SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2334
FASSBTR: Fingerprint Authentication System Security Using Barcode
and Template Revamping
Anik Lal T. S1
1PG Scholar, Department of Computer Science and Engineering, Nehru College of Engineering and
Research Centre, Thiruvilamala, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -At present, a drastic change has beendevelopedin
the count of consumer electronic gadgets: such as Locking
systems, Smartphones. These devices are subsumed with
fingerprint sensors for authorised personnel authentication.
The sensors integrated in these devices aregenerallysmalland
the resulting images are therefore limited in size for the
purpose of portability . This paper scrutinizes the security
login layer and incorporates the fingerprint enhancement
level of histogram equalization and revamping the templates
of the partial fingerprint-based authentication systems. Here
in this paper, Firstly the user must enter their credentials in
order to move onto their fingerprint authentication process.It
takes only two revamped fingerprint impressions of a single
user while enrolling.
Key Words: Authorised, Enrolling, Revamp, Partial,
Templates
1. INTRODUCTION
At present, there are several vulnerabilities like
Fingerprint spoofing, Fingerprint remoulding and low built
quality of the small sized sensor used in the fingerprint
based authentication system. To compensate the issue of
mini sized sensors, these devicesacquire exactly two partial
impressions of a single finger during enrollment as a part of
security, to ensure that only one of the exact revamped
impression will match successfully with the image obtained
from the user during authentication.
A user is said to be successfully authenticated ifandonlyif
the security login layer is passed, then only the fingerprint
authentication process starts and obtain impressions via
enrollment otherwise if false credentials is placed the
complete process closes. During verification it must exactly
match one of the stored templates. Here it produces a
multiple layer security that is difficult for an attacker to
break. Some of the most common finger spoofing methods
and types of fingerprint scanners are mentioned below.
2. PRIOR WORK
The prior work focuses on the templates that are mainly
obtained from the partial fingerprints rather than full prints
via calculating the number of minutiae points. There are
three major research topics in the Prior work that are highly
connected to the proposed work and they are :Wolf Attack
Probability (WAP), Masterprint, Evidential Value Analysis.
2.1 Masterprint Generation and Existence
Hypothesis
The print generation and existence hypothesis process is
tested by performing the experiments that were conducted
on the FVC 2002 dataset that contains 8 prints of 100
subjects, for a total of 800 prints. Created partial prints of
size (w x h) by cropping the full prints using an overlapping
window that moved from top-bottom and left-right with a
half percent overlap between adjacent windows.
Two approaches: First, where the print is selected from an
existing dataset of real fingerprints. Two, where the print is
generated synthetically. SAMP: MasterPrints by sampling a
fingerprint dataset The “Imposter Match Rate” (IMR) -
which is the count of false matches when a fingerprint is
related against templates of other fingers (impostors) is
computed for all candidate prints.SYMP:Generateimproved
MasterPrints synthetically by maximizing theirIMRoverthe
dataset. The prints with maximum IMRs are selected from
the dataset.
2.2 Wolf Attack Probability
[2] proposed a security measure called "WAP", it estimates
the strength of a biometric authentication system against
impersonation attacks. In this work, a wolf is defined as any
input sample, including non-biometric samples such as
physical artefacts, that can falsely match with multiple
biometric templates.
2.3 Evidential Value Analysis
A.Nagar [3] proposed, a framework developed toacquirethe
evidence of a given fingerprint match score in terms of
nonmatch probability (NMP), namely, the posterior
probability that the pair of fingerprints being compared are
not match. The change in NMP values linked with the
fingerprint databases having specific print characteristics
(image quality, size and minutiae count).
The NMP values acquired from different partitions of a
fingerprint database are compared using a measure, named
the conclusiveness that computes the significance of
evidence associated with an NMP value. Due to paucity of a
large set of latent prints, rely and focus on the partial prints
obtained by cropping exemplar prints to simulate latent
prints and reveal the effectiveness of this simulation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2335
2.4 Computation of Indirect Attacks and
Countermeasures in Verification Systems
M. Martinez-Diaz [4] proposed and analysed the Biometric
recognition systems are extremely vulnerable to several
security threats. These includes direct attacks or indirect
attacks to the sensor, which indicatesthe oneaimedtowards
the interior system modules. Indirect attacks against
fingerprint verification systems are analyzed in order to
calculate how harmful they are. Software based attacks via
hill climbing algorithms are implemented and their success
rate is observed under several conditions.
