SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 54-57
www.iosrjournals.org
DOI: 10.9790/0661-17335457 www.iosrjournals.org 54 | Page
“Enhancing Iris Scanning Using Visual Cryptography”
Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur
Trupti kumbhare
Sneha Kallapur
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic or
behavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniques
among all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris.
For authentication, the feature template in the database and the user template should be the same. Storing the
template in the database securely is not a secure approach, because it can be stolen. To deal with this security
issue, in our paper a new method for securely storing the template in the database is proposed.
Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scanned
image is divided into different parts i.e. called as shares; these shares are stored in the database. The proposed
Visual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. In
our proposed system, we present a powerful approach of iris recognition. It uses an improved circular Hough
transform to detect the inner boundary.
Keywords: Biometric Iris,Visual Cryptography,Hough Transform
I. Introduction
Now a days, providing security for accessing some secure resources is becoming a crucial process.
Technology has introduced a much smarter solution to us which is known as Biometrics. Biometric is a Greek
Word Bio means ―Life‖ and metrics means ―Measurement‖. Biometrics deal with automated methods of
identifying a person or verifying the identity of person based on physiological or behavioral (signature, gait,
etc.) characteristics.
Applications such as ATM ,Bank,International identity card, aviation security, Reseach Lab require
identication of people. Recognition systems which use iris biometric are believed to be very accurate, and hence
efforts are being put to improve their accuracy and reliability.Iris biometric is the one which can be easily
available, less expensive, accurate.It is the most powerful and secure technique when compared to other
methods. Iris is a thin circular structure in the human eye. Powerful feature of the iris is used for identification
purpose. Iris is a very unique feature.
Identification of a person is done using following steps. Human eye is acquired and the iris
preprocessing steps are carried out. preprocessing consists of segmentation, normalization and feature
extraction. Iris template is got after iris preprocessing. Then iris template is stored in the database and then the
user authentication is verified using the comparison between the iris template.
Fig1. Iris scan method
The template is stored in database, hence security of stored templates get affected, the attacker can
easily get unauthorized access. The hacked templates can be misused. e.g. Bank transactions. Hence, fool-
proof methodologies are essential to securely store the templates.
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 55 | Page
In this paper a system is proposed by visual cryptography technique to protect the iris template to make
it secure from attack in system database as well as dual layer of authentication to the users.
The proposed model is a literature survey on "Enhancing Iris Recognition” based on Visual
Cryptography".
II. Motivation And Related Work
Security of data is very important issue because many a times security lacks in encryption and
decryption that way we use a powerful technique of Visual cryptography and provide a biometric authentication.
Biometric is a method of identifying the identity of person based on physiological or behavioral characteristics.
Many biometric technique are available such as Facial , iris, hand, palm print, voice and signature among those
iris recognition is one of the most powerful and unique.
Applications such as Bank and ATM require efficient security. Biometric identification methods that
identify individual person are based on physiological and behavioral characteristics. Currently, fingerprint, face
and iris are the most widely used recognition systems. Recognition systems which use iris biometric are
believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability.
Iris recognition is define in three steps they are iris segmentation, normalization, feature extraction
Segmentation is done in order to detect the inner and the outer boundaries of the iris that forms a circle. It is
used for finding the center and the diameter of the iris. Normalization is done for mapping the iris from polar to
Cartesian coordinates. It converts the iris ring into rectangular form. It will make all the iris patters to same size.
For extracting the specific features from the iris, feature extraction method is used.The motivational theme
behind this proposed literature survey is to built meaningful shares which overcome the problem of security
crucial. The key source of inspiration is an opportunity to know which researches has been done on visual
cryptography.
III. Literature Review
Authentication can be implemented in different ways, such as password based authentication, device
based authentication and biometric authentication .Password based authentication is one of the best ways to
provide security but it can be hacked easily. Device based authentication includes the methods for providing the
security by means of hardware token,software tokens ,smart card and USB tokens but these methods are very
expensive. Biometric authentication provide different types for recognizing human based on their physical and
