SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 998
A Robust finger Print Authentication Scheme viaBlockchain to retrieve
Citizen Card details
ROCHANA.C, PREETHI.M.R , PROF.LEENA SHRUTHI.H.M
Student, Dept. of Computer Science Engineering, East West institute of technology, Karnataka, India
Student, Dept. of Computer Science Engineering, East West institute of technology ng, Karnataka, India
Professor, Dept. of Computer Science Engineering, East West institute of technology, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Biometric identification has won significance
Within the latest years. With the creation of theBlockchain
era, the database owners are endorsed to storethe massive
length of biometric statistics and play identityobligations to
the cloud using Blockchain to reduce thecost and to limitany
threat to the consumer’s privacy. Weare offering an effective
and privacy-included biometric identity scheme. Here the
biometric(fingerprint)is largely used for biometric
identification and the database owner(admin)encrypts the
information before transferring it to the cloud. The cloud
executes the operations in theencrypted database and offers
the information that is required to the admin (database
proprietor). An intensive analysis of the proposed scheme
indicates that if theattacker tries to assault or forge any
facts, a brand-newhash code is generated, resulting in an
attempt oftampering with records.
Key Words: Biometric identification, blockchain,
fingerprint, database owner ,hash code
1. INTRODUCTION
Biometric identification has attracted growinginterest as it
presents a promising manner to pick out users evaluated
with conventional authenticationstrategiesprimarilyonthe
basisofidentitycards&passwords. Biometricidentityisseen
to be more reliable and handier. Furthermore, biometric
identity was extensively utilized in several fields through
biometric tendencies, including facial patterns, iris, and
fingerprints, which may be accumulated from numerous
sensors. The database proprietor which includes the FBI is
accountable for managing the national database of
fingerprints and could choose to outsource a biometric
identification machine. The sizable biometric information to
the cloud server (like Amazon) to cast off the costly garage
and prices of computation. Nevertheless, to protect the
data’s privacy, the biometric datamust firstbeencrypted.On
every occasion an FBI associate (such as the police station)
desires to confirm the identity of an individual, he
approaches the FBI and produces an identification query
with the help of a person's biometric characteristics (for
example facial patterns,voicestyles,irises,fingerprints,etc.).
TheFBIwillthenencryptthequeryandsendthisto the cloud
to locate a close match. Consequently, the difficult hassle is
the way to create a protocol that allows efficiency and
privateness-keeping biometric identificationinsidethecloud
through the use of blockchain. Several biometric
identification systems that protect privacy were presented.
2. LITERATURE SURVEY
A. A Peer-to-Peer Electronic Cash System
Abstract: Internet payments might be transferreddirectly
between individuals, avoiding economicgroupings, with the
use of a peer-to-peerelectronic currency concept. Virtual
signaturesoffer a part of the solution; however, the major
profits are misplaced if a dependent on a 3rd partyremains
needed to save you double-spending. We proposed a
technique for the double-spendinghassle of the use of a
peer-to-peer community. The network timestamps
transactions via hashing them into a continuous chain of
hash-primarily based evidence of work, forming a record
that could not be modified without redoing the evidence of
paintings.
B. Securing Fingerprint Template Using Blockchain
and Distributed Storage System
Abstract:Biometrics,withitsstrongpointtoeachperson, has
been adopted as a protectionauthentication characteristic
by way of manyestablishments. Those biometricfactsare
processed into templates that are stored ondatabases, and
a government centralizes and controls those databases.
This shape of storing biometric records, or in our case
fingerprinttemplate, is uneven and at risk of three principal
protection attacks, together with faux template input,
template amendment or deletion, andchannel interception
by a malicious attacker. Inthis paper, we cozy an encrypted
fingerprint template through a symmetric peer-to-peer
community and symmetric encryption. The fingerprint is
encrypted by way of the symmetric key set of rules: an
advanced Encryption trendy(AES) set of rules after which
is uploaded to asymmetrically disbursed storage machine,
the IPFS (“Inter Planetary file system”). The hash of the
template is saved in a decentralizedblockchain.