Hill climbing attacks are generally highly effective in the
process of developing synthetic templatesthat are accepted
by the matcher as genuine. Score quantization has been
learnt as a needful counter-measure against hill climbing
attacks.
2.5 Effect of Artificial Fingers on Fingerprint Systems
T. Matsumoto [5] Proposed that Artificial fingers causes
major potential threats to the system. Dummy fingers are
very complex for the authentication process on the
fingerprint systems. Computation against attacksusingsuch
artificial fingers has been disclosed very rarely. The
acceptance count range of live fingers is greater than that of
gummy fingers for some systems that may be named as live
and Ill detection. If “live and Ill” detectors can clearly
distinguish their moisture, electric resistance, transparency
or bubble content then the fingerprint systems can reject
gummy fingers. Detection of compliance is a major part for
preventing gummy fingers.
2.6 Antispoofing Schemes for Fingerprint Recognition
Systems
E. Marasco [6] Proposed a technical study based on the
vulnerability of the fingerprint recognition system and
counter-attacks have been noted in detail in this literature.
One such vulnerability involves the use of artificial fingers,
where materials such as Play-Doh, silicone, and gelatin are
inscribed with the ridges. The main sections of Antispoofing
schemes are Hardware and Software based.
2.7 Fingerprint Template Selection
U. Uludag [7] Proposed a Fingerprint authentication system
operates by acquiring a fingerprint data from a user and
running the similarity measure against the template data
stored in a database in order to identify a person or to verify
a claimed identity. Many authentication systems store
multiple templates per user in order to collect variations
analysed in a person biometric data. In this section thereare
two methods to perform template selection automatically
where the main aim is to select the feature or core point of
the fingerprint templates for a finger from a given set of
fingerprint impressions. The first method, named DEND,
initializes a grouping concept to choose a template set that
represents the best intra-class micro changes, while the
second method, called MDIST, chooses the templates that
exhibit maximum similarity with the remainingimpressions.
2.8 Presentation Attack Detection Methods
C. Sousedik [8] Proposed that Fingerprint biometrics isused
in variousgadgets, to control the accesstowardsthesecurity
based environments. Any fingerprint system is highly
vulnerable against a fake fingerprint characteristic.
Fingerprint systems spoofing is one of the most widely
researched areas. The top rated sensors can also be
duplicated by an accurate imitation of the ridge or pores
structure of a fingerprint. An individual registered user
avoid identification by altering his own fingerprint pattern.
The efficiency of the methods strongly depends on the
knowledge of the artificial fabrication techniquesandquality
of the materials used during the development ofthemethod.
The fake fingerprints are used to spoof the sensor, therefore
the standard dataset are used and it should contain a large
number of scans captured by using high-quality fake
fingerprints.
2.9 A technical evaluation of fingerprint scanner
[9] A major technical parameter with high importance is the
resolution section, that is the number of pixelsperinch(dpi)
characterizing the acquired images. According to the base
architecture of the scanner system, the scanner with high
resolution produces the finer detailing that can be extracted
from a fingerprint image. A 500 dpi resolution is requiredby
higher officials or agencies for their processing.
Another major section is the size of the scanner sensingarea,
this parameter focuses the size of the fingerprint portion
which can be acquired by the scanner. Thesmalloverlapping
area between fingerprint acquired at differenttimesisoneof
the main causes of false rejections (FRR) in fingerprint
systems.
2.10 Barcode System Technology
In [10] this section we take the concept of Barcode-128
symbology, It is one of the most modern and high density
barcode system which helpsin storing ASCII codesaswellas
alphanumeric values. It uses a built-in check digits, It is a
part of the code and cannot be omitted. It isnotmentionedin
human readable format.
3. MODUS OPERANDI
This paper proposes the timer-based user credentials login
layer and enhancing the template byapplyingthecumulative
histogram equalization and revamping thefingerprintimage
for reprocessing the lost minutiae points which helps in
raising the accuracy of the partial fingerprint recognition.
3.1 User Credentials Login Layer
The main goal of this layer is to protect the privacy of the
user from unauthorised personnel’s. The steps are
mentioned below
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2336
STEPS:
1. The authorised users will be provided with the QR/
Barcode code consists of their own passcode and user-id
which is developed with combination of numbers and
alphabets with 15 digits based on their device model frame
code.