behavioral characteristics.Biometrics makes use of physical characteristics such as Iris, Finger Print, , Palm
Prints, Retinal, Ear, Hand Geometry, DNA, and Face where as behavioral characteristics such as Handwriting,
Signature, Gait, Body Odor, and Thermal Emission of Human Body. Iris authentication is one of the most
powerful and secure technique. Iris is one of the most unique features in the human body and it can be used for
rmost secured identification purpose.
Biometric templates should not be stored securely in plain text form different methods are needed to
securely stored the templates in database. Biometric data and templates can be protected using cryptography,
stenography and watermarking. In this paper, the proposed method visual cryptography is used for securely
storing templates in database system. Visual cryptography concept is used for generating the meaningful shares
so that quality of image will not be reduced.
IV. System Architecture
Visual Cryptography technique is used for protecting the iris template from attackers and to avoid an
unauthorized access
The proposed system consist of two modules Enrollment module and Authentication module.
Enrollment module is classified into two sub modules : SNF module and VC module. An authorized person will
have to pass through these phases as explained below.
3.1 Enrollment : During enrollment phase, all biometric information from an authorized person is captured.
3.1.1 SNF Module: The system administrator will collect the eye image of person for authentication purpose.
This image will be passed to the SNF module which consists of three steps : Segmentation, Normalization and
Feature extraction. The extracted iris image is created and stored in the database and it is named as any system
generated random number. Then, png image of this number will be sent to the VC module.
In Segmentation, main objective is to extract the iris template from the eye image. The Hough
Transform algorithm is used in this step.
In Normalization, the iris region is transformed to the fixed dimensions in order to allow comparisons.
In Feature extraction, accurate recognition of individuals is obtained.The most essential information of
an iris must be extracted. Only the desired features of the iris must be encoded so that templates can be
compared.
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 56 | Page
3.1.2 VC Module: Using Random number generator algorithm the extracted iris template is stored in database.
This number is given as input to the VC module and then two shares are generated. out of which one share is
stored in the database and the other is kept with employee.
3.2 Authntication phase: In this phase, eye image of the user will passed through the SNF process. Then this
extracted image and iris template will be compared. If both the templates match then that the user is a registered
employee.
Fig2. Future Request System Architecture
Fig3. Stages of iris recognition
V. Future Scope
The proposed method will work for monochrome images. The future work is to be on the colored eye
image.The shared should be generated using color visual cryptography.
VI. Conclusion
There are various techniques adopted by researchers to secure raw biometric template but in this paper
a new approach for authenticating the person by securely the iris template by generating the shares. The visual
cryptography proposed in this paper will generates the meaningful shares which reduces the problem of existing
method. In existing method, meaningless shares generates the poor quality compared to original image. The new
method invented in this paper will be more secure and efficient .Hence iris system will be more secured and
reliable in security critical applications.
References
[1]. PDont Blink:Iris Recognition for Biometric Identication", SANS Institute InfoSec Reading Room
[2]. L.Masek, P Kovesi, "Recognition of human iris patterns for biometric identification". Tech. Rep., The School of Computer Science
and Software Engineering, The University of Western Australia.
[3]. Libor Masek ,"Recognition of Human Iris Patterns for Biometric Identication", The University of Western Australia, 2003.
[4]. Moni Nair and Adi Shamir, "Visual cryptography" .In Proceedings of the advances in cryptology- Eurocrypt, 1- 12,1995.
[5]. S. Lim K. Lee O. Byeon and T. Kim, "Ecient Iris Recognition through Improvement of Feature Vector and Classier." ETRI J., vol.
23, no. 2,pp. 61-70, 200l
[6]. "Biometric Template Protection With Robust Semi Blind Watermarking Using Image Intrinsic Local Property", International
Journal of Biometrics and Bio-informatics (I1BB), Volume (5) : Issue (2) : 2011
[7]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,"Biometrics Security using Steganography", International Journal of Security,
Volume (2) : Issue (1).
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 57 | Page
[8]. Zhifang Wang, Qi Han and Xiamu Niu, Christoph
[9]. Busch," A Novel Template Protection Algorithm For Iris Recognition", Eighth International Conference on Intelligent Systems
Design and Applications.
[10]. "Iris matching using multi-dimensional artificial neural network" R.M. Faroukl R. Kumar2 K.A. Riad, The Institution of
Engineering and Technology 2011, lET Com put. Vis., 2011, Vol. 5, Iss. 3, pp. 178-184
[11]. Wen-Pinn Fang "Non-expansion visual secret sharing in reversible style". I1CSNS International Journal of Computer Science and
Network Security, 9(2), February 2009. ISBN: 978-

