International Journals

Permanent URI for this collectionhttps://dspace.psgrkcw.com/handle/123456789/157

Browse

Search Results

Now showing 1 - 4 of 4
  • Item
    CANCELABLE MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM WITH DISTORTION ALGORITHM
    (International Journal for Research in Technological Studies, 2015-08) Janani B; Radha N
    Biometrics refers to authentication techniques that rely on humans physical and behavioral characteristics that can be automatically checked. Biometric based authentication system provides robust security and ease of use than conventional methods of verification system. Multimodal biometric system is one of the major areas of study identified with large applications in recognition system. Unimodal biometric systems challenge with a wide variety of problems such as noisy data, Intra-class variations, non-universality, and spoof attacks. Some of these limitations can be solved in multimodal biometric system. In proposed work, face and fingerprint biometric traits are used for multimodal biometric authentication system. Biometric traits are transformed using distortion algorithm. After the transformation processes pre-processing of images are done to improve the clear visibility of images. The extractions of minutiae feature from fingerprint are achieved using Crossing Number concept and the face features are extracted using the Local Binary Pattern algorithm. To combine both the face and fingerprint features feature level fusion is used. In order to provide additional security to the proposed work the fuzzy vault is introduced by adding duplicate values and having a secret key to lock and unlock the system. Fuzzy vault and distortion acts as an additional layer of security in multimodal biometric user authentication system.
  • Item
    CANCELABLE TEMPLATE GENERATION BASED ON IMPROVED QUALITY FINGERPRINT IMAGE FOR PERSON AUTHENTICATION
    (International Journal of Computer Sciences & Engineering, 2015-01) Janani B; Radha N
    Biometric based authentication system provides robust security and ease of use than conventional methods of verification system. Among various biometrics namely iris, face and gait recognition, Fingerprint recognition has been extensively used by several organizations for recognition and authentication purpose because of its low cost, usability and reliable performance. However, the performance of fingerprint identification techniques is extensively depending on the quality of the input fingerprint images. Due to the context of the image-acquisition process, most of the fingerprint images are found to be low or lack in quality. By concerning privacy issues, these types of low-quality fingerprint templates are easily accessible by intruders, thereby lacks the security. To address this issue, the present work proposes quality enhanced, secured biometric template which simultaneously combines the quality enhancement and cancellable template generation techniques for robust authentication purpose. The fingerprint quality can be improved by means of two-phase enhancement technique, learns the acquired input image by enhancing spatial and frequency domain of image respectively. After that, the cancellable fingerprint templates are generated by means of transforming the quality enhanced fingerprint minutiae distortedly by using Distortion Transformation. Experimental results show that the proposed algorithm efficiently holds various input image contexts and attains improved results in terms of quality and security when compared with some state-of-the-art methods, and thus improves the fingerprint-authentication systems performance.
  • Item
    A SURVEY ON APPROACHES TO IMPROVE QUALITY OF FINGERPRINT IMAGE AND TEMPLATE SECURITY
    (International Journal of Computer Science Engineering and Technology, 2014-11) Janani B; Radha N
    A biometric is a distinct biological trait that can be used to recognize a person. Fingerprints have been used for over a century and are the most widely used for user identification. Fingerprint identification is commonly employed in Forensic science to support criminal investigations and in biometric systems such as civilian and commercial identification devices. Fingerprint is the pattern of ridges and valley on the inner surface of a finger or a thumb. The low-quality fingerprint images used for feature extraction and matching will not produce efficient results. To deal with the various methods for enhancing low-quality fingerprints images are discussed. In addition to enhancement, the storage of fingerprint template is also an important issue. Because when the hacker steels the template from the database, it can be misused. To avoid this problem, various template security techniques are surveyed. In this paper various image quality enhancement techniques and template security techniques are reviewed in the literature.
  • Item
    MULTIMODAL BIOMETRICS BASED AUTHENTICATION AGAINST DICTIONARY ATTACKS
    ((IJCSE) International Journal on Computer Science and Engineering, 2010-12) Tamilselvi P; Radha N
    The Multimodal Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database. Such systems are, prone to dictionary attacks initiated at the server side. In this paper, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) based user authentication and key exchange system. In this system, minutiae points and texture properties are extracted from the fingerprint and iris images are stored in the encrypted form in the server’s database, to overcome the dictionary attacks mounted by the server. The image processing techniques are used to extract a biometric measurement from the fingerprint and iris. During login procedure the mutual authentication is done between the server and user and a symmetric key is generated on both sides, which could be used for further secure communication between them. Thus meet-in-the middle attack that happens between the user and the server can also be overcome. This system can be directly applied to strengthen existing password or biometric based systems without requiring additional computation.