2. The particular QR / Barcode can only be accessed by
specified readers which is another security highlighted in
this layer.
3. The major section is, if the user-id or passcode is typed
wrong the whole session closes and without passing this
layer the fingerprint authentication section will not be
accessible.
3.2 Histogram Equalization Algorithm
In this paper, Partial Fingerprint is enhanced by increasing
the contrast of the input template using the histogram
equalization algorithm and a new furnished image is
developed accordingly.
STEPS:
1. The value of occurrencesis calculated using the gray scale
level k. Where K representsthe total number of graylevelsin
the image.
2. The probability of an occurrence of a pixel of level k
in the image is calculated.
3. The Corresponding Cumulative distribution function is
calculated.
4. A transformation of the form $k' = T(k)$ is createdto
produce a new image.
5. New image is calculated according to k' value.Collect
the new image and its Histogram.
3.3 Fingerprint Revamping Using Filters
Here In this paper, the degraded fingerprints with cuts and
scars are collected and processed to redevelop the partial
fingerprint templates.
STEPS:
1. The low quality partial fingerprints with cuts and scars or
with lost miutiae points are chosen.
2. The chosen template is converted to grey imageinorderto
remove the false contents of the image background.
3. Then segmentaion of the template is performed by
normalising and segmenting the ridge region.
4. Then estimates the local orientation of the ridges in a
template by calculating the image gradients and plottingthe
values.
5. To estimate the fingerprint ridge frequencybyconsidering
blocks of the image and % determining a ridge count within
each block.
6. Finally we get the image with fillings in the missing areas
in a binarized form.
3.4 Partial Fingerprint Feature Unsheathing Levels
1) Image Acquisition
This section controls the handling of the images that are
ready for processing.
2) Image preprocessing
Here in this section there are two operations to be
performed as a main they are: Binarization, Segmentaion.
Binarization : It is the processof transformingimagetoblack
and white form of pixels within a specified threshold value.
Here the 8 bit value is converted to 1 bit value with furrows
represented as '1' and ridge as '0' value.
Segmentation: In this layer the background and foreground
is divided using the block wise threshold variance inorderto
place a sharper image.
3) Ridge Thinning
It is a technique which is mainly forwarded to eliminate the
excess pixels of ridges till it reaches 1 pixel width. It is
mainly performed via morphological process. It produces a
high contrast and sharpness to the template image.
4) Locating Minutia Points
It is mainly processed in order to collect the minutepointsof
the fingerprint template . It uses the concept of Crossing
Number. These minutiae points are exactly collected using
the Neighborhood operation on each ridge pixeloftheimage
using 3 x 3 window. The neighbouring section with only
value 1 is taken as ridge ending.
5) Region Of Interest
In this process the bounded region of the closing area is
subtracted from the opening area accordingly where the
algorithm makesthe selected area tightly by eliminating the
rest of the areas.
6) Eliminating False Minutia
This layer does not completely recover the image, but it
removesthe excesspoints with darker content which is fake
or overlaped due to high pressure application onthe sensor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2337
3.5 AUTHENTICATION SYSTEM
In this paper Authentication system consists of twomodules
they are as mentioned below:
Enrollment: Here the authorised user places two
impressions for enolling to the database for further
purposes. As a part of security only two impressions are
taken in and stored to the database since it is very complex
to get a similar impression after applying revamping layer.
Verification: It is the section where the data that is given as
an input is checked with the files in the database which is
having high similarity value when related with the
mentioned threshold value.
3.6 DATABASE MATCHING USING FVC2002 AND
VERIFINGER SDK 1.6
Database matching is the process of comparison between
two files or more to check whether any similarity measureis
taking place for exact matching file to obtain and it is mainly
based on the mentioned threshold value.
Using FVC2002:
One To Single Check : Process of taking the input image and
comparing it with the image that is already stored in the
database to get a similarity meausre level.(One to One)
One to Many Check: Process of taking the input image and
comparing it with whole database in order to obtain the
complete list of matches.
Using Verifinger SDK 1.6: In this section the SDK uses the
input image to compare it with the whole data in the
database for crosschecking the image in detailed. It is more
faster and sharper, more accuracy is shown using this sdk
process.
