fingerprints
Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationZodiac Max OPERATOR GUIDE
Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications
More informationFingerprint Deformation Models Using Minutiae Locations and Orientations
Fingerprint Deformation Models Using Minutiae Locations and Orientations Yi Chen, Sarat Dass, Arun Ross, and Anil Jain Department of Computer Science and Engineering Michigan State University East Lansing,
More informationAvailable online at ScienceDirect. Procedia Computer Science 58 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition
More informationApplication of Biometrics to Obtain High Entropy Cryptographic Keys
1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationA protection scheme for enhancing biometric template security and discriminability
A protection scheme for enhancing biometric template security and discriminability Marco GRASSI a,1, Marcos FAUNDEZ-ZANUY b,2 a D.I.B.E.T. Università Politecnica delle Marche, Ancona, Italy b Escola Universitària
More informationc Springer Verlag. The copyright for this contribution is held by Springer Verlag. The original publication is available at
Christian Rathgeb and Andreas Uhl, Systematic Construction of Iris-Based Fuzzy Commitment Schemes, In M. Tistarelli, M.S. Nixon, editors, Proceedings of the 3rd International Conference on Biometrics 2009
More informationPerformance Improvement in Binarization for Fingerprint Recognition
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. II (May.-June. 2017), PP 68-74 www.iosrjournals.org Performance Improvement in Binarization
More informationThe Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs A schema for cryptographic keys generation using hybrid biometrics Conference Item How to cite:
More informationFingerprint Recognition using Fuzzy based image Enhancement
Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India
More informationImplementation of Fingerprint Matching Algorithm
RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan
More informationA Full Analytical Review on Fingerprint Recognition using Neural Networks
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 45-49(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 A Full Analytical Review on Fingerprint Recognition
More informationFast and Robust Projective Matching for Fingerprints using Geometric Hashing
Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Rintu Boro Sumantra Dutta Roy Department of Electrical Engineering, IIT Bombay, Powai, Mumbai - 400 076, INDIA {rintu, sumantra}@ee.iitb.ac.in
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationFingerprint Verification applying Invariant Moments
Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National
More informationFingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 4 (February 2013) PP: 54-61 Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming
More informationFingerprint Recognition System for Low Quality Images
Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University
More informationICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification
ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another
More informationImage Segmentation Based on Watershed and Edge Detection Techniques
0 The International Arab Journal of Information Technology, Vol., No., April 00 Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman Computer Science Department, Zarqa Private
More informationIMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION
IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION C. Örencik, T. B. Pedersen, E. Savaş and M. Keskinoz Faculty of Engineering & Natural Sciences, Sabanci University, Istanbul, 34956, Turkey {cengizo@su.,
More informationFinger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack
14 Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack Rajeswari Mukesh Dept of Computer Science & Engg Easwari Engineering College Chennai- 600 089 A.Damodaram Vice
More informationResearch Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.
Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations
More informationA Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and Anil K. Jain, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 103 A Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and
More informationSecurity analysis for fingerprint fuzzy vaults
Security analysis for fingerprint fuzzy vaults Jesse Hartloff, Maxwell Bileschi, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju Dept. of Computer Sc. and Eng., University at Buffalo, Buffalo,
More informationIntelligent fingerprint recognition system. for Comprehensive Student Information Using MATlab
Intelligent Fingerprint Recognition System for Comprehensive Student Information Using MATlab Shwetha Signal Processing, Siddaganga Institute of Technology, Tumkur, India Sangeetha.B.P Digital Communication
More informationCryptosystem based Multimodal Biometrics Template Security
Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based
More informationFingerprint Feature Extraction Using Midpoint ridge Contour method and Neural Network
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 99 Fingerprint Feature Extraction Using Midpoint ridge Contour method and Neural Network Bhupesh Gour Asst.
More informationA Novel Image Alignment and a Fast Efficient Localized Euclidean Distance Minutia Matching Algorithm for Fingerprint Recognition System
Ridge ings Ridge bifurcation The International Arab Journal of Information Technology Vol. 13, No. 6B, 2016 1061 A Novel Image Alignment and a Fast Efficient Localized Euclidean Distance Minutia Matching
More informationSecurity analysis of a fingerprint-secured USB drive
James Madison University JMU Scholarly Commons Masters Theses The Graduate School Summer 2010 Security analysis of a fingerprint-secured USB drive Benjamin David Rodes James Madison University Follow this
More informationarxiv:cs/ v2 [cs.cr] 27 Aug 2006
On the security of the Yen-Guo s domino signal encryption algorithm (DSEA) arxiv:cs/0501013v2 [cs.cr] 27 Aug 2006 Chengqing Li a, Shujun Li b, Der-Chyuan Lou c and Dan Zhang d a Department of Mathematics,
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More information