Amended Biometric Authentication using Secret Sharing
نویسندگان
چکیده
Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyze the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. The addition in number of users increases the size of the database which affects space and time complexity. The intent of this paper is to overcome these issues by applying (2, 2) visual cryptography for amend biometric authentication. The experimental results show great reduction in space and time complexity. General Terms Authentication, Biometrics, Secret sharing.
منابع مشابه
A Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentica...
متن کاملSecure Iris Authentication Using Visual Cryptography
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...
متن کاملA Novel Retina based Biometric Privacy using Visual Cryptography
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Preserving the biometric privacy such as digital biometric data (eg. face, iris, retina and fingerprint) is very important nowadays. The retinal biometrics is considered one of the most accurate and robust methods of the identity verification...
متن کاملSecuring the Images Using Biometric Cryptography Technique
A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work exp...
متن کاملBiometrics Based Secret Sharing Using Fuzzy Vault
In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014