Table - 1: Analysis of Fingerprint
Types Of
Fingerprint Acceptability Universality Performance
Live
fingerprint HIGH MEDIUM HIGH
Degraded
live print HIGH LOW MEDIUM
Synthetic
Print LOW MEDIUM LOW
3.7 SYSTEM ARCHITECTURE
4. RESULTS AND DISCUSSION
According to the performance evaluation of partial
fingerprints authentication system, usingtheconceptofUser
Credentials locking layer and Fingerprint Enhancement
layers like : Histogram Cumulative Equalization and Kovesi
Revamping (Reconstruction)there occurs a slight variation
in the rate. Here FVC 2002 DB-1(B) is used as the database
for computing.
Table-2 shows the Efficiency rate without the User
CredentialsLayer and Fingerprint EnhancementLayers,The
next table shows the Efficiency rate with the User
Credentials Layer and Fingerprint Enhancement Layers
marked as Table-3. When evaluating at core level Table-3
showsthe better improvement in the accuracyandefficiency
level when compared with Table-2.
Table-2: Efficiency and Accuracy test rates based on the
types of Fingerprint without Security Layer and
Enhancement Layer
Fingerprint
Types
No. of
Templates
Dataset
Correct
Prediction(in
%)
Wrong
Prediction(in
%)
Live Finger 80 37.5% 32.5%
DegradedLive
Finger
80 30% 25%
Synthetic
Finger
80 22.5% 17.5%
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2338
Table-3: Efficiency and Accuracy test rates based on the
types of Fingerprint with Security Layer and
Enhancement Layer
Fingerprint
Types
No. of
Templates
Dataset
Correct
Prediction(in
%)
Wrong
Prediction(in
%)
Live Finger 80 47.5% 40%
DegradedLive
Finger
80 37.5% 27.5%
Synthetic
Finger
80 20% 10%
5. CONCLUSION
In this paper, the proposed system includes the concept of
User Credentials login system via barcode for privacy and
incorporated the fingerprint system with histogram
equalization to enhance the image even after application
there are several flaws in the templates. For further
perfection added the concept of Fingerprint Revamping,
which shows the performance rise in the authentication
system and rejects fake users access.
REFERENCES
[1] Arun Ross, Nasir Memon, Aditi Roy. "MasterPrint:
Exploring the Vulnerability of Partial Fingerprint-based
Authentication Systems", IEEE Transactions on
Information Forensics and Security, DOI
10.1109/TIFS.2017.2691658
[2] M. Une, A. Otsuka, and H. Imai. Wolf attack probability:A
new security measure in biometric authentication
systems. In International Conference on Biometrics,
pages 396–406. Springer, 2007.
[3] A. Nagar, H. Choi, and A. K. Jain. Evidential value of
automated latent fingerprint comparison: an empirical
approach. IEEE Transactions on Information Forensics
and Security, 7(6):1752–1765, 2012.
[4] M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega-
Garcia. An evaluation of indirect attacks and
countermeasures in fingerprint verification systems.
Pattern Recognition Letters, 32(12):1643–1651, 2011.
[5] T. Matsumoto, H. Matsumoto, K. Yamada,andS.Hoshino.
Impact of artificial gummy fingers on fingerprint
systems. In Electronic Imaging, pages 275–289.
International Society for Optics and Photonics, 2002.
[6] E. Marasco and A. Ross. A survey on antispoofing
schemes for fingerprint recognition systems. ACM
Computing Surveys (CSUR), 47(2):28, 2015.
[7] U. Uludag, A. Ross, and A. Jain. Biometric template
selection and update: a case study in fingerprints.
Pattern Recognition, 37(7):1533– 1542, 2004.
[8] C. Sousedik and C. Busch. Presentation attack detection
methods for fingerprint recognition systems: a survey.
IET Biometrics, 3(4):219 – 233,2014.
[9] A technical evaluation of fingerprint scanners.
http://www.biometrika.it/eng/wpscfing.html.Accessed
Jan. 2016.
[10] TEC-IT Barcode System, http:// www.tec-it.com,TEC-IT
Datenverarbeitung GmbH, Hans-Wagner-Str. 6, A-4400
Steyr, Austria.

