Cryptographic Key Generation from Finger Vein;A Study
|
|
|
- Barbara Paul
- 9 years ago
- Views:
Transcription
1 Cryptographic Key Generation from Finger Vein;A Study Sharon Davis 1, Ayana John 2,Padmam Kaimal 3 1 (Electronics and communication,sahrdaya college of engineering and technology,kerala,india) 2 (Electronics and communication,sahrdaya college of engineering and technology,kerala,india ) 3 (Electronics and communication,sahrdaya college of engineerinng and technology,kerala,india ) ABSTRACT :. Biometrics in conjuction with cryptography forms a new progressive technology. Using biometric datas such as finger vein,face recognition,iris recognition and finger print for security purposes has become increasingly accepted.the use of biometric data in cryptography is a new, budding and capable area of research. One of the most important problems related with bio-cryptography is creation of a constant encryption key. This paper suggests the method of generation of cryptographic key from finger vein pattern. It is based on the established finger vein image pre-processing methods and a new algorithm. Keywords - information security,cryptographic key generation,biometrics I. INTRODUCTION The Information security plays an important role in protecting datas of a firm.but there are a lot of problems associated with the effectiveness of information security.cryptography acts in an effective way to solve the problem of information security. In most of the cryptographic algorithms, cipher keys are used for encryption and decryption.but this causes some problems [4]. Simple users keys are not easy to be forget.but they can be cracked easily. But on moving to the case of complex keys,eventhough they are difficult to crack, they are difficult to remember.also, the cipher keys may be illegally shared.so,all these problems should be solved.the biometric features which cannot be forgotten, stolen or cracked, is combined with the cryptography to form biometric cryptography. One of important problems facing in biometric cryptography is stable encryption key generation [4].Those keys must be generated truly, to contain sufficient entropy and be of enough length [1].One of the latest biometric methods is finger vein recognition [6,7]. The finger vein pattern based authentication method is highly reliable; veins are hidden underneath the skin surface so forgery is extremely difficult; it is non-invasive and easy to use, offering a balance of advantages. Finger vein patterns are unique for each and every human being. ERR in fingerprint based systems is much higher on comparing it with finger vein approaches. Thus,finger vein based authentication is very effective [8].Also,Riley et al. study [9] suggests that vein technology is more suitable compared to fingerprint technology. Fingerprint based technologies is very problematic because, fingerprints can be forged and the procedure of enrolment and scanning may be more difficult. In this paper the possibilities of key generation from finger vein patterns were explored II. LITERATURE WORK The The initial technique involves stored pattern harmonizing to open a cipher key storage. If the user is authentic, the key is released. The next method hides the cipher key through a secret bit-replacement algorithm inside the enrolment pattern itself[9].another method is to use data derived directly from a biometric image. In this method biometric data are used to generate a cryptographic key [10]. But one of the main drawback is that,the quality of biometric data depends on the person's physiological characteristics and also it is subjective by the environment.thus, cryptographic key generation directly from biometric data is quite tough. There are many works, aiming to fill the gap between the fuzziness of biometrics and achieving cryptographic accuracy. This would enable keys to be generated directly from biometric images. The main problem is that biometric data is noisy and only an approximate comparison is possible with the template. Topological fingerprint pattern minutiae point neighbourhood descriptors based approach has been proposed by Ushmaev et al. [11].The advantages are,these descriptors are very stable fingerprint features and don t depend on finger alignment and deformations. These approach allows varying decryption rates as well as key lengths. Stability of cryptographic keys is the core of bio-cryptography. Hu et al. [12] investigated the effect on the generated keys when an original fingerprint image is rotated. Investigation indicates that information integrity of the original fingerprint image can be significantly compromised by image rotation transformation process. It was revealed that the quantization and interpolation process can change the fingerprint features 125 Page
