Hybrid Multimodal Template Protection Technique Using Fuzzy Extractor And Random Projection
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
Due to the popularity of biometric authentication system, it is extremely important to protect the biometric template available in the networks. Template protection technique is a critical issue in biometric authentication system. Basically the protection technique can be categorized into Biometric CryptoSystem (BCS) and Cancelable Biometrics(CB). In this paper, an efficient hybrid template protection technique which combines both Biometric CryptoSystem (BCS) and Cancelable Biometrics (CB) was proposed. The proposed system uses key generating cryptosystem and feature transformation method. The limitation of the feature transform was overcome by this approach. We focus on these techniques using Iris, Fingerprint (i.e. multimodal Biometrics)as traits. The Experimental Results shows no degradation in results by combining both the Biometric CryptoSystem (BCS) and Cancelable Biometrics (CB). It is important that the biometric authentication system should withstand the attacks and the template theft by the adversary.
Authors and Affiliations
G. Karthi, M. Ezhilarasan
Analysis and Applications of IOT using Raspberry Pi
As the next frontier of the Internet, the IoT represents a persuasive opportunity across an astounding array of applications. When taken as a whole, the IoT can potentially transform nearly every aspect of how we live...
A NEW APPROACH FOR EVALUATING THE QUALITY OF DE-BLOCKED IMAGES
JPEG Compression is the most prevalent technique or method for images codecs. But it suffers from blocking artifacts. In this paper a comparison of the perceptual quality of deblocked images based on various quality...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks
The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...
An Optimized MAC Unit Using S-MB Recoding Scheme and Compressors
In this paper, we demonstrate a MAC unit using 8 bit Booth multiplier and addition operation. Most of DSP applications uses addition and multiplication unit for faster operation. This arithmetic unit mainly multiplica...