More Related Content

What's hot

DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1IJITE
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning MethodsIRJET Journal
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Journals
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmeSAT Publishing House
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
Passenger Screening using Deep Learning and Artificial Neural Networks
Passenger Screening using Deep Learning and Artificial Neural NetworksPassenger Screening using Deep Learning and Artificial Neural Networks
Passenger Screening using Deep Learning and Artificial Neural NetworksDr. Amarjeet Singh
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 

What's hot (19)

(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET -  	  Survey on Malware Detection using Deep Learning MethodsIRJET -  	  Survey on Malware Detection using Deep Learning Methods
IRJET - Survey on Malware Detection using Deep Learning Methods
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
Passenger Screening using Deep Learning and Artificial Neural Networks
Passenger Screening using Deep Learning and Artificial Neural NetworksPassenger Screening using Deep Learning and Artificial Neural Networks
Passenger Screening using Deep Learning and Artificial Neural Networks
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 

Similar to IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode and Template Revamping

IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET Journal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET Journal
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesTanjarul Islam Mishu
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 

Similar to IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode and Template Revamping (20)

IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...IRJET-  	  Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
IRJET- Survey on Shoulder Surfing Resistant Pin Entry by using Base Pin a...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
 
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their SecuritiesVulnerabilities of Fingerprint Authentication Systems and Their Securities
Vulnerabilities of Fingerprint Authentication Systems and Their Securities
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode and Template Revamping

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2334 FASSBTR: Fingerprint Authentication System Security Using Barcode and Template Revamping Anik Lal T. S1 1PG Scholar, Department of Computer Science and Engineering, Nehru College of Engineering and Research Centre, Thiruvilamala, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -At present, a drastic change has beendevelopedin the count of consumer electronic gadgets: such as Locking systems, Smartphones. These devices are subsumed with fingerprint sensors for authorised personnel authentication. The sensors integrated in these devices aregenerallysmalland the resulting images are therefore limited in size for the purpose of portability . This paper scrutinizes the security login layer and incorporates the fingerprint enhancement level of histogram equalization and revamping the templates of the partial fingerprint-based authentication systems. Here in this paper, Firstly the user must enter their credentials in order to move onto their fingerprint authentication process.It takes only two revamped fingerprint impressions of a single user while enrolling. Key Words: Authorised, Enrolling, Revamp, Partial, Templates 1. INTRODUCTION At present, there are several vulnerabilities like Fingerprint spoofing, Fingerprint remoulding and low built quality of the small sized sensor used in the fingerprint based authentication system. To compensate the issue of mini sized sensors, these devicesacquire exactly two partial impressions of a single finger during enrollment as a part of security, to ensure that only one of the exact revamped impression will match successfully with the image obtained from the user during authentication. A user is said to be successfully authenticated ifandonlyif the security login layer is passed, then only the fingerprint authentication process starts and obtain impressions via enrollment otherwise if false credentials is placed the complete process closes. During verification it must exactly match one of the stored templates. Here it produces a multiple layer security that is difficult for an attacker to break. Some of the most common finger spoofing methods and types of fingerprint scanners are mentioned below. 2. PRIOR WORK The prior work focuses on the templates that are mainly obtained from the partial fingerprints rather than full prints via calculating the number of minutiae points. There are three major research topics in the Prior work that are highly connected to the proposed work and they are :Wolf Attack Probability (WAP), Masterprint, Evidential Value Analysis. 