Visual Cryptography Using Two Factor Biometric System for Trust worthy Authentication

نویسندگان

  • Premanand
  • M. Natarajan
چکیده

Authenticity of the user is the major issue in today’s internet applications such as online transaction. Password has been the most used authentication mechanism which is subjected to online attacks. Due to unavoidable hacking on the internet, it is difficult to trust the User Identity on the internet. To solve this problem this paper proposes a BIOMETRIC based Visual Cryptography scheme to address the authentication issues. This methodology proposes the finger print image which is obtained from the user is Steganographed with PIN NUMBER of the user and the Steganographed image which in turn is divided into two shares. One share is stored in the bank database and the other share is provided to the customer. Hash code is generated for the customer share and it is stored in the bank database. One Time Password(OTP) is used every time to ensure the trusted submission of shares. The system not only ensures the secured transaction of process but also verifies the true identity of the person through one time password. The customer has to present the share during all of his/her transactions after entering the OTP. When the customer presents his share the hash code is generated and compared with the database value. If it matches, the shares are stacked to get the original Steganographed image. Again, the Desteganography process is carried on to obtain the original finger print image and the PIN NUMBER. The user is allowed to proceed further only after this authentication. This process ensures proper security scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Database of Biometric Systems

In cyberspace security of private data is a prominent issue. Beside the reliable algorithm for automatic authentication, providing the security of the server database is considerable. In this paper a technique to secure the database of an iris-based biometric system is proposed. We employed visual cryptography, permutation and a block-based saving procedure to protect the template from maliciou...

متن کامل

Secure Iris Authentication Using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

متن کامل

A Fingerprint Biometric Privacy Using Visual Cryptography

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract-Biometric authentication systems are gaining widespread popularity in recent years due to the advances in sensor technologies as well as improvements in the matching algorithms. Preserving the privacy of digital biometric data stored in a central d...

متن کامل

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. [1] This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. nsecrets equals n/2 levels. This paper also provides secured authentication for...

متن کامل

High Secure Crypto Biometric Authentication Protocol

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012