SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 54-57
www.iosrjournals.org
DOI: 10.9790/0661-17335457 www.iosrjournals.org 54 | Page
“Enhancing Iris Scanning Using Visual Cryptography”
Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur
Trupti kumbhare
Sneha Kallapur
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic or
behavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniques
among all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris.
For authentication, the feature template in the database and the user template should be the same. Storing the
template in the database securely is not a secure approach, because it can be stolen. To deal with this security
issue, in our paper a new method for securely storing the template in the database is proposed.
Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scanned
image is divided into different parts i.e. called as shares; these shares are stored in the database. The proposed
Visual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. In
our proposed system, we present a powerful approach of iris recognition. It uses an improved circular Hough
transform to detect the inner boundary.
Keywords: Biometric Iris,Visual Cryptography,Hough Transform
I. Introduction
Now a days, providing security for accessing some secure resources is becoming a crucial process.
Technology has introduced a much smarter solution to us which is known as Biometrics. Biometric is a Greek
Word Bio means ―Life‖ and metrics means ―Measurement‖. Biometrics deal with automated methods of
identifying a person or verifying the identity of person based on physiological or behavioral (signature, gait,
etc.) characteristics.
Applications such as ATM ,Bank,International identity card, aviation security, Reseach Lab require
identication of people. Recognition systems which use iris biometric are believed to be very accurate, and hence
efforts are being put to improve their accuracy and reliability.Iris biometric is the one which can be easily
available, less expensive, accurate.It is the most powerful and secure technique when compared to other
methods. Iris is a thin circular structure in the human eye. Powerful feature of the iris is used for identification
purpose. Iris is a very unique feature.
Identification of a person is done using following steps. Human eye is acquired and the iris
preprocessing steps are carried out. preprocessing consists of segmentation, normalization and feature
extraction. Iris template is got after iris preprocessing. Then iris template is stored in the database and then the
user authentication is verified using the comparison between the iris template.
Fig1. Iris scan method
The template is stored in database, hence security of stored templates get affected, the attacker can
easily get unauthorized access. The hacked templates can be misused. e.g. Bank transactions. Hence, fool-
proof methodologies are essential to securely store the templates.
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 55 | Page
In this paper a system is proposed by visual cryptography technique to protect the iris template to make
it secure from attack in system database as well as dual layer of authentication to the users.
The proposed model is a literature survey on "Enhancing Iris Recognition” based on Visual
Cryptography".
II. Motivation And Related Work
Security of data is very important issue because many a times security lacks in encryption and
decryption that way we use a powerful technique of Visual cryptography and provide a biometric authentication.
Biometric is a method of identifying the identity of person based on physiological or behavioral characteristics.
Many biometric technique are available such as Facial , iris, hand, palm print, voice and signature among those
iris recognition is one of the most powerful and unique.
Applications such as Bank and ATM require efficient security. Biometric identification methods that
identify individual person are based on physiological and behavioral characteristics. Currently, fingerprint, face
and iris are the most widely used recognition systems. Recognition systems which use iris biometric are
believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability.
Iris recognition is define in three steps they are iris segmentation, normalization, feature extraction
Segmentation is done in order to detect the inner and the outer boundaries of the iris that forms a circle. It is
used for finding the center and the diameter of the iris. Normalization is done for mapping the iris from polar to
Cartesian coordinates. It converts the iris ring into rectangular form. It will make all the iris patters to same size.
For extracting the specific features from the iris, feature extraction method is used.The motivational theme
behind this proposed literature survey is to built meaningful shares which overcome the problem of security
crucial. The key source of inspiration is an opportunity to know which researches has been done on visual
cryptography.
III. Literature Review
Authentication can be implemented in different ways, such as password based authentication, device
based authentication and biometric authentication .Password based authentication is one of the best ways to
provide security but it can be hacked easily. Device based authentication includes the methods for providing the
security by means of hardware token,software tokens ,smart card and USB tokens but these methods are very
expensive. Biometric authentication provide different types for recognizing human based on their physical and
