Fingerprint combination for privacy protection

  • 1,224 views
Uploaded on

we propose here a novel system for protecting finger print privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different …

we propose here a novel system for protecting finger print privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers
Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching technique.

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,224
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
51
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. D-Secure Privacy Protection based on Fingerprint
  • 2. Abstract: Fingerprint recognition is an active research area nowadays. In many areas we are using fingerprint recognition for to improve the security and privacy. In finger print recognitions system the recognition can be done by fingerprint matching techniques. Fingerprint matching techniques are classified in two categories: Fingerprint verification and Fingerprint identification. In this project we are using the fingerprint verification. For this we propose here a novel system for protecting finger print privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching technique. We are going to develop this project in Dot Net Technology.
  • 3. Existing System: In the Existing system finger prints are scanned single finger. And it is stored in database, and while the authentication process stored finger print is matched with the enrollment finger print. This type of system didn’t provide full security and privacy to the users. Advantage:  Most convenient because of Single finger print  The prices of the finger print readers are pocket friendly  No need to remember Password. Disadvantages:  Less Security ( rejects certain percentage of the people)  Limited Privacy Protection o Store the registered and the objective images in the system, which may cause the risk of exposure and leakage of the private fingerprint image.  Require extra time to identify user  High attacks from hackers.  Proposed System: In proposed system model contain biometric authentication. During Authentication, system will verify the details in the database and identify whether the user authorized person or not. If the user is unauthorized mean, the server gives the error message to that user. If the user authorized mean, the server give the acknowledgment to user for further actions. Matching process is proposed for matching the two query fingerprints against a combined minutiae template. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a
  • 4. new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching algorithms. Advantage:  Double level Security  No Limited Privacy Protection  System Can Achieve A Very Low Error Rate  High Performance System Specification Software Requirements:  MS Windows XP/2000  MS Visual Studio.Net 2005  MS SQL Server 2000 Hardware Requirements:  Hard Disk: 20GB and Above  RAM: 1GB and Above  Processor: Pentium III and Above
  • 5. Architecture Diagram: Enrolment (Two fingerprint input) Combined Minutiae Template Generation Authorization Database Authentication (Two fingerprint input) Yes/No Two-Stage Fingerprint Matching Existing System Architecture Enrolment (Single fingerprint input) Authorization Database Authentication (Single fingerprint input) Minutiae Fingerprint Matching s Yes/No
  • 6. Fingerprint Verification Algorithm Proposed Method: Minutiae Method Fingerprint verification Algorithm: Minutia method uses feature information of the terminal points and separate points of ridges of the fingerprint and their relative positions. Existing Method: Pattern Matching Method Fingerprint Verification Algorithm: Pattern-matching method verifies the identity of the patterns by directly comparing the objective fingerprint images with the registered image.