2 significantly without affecting the visual image.in Costanzo s [13] proposed method,it eliminates the need for template storage and shows how a cryptographic key can be made through the use of biometric feature. Zheng et al. [14] paper presents a lattice mapping based fuzzy commitment method for cryptographic key generation from biometric data. The method used,outputs high entropy keys.also it conceals the original biometric data such that it is impossible to recover the biometric data even when the stored information in the system is opened to an attacker. Wu et al [15] proposed a novel biometric cryptosystem.it is based on the most accurate biometric feature, iris.a textural feature vector is extracted from the pre-processed iris image by using a set of 2-D Gabor filters and a modified fuzzy vault algorithm is employed to encrypt and decrypt the data.. Previous works were mainly performed for generating keys using fingerprints. Here, proposed method deals with generation of cryptographic key from finger vein pattern.an infrared camera that captures the image that flows from a led array from the top of the device through the user s finger to the camera is used. The amount of light that will be delivered to the sensor will vary according to the user s finger thickness.to obtain high quality near-infrared (NIR) images, a special device was developed. Generally, finger-vein patterns can be imaged based on the principles of light reflection or light transmission [2]. III. KEY GENERATION USING FINGER VEIN In this paper a method for cryptographic key generation from finger vein pattern were demonstrated. A schematic representation for proposed method from finger vein patterns is shown in Fig.2.Through the method:using multiple finger vein patterns, key is generated. Here, biometric method is combined with a password. The password is 'entered' by provide different finger sequences for the systems.ten different finger vein patterns and combinations of enrolling these images to the system allows for virtually endless number of keys to be generated. Also longer keys and keys with higher entropy can be generated.first, vein pattern image is processed using conventional methods.input to Contour Tracing Algorithm is the processed vein pattern and it is used to generate a partial cryptographic key. Partial cryptographic keys are concatenated to combine a final cryptographic key.a binary finger vein pattern FVP(a b) is selected.it is further processed by Meaningful Coordinate Detection Algorithm (Fig. 2).MCD Algorithm is used to identify Region of Interest of blood vessel.for fixing ROI,(FIG.1)beginning point of vessel BP(a 2) and end point EP(a 2) and crossing vessel point coordinates CV(k 2) are considered. Finger vein pattern may be cropped depending on it's size so that we are able to make sure that to vein beginning and end points reach edges of the image. Fig.1.Segmentation of ROI Figure 1. Schematic representations of proposed cryptographic key generation method using finger vein patterns 126 Page
3 Beginning and end points are found by scanning binary values along the edges of the image.coordinates of intersections in the network are identified using a morphological branchpoints function.to allow and visualise user to select which BP, Meaningful coordinate Detection algorithm is used.to trace the contour Contour Tracing Algorithm is used (Fig. 3). The algorithm is used to identify which Vessel Beginning Points and which vessel end points are connected with a selected BP or EP. The contour is traced until a vessel intersection is detected. After an intersection is detected, all following branches are traced simultaneously. Fig. 4, shows a vascular pattern image with 100 initial contour points highlighted by Contour Trace Algorithm. 127 Page