2.1 Masterprint Generation and Existence Hypothesis The print generation and existence hypothesis process is tested by performing the experiments that were conducted on the FVC 2002 dataset that contains 8 prints of 100 subjects, for a total of 800 prints. Created partial prints of size (w x h) by cropping the full prints using an overlapping window that moved from top-bottom and left-right with a half percent overlap between adjacent windows. Two approaches: First, where the print is selected from an existing dataset of real fingerprints. Two, where the print is generated synthetically. SAMP: MasterPrints by sampling a fingerprint dataset The “Imposter Match Rate” (IMR) - which is the count of false matches when a fingerprint is related against templates of other fingers (impostors) is computed for all candidate prints.SYMP:Generateimproved MasterPrints synthetically by maximizing theirIMRoverthe dataset. The prints with maximum IMRs are selected from the dataset. 2.2 Wolf Attack Probability [2] proposed a security measure called "WAP", it estimates the strength of a biometric authentication system against impersonation attacks. In this work, a wolf is defined as any input sample, including non-biometric samples such as physical artefacts, that can falsely match with multiple biometric templates. 2.3 Evidential Value Analysis A.Nagar [3] proposed, a framework developed toacquirethe evidence of a given fingerprint match score in terms of nonmatch probability (NMP), namely, the posterior probability that the pair of fingerprints being compared are not match. The change in NMP values linked with the fingerprint databases having specific print characteristics (image quality, size and minutiae count). The NMP values acquired from different partitions of a fingerprint database are compared using a measure, named the conclusiveness that computes the significance of evidence associated with an NMP value. Due to paucity of a large set of latent prints, rely and focus on the partial prints obtained by cropping exemplar prints to simulate latent prints and reveal the effectiveness of this simulation.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2335 2.4 Computation of Indirect Attacks and Countermeasures in Verification Systems M. Martinez-Diaz [4] proposed and analysed the Biometric recognition systems are extremely vulnerable to several security threats. These includes direct attacks or indirect attacks to the sensor, which indicatesthe oneaimedtowards the interior system modules. Indirect attacks against fingerprint verification systems are analyzed in order to calculate how harmful they are. Software based attacks via hill climbing algorithms are implemented and their success rate is observed under several conditions. Hill climbing attacks are generally highly effective in the process of developing synthetic templatesthat are accepted by the matcher as genuine. Score quantization has been learnt as a needful counter-measure against hill climbing attacks. 2.5 Effect of Artificial Fingers on Fingerprint Systems T. Matsumoto [5] Proposed that Artificial fingers causes major potential threats to the system. Dummy fingers are very complex for the authentication process on the fingerprint systems. Computation against attacksusingsuch artificial fingers has been disclosed very rarely. The acceptance count range of live fingers is greater than that of gummy fingers for some systems that may be named as live and Ill detection. If “live and Ill” detectors can clearly distinguish their moisture, electric resistance, transparency or bubble content then the fingerprint systems can reject gummy fingers. Detection of compliance is a major part for preventing gummy fingers. 2.6 Antispoofing Schemes for Fingerprint Recognition Systems E. Marasco [6] Proposed a technical study based on the vulnerability of the fingerprint recognition system and counter-attacks have been noted in detail in this literature. One such vulnerability involves the use of artificial fingers, where materials such as Play-Doh, silicone, and gelatin are inscribed with the ridges. The main sections of Antispoofing schemes are Hardware and Software based. 2.7 Fingerprint Template Selection U. Uludag [7] Proposed a Fingerprint authentication system operates by acquiring a fingerprint data from a user and running the similarity measure against the template data stored in a database in order to identify a person or to verify a claimed identity. Many authentication systems store multiple templates per user in order to collect variations analysed in a person biometric data. In this section thereare two methods to perform template selection automatically where the main aim is to select the feature or core point of the fingerprint templates for a finger from a given set of fingerprint impressions. The first method, named DEND, initializes a grouping concept to choose a template set that represents the best intra-class micro changes, while the second method, called MDIST, chooses the templates that exhibit maximum similarity with the remainingimpressions. 2.8 Presentation Attack Detection Methods C. Sousedik [8] Proposed that Fingerprint biometrics isused in variousgadgets, to control the accesstowardsthesecurity based environments. Any fingerprint system is highly vulnerable against a fake fingerprint characteristic. Fingerprint systems spoofing is one of the most widely researched areas. The top rated sensors can also be duplicated by an accurate imitation of the ridge or pores structure of a fingerprint. An individual registered user avoid identification by altering his own fingerprint pattern. The efficiency of the methods strongly depends on the knowledge of the artificial fabrication techniquesandquality of the materials used during the development ofthemethod. The fake fingerprints are used to spoof the sensor, therefore the standard dataset are used and it should contain a large number of scans captured by using high-quality fake fingerprints. 