C. Analysis of Data Management inBlockchain-Based
Systems: From Architecture to Governance
Summary: In a blockchain-primarily based gadget,
information and the consensus-primarilybasedprocedureof
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 999
recording and updating them over dispensed nodes are
imperative to enabling the trust-less multi-birthday
celebration transactions. Consequently, nicelyknowledgeof
what and the way the data are saved and manipulated in the
long run determines the diploma of application, overall
performance, andprice of a blockchain-based application.
Even asblockchains beautify the best of the data by using
presenting a transparent, immutable, and regulardata store,
the technology additionallybringsnewdemandingsituations
from a data control perspective. In this paper, we examine
blockchains fromthe pointof view of a developerto focus on
crucial concepts and concerns while incorporating a
blockchain into a larger softwareprogram machine as a fact
save. The paintings pursuits to increase the extent of the
expertise of blockchain technology as an information shop
and to sell a methodical approach in making use of it to big
software systems. First, we perceive the common
architectural layers of a normal software device with facts
shops and conceptualize every layer in blockchain phrases.
D
. An efficient Cluster-based technique to Thwart
Wormhole assault in Adhoc Networks
Abstract: Cell ad-hoc networks are a growing field with
potential developments that drawinvestigatorswitha range
of improvements and changes. These networks are
independent with adynamic character, yet they lack a clear
structure.The routing protocols are where the advert-hoc
community's power rests, making thema good candidate for
transmission. With numerous varieties of routing, protocols
present our attention is on the LGF (geocaching and
forwarding based on location) protocol that falls in the
function-based total category. LGF guarantees to grab
attention with its feature of reduced bandwidth
consumption and routing overhead at the cost of uninvited
attacks that compromise the security of data. In ourmethod,
we provide a method to conquer powerful assaults such as
Blackhole and Wormhole with the aid of aggregating LGF
with the k++ methodClustering aims to sell securityservices
and optimize direction. The suggested technique is assessed
towards QoS factors such as quit ending postpones, Load
balancing, and transport Ratio of LGF with Simulator NS3.2
which estimateddrasticperformanceacceleration within the
previously mentioned version.
E. BlockIPFSBlockchain-enabled Interplanetary File
System for Forensic andTrusted Data Traceability
Summary: The Interplanetary (IPFS) report device is a
disbursed file machine that aims to decentralizetheinternet
as well as make it quickerandextra effective. It makes use of
well-known techniqueslikeGit&BitTorrenttobuildaswarm
of computer devices that exchange data.The reason that its
creation in 2016, IPFS has visible notable enhancementsand
adoption by people and employer organizations. Users may
exchange documents and statistics throughout the world
because of its dispersed network. IPFS works nicely with
huge documents. The evaluation suggests it may resist the
capacityattacks. Except, though overall performance that
could devour or need substantial bandwidth to add or/and
download over the net. The acceptance of this dispensed
record system is an element because IPFS is intended to
function ontop of various protocols,whichincludeHTTP and
FTP. But there are underlining issues referring to security
and getting admission to manipulating, for instance, the
inability tomonitor how the files are accessed.
3. PROPOSED SYSTEM
In present-day society, biometric systems are often used
rather than passwords as an authentication method with
high-degree protection, making it complex for hackers to
penetrate the system. At this point, the blockchain could
offer excessive-level safety as quick-having access to the
method in an effectiveway. Any authentication procedure
uses some kind of standard hashing to generate virtual
signatures. The identical digital signature may beused with
the blockchain method via regarding the hashing approach
has been proposed.
4. WORKFLOW DIAGRAM
5. CONCLUSION
In these paintings, we proposed a singular try to endorse a
novel safety coverage by way of linking to the blockchain
using biometrics for a scanned fingerprint photo to retrieve
a citizen card information securely. To recognize the
performance and secure necessities, we have proposed a
novel encryption set of rules and “cloud authentication”
certification. The specificreviews, we similarlyvalidated the
suggestedmethod satisfy the effectiveness need nicely.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1000
REFERENCES
[1]A. Jain,L. Hong, andS. Pankanti, “Biometricidentification”
Commun. ACM, vol. 43, no. 2, pp. 90–98,2000.
