Biometric encryption using enhanced finger print image and elliptic curve

نویسندگان

  • G. Mary Amirtha Sagayee
  • S. Arumugam
  • G. S. Anandha Mala
چکیده

The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which means that the true biometrics are never stored or revealed to the authentication server. Biometrics, cryptography and data hiding will provide good perspectives for information security. Most of the researchers confirmed that the finger print is widely used than the iris or face and more over it is the primary choice for most privacy concerned applications. Also many mathematicians proved that Elliptic Curve is the best solution for Cryptography[10]. For finger prints applications, choosing proper sensor is at risk. The proposed work deals about, how the image quality can be improved by introducing image fusion technique at sensor levels. The results of the images after introducing the decision rule based image fusion technique are evaluated and analyzed with its entropy levels and root mean square error. Then the resultant enhanced image is used for extracting the key for ECC applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ANN Classifier for Finger Knuckle Print Recognition using Gabor Feature

This paper proposes an enhanced method for personal authentication based on finger Knuckle Print using Gabor transform. In study shows that finger knuckle print (FKP) technique of a person can be used as a biometric trait in a biometric authentication system due to its uniqueness property. Hand-based person recognition provides a reliable, in low-cost and user-friendly viable solution for a ran...

متن کامل

Biometric Cryptosystem for VoIP Security using RSA Key Generation

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

متن کامل

Finger Knuckle-print Identification Based on Local and Global Feature Extraction Using Sdost

Finger knuckle-print biometric system has widely used in modern e-world. The region of interest is needed as the key for the feature extraction in a good biometric system. The symmetric discrete orthonormal stockwell transform provides the computational efficiency and multi-scale information of wavelet transforms, while providing texture features in terms of Fourier frequencies. It outperforms ...

متن کامل

A multimodal biometric system based on palmprint and finger knuckle print recognition methods

Biometric authentication is an effective method for automatically recognizing a person’s identity. In our previous paper, we have considered palm print for human authentication. Recently, it has been found that the Finger Knuckle Print (FKP), which refers to the inherent skin patterns of the outer surface around the phalangeal joint of one’s finger, has high capability to discriminate different...

متن کامل

A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein and Finger Vein Fusion

Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJESDF

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2013