2.9 A technical evaluation of fingerprint scanner [9] A major technical parameter with high importance is the resolution section, that is the number of pixelsperinch(dpi) characterizing the acquired images. According to the base architecture of the scanner system, the scanner with high resolution produces the finer detailing that can be extracted from a fingerprint image. A 500 dpi resolution is requiredby higher officials or agencies for their processing. Another major section is the size of the scanner sensingarea, this parameter focuses the size of the fingerprint portion which can be acquired by the scanner. Thesmalloverlapping area between fingerprint acquired at differenttimesisoneof the main causes of false rejections (FRR) in fingerprint systems. 2.10 Barcode System Technology In [10] this section we take the concept of Barcode-128 symbology, It is one of the most modern and high density barcode system which helpsin storing ASCII codesaswellas alphanumeric values. It uses a built-in check digits, It is a part of the code and cannot be omitted. It isnotmentionedin human readable format. 3. MODUS OPERANDI This paper proposes the timer-based user credentials login layer and enhancing the template byapplyingthecumulative histogram equalization and revamping thefingerprintimage for reprocessing the lost minutiae points which helps in raising the accuracy of the partial fingerprint recognition. 3.1 User Credentials Login Layer The main goal of this layer is to protect the privacy of the user from unauthorised personnel’s. The steps are mentioned below
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2336 STEPS: 1. The authorised users will be provided with the QR/ Barcode code consists of their own passcode and user-id which is developed with combination of numbers and alphabets with 15 digits based on their device model frame code. 2. The particular QR / Barcode can only be accessed by specified readers which is another security highlighted in this layer. 3. The major section is, if the user-id or passcode is typed wrong the whole session closes and without passing this layer the fingerprint authentication section will not be accessible. 3.2 Histogram Equalization Algorithm In this paper, Partial Fingerprint is enhanced by increasing the contrast of the input template using the histogram equalization algorithm and a new furnished image is developed accordingly. STEPS: 1. The value of occurrencesis calculated using the gray scale level k. Where K representsthe total number of graylevelsin the image. 2. The probability of an occurrence of a pixel of level k in the image is calculated. 3. The Corresponding Cumulative distribution function is calculated. 4. A transformation of the form $k' = T(k)$ is createdto produce a new image. 5. New image is calculated according to k' value.Collect the new image and its Histogram. 3.3 Fingerprint Revamping Using Filters Here In this paper, the degraded fingerprints with cuts and scars are collected and processed to redevelop the partial fingerprint templates. STEPS: 1. The low quality partial fingerprints with cuts and scars or with lost miutiae points are chosen. 2. The chosen template is converted to grey imageinorderto remove the false contents of the image background. 3. Then segmentaion of the template is performed by normalising and segmenting the ridge region. 4. Then estimates the local orientation of the ridges in a template by calculating the image gradients and plottingthe values. 5. To estimate the fingerprint ridge frequencybyconsidering blocks of the image and % determining a ridge count within each block. 6. Finally we get the image with fillings in the missing areas in a binarized form. 3.4 Partial Fingerprint Feature Unsheathing Levels 1) Image Acquisition This section controls the handling of the images that are ready for processing. 2) Image preprocessing Here in this section there are two operations to be performed as a main they are: Binarization, Segmentaion. Binarization : It is the processof transformingimagetoblack and white form of pixels within a specified threshold value. Here the 8 bit value is converted to 1 bit value with furrows represented as '1' and ridge as '0' value. Segmentation: In this layer the background and foreground is divided using the block wise threshold variance inorderto place a sharper image. 3) Ridge Thinning It is a technique which is mainly forwarded to eliminate the excess pixels of ridges till it reaches 1 pixel width. It is mainly performed via morphological process. It produces a high contrast and sharpness to the template image. 4) Locating Minutia Points It is mainly processed in order to collect the minutepointsof the fingerprint template . It uses the concept of Crossing Number. These minutiae points are exactly collected using the Neighborhood operation on each ridge pixeloftheimage using 3 x 3 window. The neighbouring section with only value 1 is taken as ridge ending. 5) Region Of Interest In this process the bounded region of the closing area is subtracted from the opening area accordingly where the algorithm makesthe selected area tightly by eliminating the rest of the areas. 