[2]. R. Allen, P. Sankar, and S. Prabhakar, “Fingerprint
identificationtechnology” in Biometric Systems.London,U.K.:
Springer, 2005, pp. 22–61.
[3] J. de Mira, Jr., H. V. Neto, E. B. Neves, and F. K. Schneider,
“Biometricorientedirisidentificationbasedonmathematical
morphology” J. Signal Process. Syst., vol. 80, no. 2, pp. 181–
195, 2015.
[4] S.Romdhani,V. Blanz, andT. Vetter, “Faceidentification
by fitting a 3D morphable model using linear shape and
texture error functions” in Proc. Eur. Conf. Comput. Vis.,
2002, pp. 3–19.
[5] Y. Xiao et al., “A survey of key management schemes in
wireless sensor networks” Comput. Commun.,vol. 30, nos.
11–12, pp. 2314–2341, Sep. 2007.
[6] X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, “An effective
key management scheme for heterogeneous sensor
networks” Ad Hoc Netw., vol. 5, no. 1, pp. 24–34, 2007.
[7] X. Du and H. H. Chen, “Security in wireless sensor
networks” IEEE Wireless Commun. Mag., vol. 15,no. 4, pp.
60–66, Aug. 2008.
[8] X. Hei and X. Du, “Biometric-based two-level secure
access control for implantable medical devices during
emergencies” in Proc. IEEE INFOCOM, Apr. 2011, pp. 346–
350.
[9] X. Hei, X. Du, J. Wu, and F. Hu, “Defending resource
depletion attacks on implantable medical devices”in Proc.
IEEE GLOBECOM, Dec. 2010, pp. 1–5.
[10] M. Barni et al., “Privacy-preserving finger code
authentication” in Proc. 12th ACM Workshop Multimedia
Secure., 2010, pp. 231–240.

More Related Content

Similar to A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen Card details

IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET Journal
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET Journal
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd Iaetsd
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election System
IRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET Journal
 

Similar to A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen Card details (20)

IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITYA STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
A STUDY ON ADOPTION OF BLOCKCHAIN TECHNOLOGY IN CYBERSECURITY
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
“ALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
IRJET - Consortium Blockchain Application for Agriculture and Food Supply Cha...
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
BEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election SystemBEE – Blockchain Enabled Election System
BEE – Blockchain Enabled Election System
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen Card details

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 998 A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen Card details ROCHANA.C, PREETHI.M.R , PROF.LEENA SHRUTHI.H.M Student, Dept. of Computer Science Engineering, East West institute of technology, Karnataka, India Student, Dept. of Computer Science Engineering, East West institute of technology ng, Karnataka, India Professor, Dept. of Computer Science Engineering, East West institute of technology, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Biometric identification has won significance Within the latest years. With the creation of theBlockchain era, the database owners are endorsed to storethe massive length of biometric statistics and play identityobligations to the cloud using Blockchain to reduce thecost and to limitany threat to the consumer’s privacy. Weare offering an effective and privacy-included biometric identity scheme. Here the biometric(fingerprint)is largely used for biometric identification and the database owner(admin)encrypts the information before transferring it to the cloud. The cloud executes the operations in theencrypted database and offers the information that is required to the admin (database proprietor). An intensive analysis of the proposed scheme indicates that if theattacker tries to assault or forge any facts, a brand-newhash code is generated, resulting in an attempt oftampering with records. Key Words: Biometric identification, blockchain, fingerprint, database owner ,hash code 1. INTRODUCTION Biometric identification has attracted growinginterest as it presents a promising manner to pick out users evaluated with conventional authenticationstrategiesprimarilyonthe basisofidentitycards&passwords. Biometricidentityisseen to be more reliable and handier. Furthermore, biometric identity was extensively utilized in several fields through biometric tendencies, including facial patterns, iris, and fingerprints, which may be accumulated from numerous