More Related Content

What's hot

Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesIDES Editor
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 

What's hot (18)

A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Final report
Final reportFinal report
Final report
 

Similar to “Enhancing Iris Scanning Using Visual Cryptography”

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 

Similar to “Enhancing Iris Scanning Using Visual Cryptography” (20)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
J1076975
J1076975J1076975
J1076975
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

“Enhancing Iris Scanning Using Visual Cryptography”

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 54-57 www.iosrjournals.org DOI: 10.9790/0661-17335457 www.iosrjournals.org 54 | Page “Enhancing Iris Scanning Using Visual Cryptography” Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur Trupti kumbhare Sneha Kallapur Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic or behavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniques among all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris. For authentication, the feature template in the database and the user template should be the same. Storing the template in the database securely is not a secure approach, because it can be stolen. To deal with this security issue, in our paper a new method for securely storing the template in the database is proposed. Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scanned image is divided into different parts i.e. called as shares; these shares are stored in the database. The proposed Visual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. In our proposed system, we present a powerful approach of iris recognition. It uses an improved circular Hough transform to detect the inner boundary. Keywords: Biometric Iris,Visual Cryptography,Hough Transform I. Introduction Now a days, providing security for accessing some secure resources is becoming a crucial process. Technology has introduced a much smarter solution to us which is known as Biometrics. Biometric is a Greek Word Bio means ―Life‖ and metrics means ―Measurement‖. Biometrics deal with automated methods of identifying a person or verifying the identity of person based on physiological or behavioral (signature, gait, etc.) characteristics. Applications such as ATM ,Bank,International identity card, aviation security, Reseach Lab require identication of people. Recognition systems which use iris biometric are believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability.Iris biometric is the one which can be easily available, less expensive, accurate.It is the most powerful and secure technique when compared to other methods. Iris is a thin circular structure in the human eye. Powerful feature of the iris is used for identification purpose. Iris is a very unique feature. Identification of a person is done using following steps. Human eye is acquired and the iris preprocessing steps are carried out. preprocessing consists of segmentation, normalization and feature extraction. Iris template is got after iris preprocessing. Then iris template is stored in the database and then the user authentication is verified using the comparison between the iris template. Fig1. Iris scan method The template is stored in database, hence security of stored templates get affected, the attacker can easily get unauthorized access. The hacked templates can be misused. e.g. Bank transactions. Hence, fool- proof methodologies are essential to securely store the templates.
  • 2. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 55 | Page In this paper a system is proposed by visual cryptography technique to protect the iris template to make it secure from attack in system database as well as dual layer of authentication to the users. The proposed model is a literature survey on "Enhancing Iris Recognition” based on Visual Cryptography". II. Motivation And Related Work Security of data is very important issue because many a times security lacks in encryption and decryption that way we use a powerful technique of Visual cryptography and provide a biometric authentication. Biometric is a method of identifying the identity of person based on physiological or behavioral characteristics. Many biometric technique are available such as Facial , iris, hand, palm print, voice and signature among those iris recognition is one of the most powerful and unique. Applications such as Bank and ATM require efficient security. Biometric identification methods that identify individual person are based on physiological and behavioral characteristics. Currently, fingerprint, face and iris are the most widely used recognition systems. Recognition systems which use iris biometric are believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability. Iris recognition is define in three steps they are iris segmentation, normalization, feature extraction Segmentation is done in order to detect the inner and the outer boundaries of the iris that forms a circle. It is used for finding the center and the diameter of the iris. Normalization is done for mapping the iris from polar to Cartesian coordinates. It converts the iris ring into rectangular form. It will make all the iris patters to same size. For extracting the specific features from the iris, feature extraction method is used.The motivational theme behind this proposed literature survey is to built meaningful shares which overcome the problem of security crucial. The key source of inspiration is an opportunity to know which researches has been done on visual cryptography. III. Literature Review Authentication can be implemented in different ways, such as password based authentication, device based authentication and biometric authentication .Password based authentication