6) Eliminating False Minutia This layer does not completely recover the image, but it removesthe excesspoints with darker content which is fake or overlaped due to high pressure application onthe sensor.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2337 3.5 AUTHENTICATION SYSTEM In this paper Authentication system consists of twomodules they are as mentioned below: Enrollment: Here the authorised user places two impressions for enolling to the database for further purposes. As a part of security only two impressions are taken in and stored to the database since it is very complex to get a similar impression after applying revamping layer. Verification: It is the section where the data that is given as an input is checked with the files in the database which is having high similarity value when related with the mentioned threshold value. 3.6 DATABASE MATCHING USING FVC2002 AND VERIFINGER SDK 1.6 Database matching is the process of comparison between two files or more to check whether any similarity measureis taking place for exact matching file to obtain and it is mainly based on the mentioned threshold value. Using FVC2002: One To Single Check : Process of taking the input image and comparing it with the image that is already stored in the database to get a similarity meausre level.(One to One) One to Many Check: Process of taking the input image and comparing it with whole database in order to obtain the complete list of matches. Using Verifinger SDK 1.6: In this section the SDK uses the input image to compare it with the whole data in the database for crosschecking the image in detailed. It is more faster and sharper, more accuracy is shown using this sdk process. Table - 1: Analysis of Fingerprint Types Of Fingerprint Acceptability Universality Performance Live fingerprint HIGH MEDIUM HIGH Degraded live print HIGH LOW MEDIUM Synthetic Print LOW MEDIUM LOW 3.7 SYSTEM ARCHITECTURE 4. RESULTS AND DISCUSSION According to the performance evaluation of partial fingerprints authentication system, usingtheconceptofUser Credentials locking layer and Fingerprint Enhancement layers like : Histogram Cumulative Equalization and Kovesi Revamping (Reconstruction)there occurs a slight variation in the rate. Here FVC 2002 DB-1(B) is used as the database for computing. Table-2 shows the Efficiency rate without the User CredentialsLayer and Fingerprint EnhancementLayers,The next table shows the Efficiency rate with the User Credentials Layer and Fingerprint Enhancement Layers marked as Table-3. When evaluating at core level Table-3 showsthe better improvement in the accuracyandefficiency level when compared with Table-2. Table-2: Efficiency and Accuracy test rates based on the types of Fingerprint without Security Layer and Enhancement Layer Fingerprint Types No. of Templates Dataset Correct Prediction(in %) Wrong Prediction(in %) Live Finger 80 37.5% 32.5% DegradedLive Finger 80 30% 25% Synthetic Finger 80 22.5% 17.5%
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 2338 Table-3: Efficiency and Accuracy test rates based on the types of Fingerprint with Security Layer and Enhancement Layer Fingerprint Types No. of Templates Dataset Correct Prediction(in %) Wrong Prediction(in %) Live Finger 80 47.5% 40% DegradedLive Finger 80 37.5% 27.5% Synthetic Finger 80 20% 10% 5. CONCLUSION In this paper, the proposed system includes the concept of User Credentials login system via barcode for privacy and incorporated the fingerprint system with histogram equalization to enhance the image even after application there are several flaws in the templates. For further perfection added the concept of Fingerprint Revamping, which shows the performance rise in the authentication system and rejects fake users access. REFERENCES [1] Arun Ross, Nasir Memon, Aditi Roy. "MasterPrint: Exploring the Vulnerability of Partial Fingerprint-based Authentication Systems", IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2017.2691658 [2] M. Une, A. Otsuka, and H. Imai. Wolf attack probability:A new security measure in biometric authentication systems. In International Conference on Biometrics, pages 396–406. Springer, 2007. [3] A. Nagar, H. Choi, and A. K. Jain. Evidential value of automated latent fingerprint comparison: an empirical approach. IEEE Transactions on Information Forensics and Security, 7(6):1752–1765, 2012. [4] M. Martinez-Diaz, J. Fierrez, J. Galbally, and J. Ortega- Garcia. An evaluation of indirect attacks and countermeasures in fingerprint verification systems. Pattern Recognition Letters, 32(12):1643–1651, 2011. [5] T. Matsumoto, H. Matsumoto, K. Yamada,andS.Hoshino. Impact of artificial gummy fingers on fingerprint systems. In Electronic Imaging, pages 275–289. International Society for Optics and Photonics, 2002. [6] E. Marasco and A. Ross. A survey on antispoofing schemes for fingerprint recognition systems. ACM Computing Surveys (CSUR), 47(2):28, 2015. [7] U. Uludag, A. Ross, and A. Jain. Biometric template selection and update: a case study in fingerprints. Pattern Recognition, 37(7):1533– 1542, 2004. [8] C. Sousedik and C. Busch. Presentation attack detection methods for fingerprint recognition systems: a survey. IET Biometrics, 3(4):219 – 233,2014. [9] A technical evaluation of fingerprint scanners. http://www.biometrika.it/eng/wpscfing.html.Accessed Jan. 2016. [10] TEC-IT Barcode System, http:// www.tec-it.com,TEC-IT Datenverarbeitung GmbH, Hans-Wagner-Str. 6, A-4400 Steyr, Austria.