sensors. The database proprietor which includes the FBI is accountable for managing the national database of fingerprints and could choose to outsource a biometric identification machine. The sizable biometric information to the cloud server (like Amazon) to cast off the costly garage and prices of computation. Nevertheless, to protect the data’s privacy, the biometric datamust firstbeencrypted.On every occasion an FBI associate (such as the police station) desires to confirm the identity of an individual, he approaches the FBI and produces an identification query with the help of a person's biometric characteristics (for example facial patterns,voicestyles,irises,fingerprints,etc.). TheFBIwillthenencryptthequeryandsendthisto the cloud to locate a close match. Consequently, the difficult hassle is the way to create a protocol that allows efficiency and privateness-keeping biometric identificationinsidethecloud through the use of blockchain. Several biometric identification systems that protect privacy were presented. 2. LITERATURE SURVEY A. A Peer-to-Peer Electronic Cash System Abstract: Internet payments might be transferreddirectly between individuals, avoiding economicgroupings, with the use of a peer-to-peerelectronic currency concept. Virtual signaturesoffer a part of the solution; however, the major profits are misplaced if a dependent on a 3rd partyremains needed to save you double-spending. We proposed a technique for the double-spendinghassle of the use of a peer-to-peer community. The network timestamps transactions via hashing them into a continuous chain of hash-primarily based evidence of work, forming a record that could not be modified without redoing the evidence of paintings. B. Securing Fingerprint Template Using Blockchain and Distributed Storage System Abstract:Biometrics,withitsstrongpointtoeachperson, has been adopted as a protectionauthentication characteristic by way of manyestablishments. Those biometricfactsare processed into templates that are stored ondatabases, and a government centralizes and controls those databases. This shape of storing biometric records, or in our case fingerprinttemplate, is uneven and at risk of three principal protection attacks, together with faux template input, template amendment or deletion, andchannel interception by a malicious attacker. Inthis paper, we cozy an encrypted fingerprint template through a symmetric peer-to-peer community and symmetric encryption. The fingerprint is encrypted by way of the symmetric key set of rules: an advanced Encryption trendy(AES) set of rules after which is uploaded to asymmetrically disbursed storage machine, the IPFS (“Inter Planetary file system”). The hash of the template is saved in a decentralizedblockchain. C. Analysis of Data Management inBlockchain-Based Systems: From Architecture to Governance Summary: In a blockchain-primarily based gadget, information and the consensus-primarilybasedprocedureof
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 999 recording and updating them over dispensed nodes are imperative to enabling the trust-less multi-birthday celebration transactions. Consequently, nicelyknowledgeof what and the way the data are saved and manipulated in the long run determines the diploma of application, overall performance, andprice of a blockchain-based application. Even asblockchains beautify the best of the data by using presenting a transparent, immutable, and regulardata store, the technology additionallybringsnewdemandingsituations from a data control perspective. In this paper, we examine blockchains fromthe pointof view of a developerto focus on crucial concepts and concerns while incorporating a blockchain into a larger softwareprogram machine as a fact save. The paintings pursuits to increase the extent of the expertise of blockchain technology as an information shop and to sell a methodical approach in making use of it to big software systems. First, we perceive the common architectural layers of a normal software device with facts shops and conceptualize every layer in blockchain phrases. D . An efficient Cluster-based technique to Thwart Wormhole assault in Adhoc Networks Abstract: Cell ad-hoc networks are a growing field with potential developments that drawinvestigatorswitha range of improvements and changes. These networks are independent with adynamic character, yet they lack a clear structure.The routing protocols are where the advert-hoc community's power rests, making thema good candidate for transmission. With numerous varieties of routing, protocols present our attention