behavioral characteristics.Biometrics makes use of physical characteristics such as Iris, Finger Print, , Palm
Prints, Retinal, Ear, Hand Geometry, DNA, and Face where as behavioral characteristics such as Handwriting,
Signature, Gait, Body Odor, and Thermal Emission of Human Body. Iris authentication is one of the most
powerful and secure technique. Iris is one of the most unique features in the human body and it can be used for
rmost secured identification purpose.
Biometric templates should not be stored securely in plain text form different methods are needed to
securely stored the templates in database. Biometric data and templates can be protected using cryptography,
stenography and watermarking. In this paper, the proposed method visual cryptography is used for securely
storing templates in database system. Visual cryptography concept is used for generating the meaningful shares
so that quality of image will not be reduced.
IV. System Architecture
Visual Cryptography technique is used for protecting the iris template from attackers and to avoid an
unauthorized access
The proposed system consist of two modules Enrollment module and Authentication module.
Enrollment module is classified into two sub modules : SNF module and VC module. An authorized person will
have to pass through these phases as explained below.
3.1 Enrollment : During enrollment phase, all biometric information from an authorized person is captured.
3.1.1 SNF Module: The system administrator will collect the eye image of person for authentication purpose.
This image will be passed to the SNF module which consists of three steps : Segmentation, Normalization and
Feature extraction. The extracted iris image is created and stored in the database and it is named as any system
generated random number. Then, png image of this number will be sent to the VC module.
In Segmentation, main objective is to extract the iris template from the eye image. The Hough
Transform algorithm is used in this step.
In Normalization, the iris region is transformed to the fixed dimensions in order to allow comparisons.
In Feature extraction, accurate recognition of individuals is obtained.The most essential information of
an iris must be extracted. Only the desired features of the iris must be encoded so that templates can be
compared.
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 56 | Page
3.1.2 VC Module: Using Random number generator algorithm the extracted iris template is stored in database.
This number is given as input to the VC module and then two shares are generated. out of which one share is
stored in the database and the other is kept with employee.
3.2 Authntication phase: In this phase, eye image of the user will passed through the SNF process. Then this
extracted image and iris template will be compared. If both the templates match then that the user is a registered
employee.
Fig2. Future Request System Architecture
Fig3. Stages of iris recognition
V. Future Scope
The proposed method will work for monochrome images. The future work is to be on the colored eye
image.The shared should be generated using color visual cryptography.
VI. Conclusion
There are various techniques adopted by researchers to secure raw biometric template but in this paper
a new approach for authenticating the person by securely the iris template by generating the shares. The visual
cryptography proposed in this paper will generates the meaningful shares which reduces the problem of existing
method. In existing method, meaningless shares generates the poor quality compared to original image. The new
method invented in this paper will be more secure and efficient .Hence iris system will be more secured and
reliable in security critical applications.
References
[1]. PDont Blink:Iris Recognition for Biometric Identication", SANS Institute InfoSec Reading Room
[2]. L.Masek, P Kovesi, "Recognition of human iris patterns for biometric identification". Tech. Rep., The School of Computer Science
and Software Engineering, The University of Western Australia.
[3]. Libor Masek ,"Recognition of Human Iris Patterns for Biometric Identication", The University of Western Australia, 2003.
[4]. Moni Nair and Adi Shamir, "Visual cryptography" .In Proceedings of the advances in cryptology- Eurocrypt, 1- 12,1995.
[5]. S. Lim K. Lee O. Byeon and T. Kim, "Ecient Iris Recognition through Improvement of Feature Vector and Classier." ETRI J., vol.
23, no. 2,pp. 61-70, 200l
[6]. "Biometric Template Protection With Robust Semi Blind Watermarking Using Image Intrinsic Local Property", International
Journal of Biometrics and Bio-informatics (I1BB), Volume (5) : Issue (2) : 2011
[7]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,"Biometrics Security using Steganography", International Journal of Security,
Volume (2) : Issue (1).
“Enhancing Iris Scanning Using Visual Cryptography”
DOI: 10.9790/0661-17335457 www.iosrjournals.org 57 | Page
[8]. Zhifang Wang, Qi Han and Xiamu Niu, Christoph
[9]. Busch," A Novel Template Protection Algorithm For Iris Recognition", Eighth International Conference on Intelligent Systems
Design and Applications.
[10]. "Iris matching using multi-dimensional artificial neural network" R.M. Faroukl R. Kumar2 K.A. Riad, The Institution of
Engineering and Technology 2011, lET Com put. Vis., 2011, Vol. 5, Iss. 3, pp. 178-184
[11]. Wen-Pinn Fang "Non-expansion visual secret sharing in reversible style". I1CSNS International Journal of Computer Science and
Network Security, 9(2), February 2009. ISBN: 978-