4 Figure 3.MCD Algorithm Step 1:Initialize vessel beginning point matrix as BP; Step 2: Initialize vessel end point matrix as EP; Step 3 : Initialize vessel intersection point matrix; CP Step 4: Initialize tracing point; Step 5 :image should be resized (reduced) to required pixel level; Figure 4. Contour Trace Algorithm Step 1:Trace starting point Step2:Trace directions through contour matrix. Step3:Starting from tracing point,check all directions. Step 4:If contour point detected,the record point coordinates Step 5:Invert traced point value. Step 6:End Step 6: Detection of BP from initial ; Step 7:If the vein starting point is detected,then BP coordinates and assigned entrance numberas are noted; Step 8: Detection of EP; Step 9:If vein end point is detected,then EP coordinates and assigned exit numbers are noted; Step 10:End; A binary finger vein pattern FVP(a b) is selected.it is further processed by Meaningful Coordinate Detection Algorithm (Fig. 2).MCD Algorithm is used to identify Region of Interest of blood vessel.for fixing ROI,(FIG.2)beginning point of vessel BP(a 2) and end point EP(a 2) and crossing vessel point coordinates CV(k 2) are considered. Finger vein pattern may be cropped depending on it's size so that we are able to make sure that to vein beginning and end points reach edges of the image. Figure 4 Traced finger vein pattern using Contour Trace Algorithm 128 Page
5 A binary finger vein pattern FVP(a b) is selected.it is further processed by Meaningful Coordinate Detection Algorithm (Fig. 2).MCD Algorithm is used to identify Region of Interest of blood vessel.for fixing ROI,(FIG.2)beginning point of vessel BP(a 2) and end point EP(a 2) and crossing vessel point coordinates CV(k 2) are considered. Finger vein pattern may be cropped depending on it's size so that we are able to make sure that to vein beginning and end points reach edges of the image.first tracing point is set as point number 4 and contour is traced. Figure 5 illustrates contour tracing at a point when first'exit' point (number 5) is reached after a fixed number of iterations of the Contour Trace Algorithm.After all BP and EP points are reached, the values assigned to each of these points are combined into one partial key in order of when they were hit by the Contour Trace Algorithm. Figure 5. Contour Trace Iteration Method IV. ANALYSIS AND DISCUSSION The contour is traced In Contour Trace Algorithm until a vessel intersection is detected. After it, all branches are traced simultaneously. An alternative operation is also possible.it is to trace one of the branches applying predetermined set of rules on how all following intersections should be crossed.the advantage of using Contour Trace Iteration Number Method is that, relatively small probability of error is obtained when the vein pattern image is altered insignificantly. The algorithm is robust.because,it is affected by minor changes in the direction or position of certain veins in the pattern or any noise that is not directly connected to the main vein network.managing additional loops, more complex junction structure and branches in the vein pattern is aso possible with this algorithm..this paper does not cover steps 4, 5 and 6 (Fig.1) of cryptographic key generation. Research of these key generation steps will be carried out in future work. V. CONCLUSIONS AND FUTURE WORKS Generation of cryptographic keys from finger vein patterns is proposed in this paper.this method is used to generate a virtually limitless number of keys from finger vein characteristics of an individual. Without using any pre-captured samples or templates,proposed Contour-tracing algorithm generates cryptographic key directly from finger vein patterns.in the future work all steps of proposed method of cryptographic key generation will be implemented and quality properties of the generated keys will be investigated. This algorithm is mostly misleading by incorrectly detected (or undetected) line connections in the main vein pattern and false BP/EP determination. Method generates incorrect code when vein pattern changes significantly shortens or lengthens certain sections of the vein images. Further research will be carried out to analyse Contour Trace Iteration Number Method properties and possibilities for improvement. REFERENCES Books: [1]. C. Tilborg (Ed). Encyclopedia of Cryptography and Security. Springer, 2005 [2]. Handbook of Information andcommunication Security, P. Stavroulakis,M. Stamp (Eds.), Springer, 2010 Theses: [3]. U. Uludag, "Secure biometric systems,"ph.d. dissertation, Michigan StateUniversity, Proceedings Papers: [4]. Venckauskas, N. Jusas, I. Mikuckiene, S.Maciulevicius, Generation of the secret encryption key using the signature of the embedded system, Information technology and control, T. 41, nr. 4, pp , [5]. Yao-Jen Chang, Wende Zhang, Tsuhan Chen, "Biometrics-based cryptographic key generation," Multimedia and Expo, ICME ' IEEE International Conference on, vol.3, pp. 2203,2206 Vol.3, June [6]. J. Hashimoto, Finger Vein Authentication Technology and Its Future, VLSI Circuits, Digest of Technical Papers. pp. 5 8, [7]. A. Venckauskas, N. Morkevicius, K. Kulikauskas, Study of Finger Vein Authentication Algorithms for Physical Access Control, Electronics and Electrical Engineering, No. 5(121). pp , Page