is on the LGF (geocaching and forwarding based on location) protocol that falls in the function-based total category. LGF guarantees to grab attention with its feature of reduced bandwidth consumption and routing overhead at the cost of uninvited attacks that compromise the security of data. In ourmethod, we provide a method to conquer powerful assaults such as Blackhole and Wormhole with the aid of aggregating LGF with the k++ methodClustering aims to sell securityservices and optimize direction. The suggested technique is assessed towards QoS factors such as quit ending postpones, Load balancing, and transport Ratio of LGF with Simulator NS3.2 which estimateddrasticperformanceacceleration within the previously mentioned version. E. BlockIPFSBlockchain-enabled Interplanetary File System for Forensic andTrusted Data Traceability Summary: The Interplanetary (IPFS) report device is a disbursed file machine that aims to decentralizetheinternet as well as make it quickerandextra effective. It makes use of well-known techniqueslikeGit&BitTorrenttobuildaswarm of computer devices that exchange data.The reason that its creation in 2016, IPFS has visible notable enhancementsand adoption by people and employer organizations. Users may exchange documents and statistics throughout the world because of its dispersed network. IPFS works nicely with huge documents. The evaluation suggests it may resist the capacityattacks. Except, though overall performance that could devour or need substantial bandwidth to add or/and download over the net. The acceptance of this dispensed record system is an element because IPFS is intended to function ontop of various protocols,whichincludeHTTP and FTP. But there are underlining issues referring to security and getting admission to manipulating, for instance, the inability tomonitor how the files are accessed. 3. PROPOSED SYSTEM In present-day society, biometric systems are often used rather than passwords as an authentication method with high-degree protection, making it complex for hackers to penetrate the system. At this point, the blockchain could offer excessive-level safety as quick-having access to the method in an effectiveway. Any authentication procedure uses some kind of standard hashing to generate virtual signatures. The identical digital signature may beused with the blockchain method via regarding the hashing approach has been proposed. 4. WORKFLOW DIAGRAM 5. CONCLUSION In these paintings, we proposed a singular try to endorse a novel safety coverage by way of linking to the blockchain using biometrics for a scanned fingerprint photo to retrieve a citizen card information securely. To recognize the performance and secure necessities, we have proposed a novel encryption set of rules and “cloud authentication” certification. The specificreviews, we similarlyvalidated the suggestedmethod satisfy the effectiveness need nicely.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 07 | July 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1000 REFERENCES [1]A. Jain,L. Hong, andS. Pankanti, “Biometricidentification” Commun. ACM, vol. 43, no. 2, pp. 90–98,2000. [2]. R. Allen, P. Sankar, and S. Prabhakar, “Fingerprint identificationtechnology” in Biometric Systems.London,U.K.: Springer, 2005, pp. 22–61. [3] J. de Mira, Jr., H. V. Neto, E. B. Neves, and F. K. Schneider, “Biometricorientedirisidentificationbasedonmathematical morphology” J. Signal Process. Syst., vol. 80, no. 2, pp. 181– 195, 2015. [4] S.Romdhani,V. Blanz, andT. Vetter, “Faceidentification by fitting a 3D morphable model using linear shape and texture error functions” in Proc. Eur. Conf. Comput. Vis., 2002, pp. 3–19. [5] Y. Xiao et al., “A survey of key management schemes in wireless sensor networks” Comput. Commun.,vol. 30, nos. 11–12, pp. 2314–2341, Sep. 2007. [6] X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, “An effective key management scheme for heterogeneous sensor networks” Ad Hoc Netw., vol. 5, no. 1, pp. 24–34, 2007. [7] X. Du and H. H. Chen, “Security in wireless sensor networks” IEEE Wireless Commun. Mag., vol. 15,no. 4, pp. 60–66, Aug. 2008. [8] X. Hei and X. Du, “Biometric-based two-level secure access control for implantable medical devices during emergencies” in Proc. IEEE INFOCOM, Apr. 2011, pp. 346– 350. [9] X. Hei, X. Du, J. Wu, and F. Hu, “Defending resource depletion attacks on implantable medical devices”in Proc. IEEE GLOBECOM, Dec. 2010, pp. 1–5. [10] M. Barni et al., “Privacy-preserving finger code authentication” in Proc. 12th ACM Workshop Multimedia Secure., 2010, pp. 231–240.