is one of the best ways to provide security but it can be hacked easily. Device based authentication includes the methods for providing the security by means of hardware token,software tokens ,smart card and USB tokens but these methods are very expensive. Biometric authentication provide different types for recognizing human based on their physical and behavioral characteristics.Biometrics makes use of physical characteristics such as Iris, Finger Print, , Palm Prints, Retinal, Ear, Hand Geometry, DNA, and Face where as behavioral characteristics such as Handwriting, Signature, Gait, Body Odor, and Thermal Emission of Human Body. Iris authentication is one of the most powerful and secure technique. Iris is one of the most unique features in the human body and it can be used for rmost secured identification purpose. Biometric templates should not be stored securely in plain text form different methods are needed to securely stored the templates in database. Biometric data and templates can be protected using cryptography, stenography and watermarking. In this paper, the proposed method visual cryptography is used for securely storing templates in database system. Visual cryptography concept is used for generating the meaningful shares so that quality of image will not be reduced. IV. System Architecture Visual Cryptography technique is used for protecting the iris template from attackers and to avoid an unauthorized access The proposed system consist of two modules Enrollment module and Authentication module. Enrollment module is classified into two sub modules : SNF module and VC module. An authorized person will have to pass through these phases as explained below. 3.1 Enrollment : During enrollment phase, all biometric information from an authorized person is captured. 3.1.1 SNF Module: The system administrator will collect the eye image of person for authentication purpose. This image will be passed to the SNF module which consists of three steps : Segmentation, Normalization and Feature extraction. The extracted iris image is created and stored in the database and it is named as any system generated random number. Then, png image of this number will be sent to the VC module. In Segmentation, main objective is to extract the iris template from the eye image. The Hough Transform algorithm is used in this step. In Normalization, the iris region is transformed to the fixed dimensions in order to allow comparisons. In Feature extraction, accurate recognition of individuals is obtained.The most essential information of an iris must be extracted. Only the desired features of the iris must be encoded so that templates can be compared.
  • 3. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 56 | Page 3.1.2 VC Module: Using Random number generator algorithm the extracted iris template is stored in database. This number is given as input to the VC module and then two shares are generated. out of which one share is stored in the database and the other is kept with employee. 3.2 Authntication phase: In this phase, eye image of the user will passed through the SNF process. Then this extracted image and iris template will be compared. If both the templates match then that the user is a registered employee. Fig2. Future Request System Architecture Fig3. Stages of iris recognition V. Future Scope The proposed method will work for monochrome images. The future work is to be on the colored eye image.The shared should be generated using color visual cryptography. VI. Conclusion There are various techniques adopted by researchers to secure raw biometric template but in this paper a new approach for authenticating the person by securely the iris template by generating the shares. The visual cryptography proposed in this paper will generates the meaningful shares which reduces the problem of existing method. In existing method, meaningless shares generates the poor quality compared to original image. The new method invented in this paper will be more secure and efficient .Hence iris system will be more secured and reliable in security critical applications. References [1]. PDont Blink:Iris Recognition for Biometric Identication", SANS Institute InfoSec Reading Room [2]. L.Masek, P Kovesi, "Recognition of human iris patterns for biometric identification". Tech. Rep., The School of Computer Science and Software Engineering, The University of Western Australia. [3]. Libor Masek ,"Recognition of Human Iris Patterns for Biometric Identication", The University of Western Australia, 2003. [4]. Moni Nair and Adi Shamir, "Visual cryptography" .In Proceedings of the advances in cryptology- Eurocrypt, 1- 12,1995. [5]. S. Lim K. Lee O. Byeon and T. Kim, "Ecient Iris Recognition through Improvement of Feature Vector and Classier." ETRI J., vol. 23, no. 2,pp. 61-70, 200l [6]. "Biometric Template Protection With Robust Semi Blind Watermarking Using Image Intrinsic Local Property", International Journal of Biometrics and Bio-informatics (I1BB), Volume (5) : Issue (2) : 2011 [7]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,"Biometrics Security using Steganography", International Journal of Security, Volume (2) : Issue (1).
  • 4. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 57 | Page [8]. Zhifang Wang, Qi Han and Xiamu Niu, Christoph [9]. Busch," A Novel Template Protection Algorithm For Iris Recognition", Eighth International Conference on Intelligent Systems Design and Applications. [10]. "Iris matching using multi-dimensional artificial neural network" R.M. Faroukl R. Kumar2 K.A. Riad, The Institution of Engineering and Technology 2011, lET Com put. Vis., 2011, Vol. 5, Iss. 3, pp. 178-184 [11]. Wen-Pinn Fang "Non-expansion visual secret sharing in reversible style". I1CSNS International Journal of Computer Science and Network Security, 9(2), February 2009. ISBN: 978-