6 [8]. N. Miura, A. Nagasaka ir T. Miyatake, Automatic Feature Extraction from nonuniform Finger Vein Image and its Application to Personal Identification IAPR Workshop on Machine Vision Applications, Dec , Nara- ken New Public Hall, Nara, Japan, [9]. C. Riley, H. McCracken, K. Buckner, Fingers, veins and the grey pound:accessibility of biometric technology,proceedings of the 14th Europeanconference on Cognitive ergonomics(ecce 07). New York, [10]M. S. Al-Tarawneh, [10]. L.C. Khor, W. L. Woo,and S. S. Dlay, Crypto key generationusing contour graph algorithm, inproceedings of the 24 th (IASTEDinternational conference on Signalprocessing, pattern recognition, andapplications (SPPRA'06), M. H. Hamza Ed.). ACTA [11]. O. Ushmaev, V. Kuznetsov, V. Gudkov,"Extraction of Binary Features fromfingerprint Topology," Hand-BasedBiometrics (ICHB), 2011 InternationalConference on, vol., no., pp.1,6, Nov.2011 [12]. Peng Zhang, Jiankun Hu, Cai Li,Mohammed Bennamoun, VijayakumarBhagavatula, A pitfall in fingerprint biocryptographickey generation, Computers& Security, Volume 30, Issue 5, July 2011,pp , 2011 [13]. C. R. Costanzo, "Active BiometricCryptography (ABC): Key GenerationUsing Feature and Parametric Aggregation,"Internet Monitoring and Protection, 2007.ICIMP Second InternationalConference on, vol., no., pp.28,28, 1-5 July2007 [14]. Gang Zheng, Wanqing Li, Ce Zhan,"Cryptographic Key Generation frombiometric Data Using Lattice Mapping,"Pattern Recognition, thInternational Confere. ICPR nce on, vol.4, pp , 2006 [15]. Xiangqian Wu, Ning Qi, Kuanquan Wang,Zhang D., "An Iris Cryptosystem forinformation Security", Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP '08 International Conference on, pp , 2008 [16]. J. Jagadeesan, T.Thillaikkarasi,K.Duraiswamy, Cryptographic KeyGeneration from Multiple Biometric Modalities: Fusing Minutiae with IrisFeature, International Journal of Computer Applications 2(6), pp , June [17]. N. Miura, A. Nagasaka ir T. Miyatake, Automatic Feature Extraction from nonuniformfinger Vein Image and itsapplication to Personal Identification IAPR Workshop on Machine VisionApplications, Dec , Nara- kennew Public Hall, Nara, Japan, 2002 [18]. N. Miura, A. Nagasaka ir T. Miyatake Feature extraction of finger vein patternsbased on repeated line tracking and itsapplication to personal identification. 130 Page
Cryptographic Key Generation from Finger Vein
Cryptographic Key Generation from Finger Vein Algimantas Venckauskas Department of Computers Kaunas University of Technology Kaunas, Lithuania [email protected] Abstract Bio-cryptography is
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
MULTIMEDIA CONTENT PROTECTION VIA BIOMETRICS-BASED ENCRYPTION. Umut Uludag and Anil K. Jain
Copyright 22 IEEE. Published in the 23 International Conference on Multimedia and Expo (ICME 23), scheduled for July 6-9, 23 in Baltimore, Maryland, SA. Personal use of this material is permitted. However,
Application of Biometrics to Obtain High Entropy Cryptographic Keys
1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Palmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
Offline and Online E-Voting System with Embedded Security for Real Time Application
Offline and Online E-Voting System with Embedded Security for Real Time Application Alaguvel.R 1 and Gnanavel.G 2 1 Department of Electrical and Electronics Engineering, V.R.S College of Engineering&Technology,
A STUDY ON AUTHENTICATED ADMITTANCE OF ATM CLIENTS USING BIOMETRICS BASED CRYPTOSYSTEM
A STUDY ON AUTHENTICATED ADMITTANCE OF ATM CLIENTS USING BIOMETRICS BASED CRYPTOSYSTEM M. Subha 1 and S. Vanithaasri 2 1 Assistant Professor & 2 M.phil Research Scholar, Department of Computer Science,
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
How To Improve Security Of An Atm
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security
Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
www.ijcsi.org 349 Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris Mr.P.Balakumar 1 and Dr.R.Venkatesan 2 1 Associate Professor, Department
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
Finger Print Parameter Based Cryptographic Key Generation
Finger Print Parameter Based Cryptographic Key Generation B.Raja Rao, Dr.E.V.V.Krishna Rao, S.V.Rama Rao,M.Rama mohan rao (Associate Professor, Department of ECE, URCE, Telaprolu,vijayawada. (Professor
