Secure Authentication System Using Biometric Cryptosystem
Journal Title: IOSR Journals (IOSR Journal of Electrical and Electronics Engineering) - Year 2018, Vol 13, Issue 2
Abstract
Online digital information security is gaining drastic significance with the boost and progression of internet communication. With the advent of ecommerce and ebanking and its further evolution, the traditional methods of personal identification like token based methods and knowledge-based methods like PINs, passwords are no longer sufficient for secure transfer of critical data online. Though Biometric Authentication systems are comparatively a better option, they can be vulnerable to several attacks when it comes to Authentication online. Hence, Biometric Cryptosystems are proposed to enhance the security of biometric authentication systems and to create revocable representations of individuals. Alternatively, Steganography techniques play a crucial role in encapsulating encoded biometric data behind an unpredicted carrier. The proposed system employs CASIA-FingerprintV5 database of fifty fingerprint samples and emphasizes on providing improved security to the critical biometric data in two stages (i.e. Biometric Cryptosystem followed by Steganography) before it is transferred online to the Authenticator. At the Authenticator side, the verification and identification process are carried out using Euclidean distance and Hausdorff distance. On analyzing the experimental results, it can be concluded that the proposed system performs better matching when Euclidean distance is used.
Authors and Affiliations
Manjari Benhar Peethala
Intelligent Secured Garage for Smart Buildings
Huge traffic in INDIA is due to improper parking system at various places like theatres, apartments, supermarkets etc. This forces the people to park their vehicle on roads. The present project work deals with the automa...
Solar PV/Battery System Analysis for Faculty of Engineering Building, Rivers State University, Port Harcourt, Nigeria.
The incessant power failure in the Faculty of Engineering main building, Rivers State University, Port Harcourt, Nigeria, has made the faculty and departmental offices to resort to private generators that cause air and n...
Compared with the Effects of Two Measurement Methods on the Luminescent Properties of LED Phosphors
Accurate measurement of LED phosphor performance parameters, the traditional test method commonly used is to use a laser or xenon lamp as an incident light source, which is not only expensive, but also the results are no...
Structural and Optical Characterization of CdS Nanoparticles Grown in Different Solvents
In the present work a chemical method is followed to grow CdS nanoparticles at room temperature by varying the growth time as well as solvents. Anhydrous CdCl2, Sulphur powder,sodium borohydride powders are used as react...
Comparison of Differential Evolution and Particle Swarm Optimization for Optimizing the Power Generation Potential in Hydroelectric Power Plants using Dot Net
This paper proposes an optimization model for the selection of turbines in order to improve the power generation potential in a Hydro Power Plant. The thermal, electrical and mechanical stresses that occur over time on t...