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication protocol for fingerprint feature extraction and IBC in monitoring systems Changgeng Yu; Liping Lai School of Mechanical and Electronic Engineering, Hezhou University, No.8, xihuan Road,
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Security Issues in Smart Infrastructures for MMBS of Wireless Images for ATM banking
Security Issues in Smart Infrastructures for MMBS of Wireless s for ATM banking S.Koteswari #1, Dr.P.John Paul *2,S.Indrani ~3 # 1 Associate. Professor, Dept of ECE, D.N.R Engineering College, Bhimavaram,W.G.Dist,
Multi-Factor Biometrics: An Overview
Multi-Factor Biometrics: An Overview Jones Sipho-J Matse 24 November 2014 1 Contents 1 Introduction 3 1.1 Characteristics of Biometrics........................ 3 2 Types of Multi-Factor Biometric Systems
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY
GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY P.Arul 1, Dr.A.Shanmugam 2 1 Senior Lecturer in Computer Science, CMS College of Science and CommerceCoimbatore 641 006. 2 Principal BIT,
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Cryptographic key generation using handwritten signature
Cryptographic key generation using handwritten signature M. Freire-Santos a, J. Fierrez-Aguilar a, J. Ortega-Garcia a a ATVS-Biometrics Research Lab., Escuela Politecnica Superior, Universidad Autonoma
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems Christian Rathgeb and Andreas Uhl University of Salzburg, Department of Computer Sciences, A-5020 Salzburg,
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS
Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS ABSTRACT: Biometrics based authentication is a potential candidate to
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic Mr.P.Akilan 1, Mr.K.Gunasekaran 2, M.Tech. Mr.D.Saravanan 3, M.E., (Ph.D), PG Scholar, Dept. of CSE, Pavendar Bharathidasan
INVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS
INVESTIGATIVE STUDY FOR ENHANCING SECURITY, PRIVACY USING AMBIENT INTELLIGENCE IN CONTEXT SENSITIVE SYSTEMS Vijayakranthi Chinthala 1, Manas Kumar Yogi 2 1 M.Tech Scholar Department of Computer Science
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Fast Subsequent Color Iris Matching in large Database
Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business Management
Dr.R.Venkatesan Professor and Head, Department of CSE, PSG College of Technology Coimbatore, Tamilnadu, India
A Survey on Biometrics based Cryptographic Key Generation Schemes Mr.P.Balakumar Associate Professor, Department of CSE, Selvam College of Technology, Namakkal, Tamilnadu, India Abstract - Need for information
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
High Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
Identity theft is a growing concern
IDENTITY SCIENCES Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore While biometric systems aren t foolproof,
Security Issues in ATM Smart Card Technology
International Journal of Mathematics and Computational Science Vol. 1, No. 4, 2015, pp. 199-205 http://www.aiscience.org/journal/ijmcs Security Issues in ATM Smart Card Technology Nor Fazlina Mohd Amin,
Fingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Face Recognition Application for Automatic Teller Machines (ATM)
2012 International Conference on Information and Knowledge Management (ICIKM 2012) IPCSIT vol.45 (2012) (2012) IACSIT Press, Singapore Face Recognition Application for Automatic Teller Machines (ATM) Hossein
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
Finger vein authentication technology and financial applications
1 Finger vein authentication technology and financial applications Mitsutoshi Himaga 1 and Katsuhiro Kou 2 1 2 R&D Division, Hitachi-Omron Terminal Solutions, Corp., Owari-asahi, Aichi, Japan. [email protected]
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris
Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris Sanjay KANADE, Danielle CAMARA, Emine KRICHEN, Dijana PETROVSKA-DELACRÉTAZ, and Bernadette DORIZZI TELECOM & Management
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
COMPARISON OF VARIOUS BIOMETRIC METHODS
COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT [email protected], [email protected] Abstract This paper presents comparison
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Palmprint Classification
Palmprint Classification Li Fang*, Maylor K.H. Leung, Tejas Shikhare, Victor Chan, Kean Fatt Choon School of Computer Engineering, Nanyang Technological University, Singapore 639798 E-mail: [email protected]