More Related Content

What's hot

A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
IDES Editor
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
Subhash Basistha
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
Siddharth Kishan
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
anoop80686
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
Raghavendra DC
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
MUTHUKUMAR MANIVANNAN
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov
 
Final report
Final reportFinal report
Final report
Pranjul Mishra
 

What's hot (18)

A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Final report
Final reportFinal report
Final report
 

Viewers also liked

G017224349
G017224349G017224349
G017224349
IOSR Journals
 
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
IOSR Journals
 
D012622129
D012622129D012622129
D012622129
IOSR Journals
 
Multiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaMultiplier and Accumulator Using Csla
Multiplier and Accumulator Using Csla
IOSR Journals
 
I017616468
I017616468I017616468
I017616468
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
IOSR Journals
 
G017264447
G017264447G017264447
G017264447
IOSR Journals
 
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
IOSR Journals
 
I010235966
I010235966I010235966
I010235966
IOSR Journals
 
The Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya KingdomThe Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya Kingdom
IOSR Journals
 
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
IOSR Journals
 
K010426371
K010426371K010426371
K010426371
IOSR Journals
 
B010220709
B010220709B010220709
B010220709
IOSR Journals
 
H010215561
H010215561H010215561
H010215561
IOSR Journals
 
D017332126
D017332126D017332126
D017332126
IOSR Journals
 
I012274853
I012274853I012274853
I012274853
IOSR Journals
 
J012145256
J012145256J012145256
J012145256
IOSR Journals
 
An Assessment on Food Security in Developing Economies-Problems and Policy In...
An Assessment on Food Security in Developing Economies-Problems and Policy In...An Assessment on Food Security in Developing Economies-Problems and Policy In...
An Assessment on Food Security in Developing Economies-Problems and Policy In...
IOSR Journals
 
K017247882
K017247882K017247882
K017247882
IOSR Journals
 

Viewers also liked (20)

G017224349
G017224349G017224349
G017224349
 
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
Physical Fitness Index of Indian Judo Players assessed by Harvard step test.
 
D012622129
D012622129D012622129
D012622129
 
Multiplier and Accumulator Using Csla
Multiplier and Accumulator Using CslaMultiplier and Accumulator Using Csla
Multiplier and Accumulator Using Csla
 
I017616468
I017616468I017616468
I017616468
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
 
G017264447
G017264447G017264447
G017264447
 
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
RAPD Analysis Of Rapidly Multiplied In Vitro Plantlets of Anthurium Andreanum...
 
I010235966
I010235966I010235966
I010235966
 
The Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya KingdomThe Role of Accounting in the Golden Age of Ayudhya Kingdom
The Role of Accounting in the Golden Age of Ayudhya Kingdom
 
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
Comparative Effect of Daily Administration of Allium sativum and Allium cepa ...
 
K010426371
K010426371K010426371
K010426371
 
B010220709
B010220709B010220709
B010220709
 
H010215561
H010215561H010215561
H010215561
 
D017332126
D017332126D017332126
D017332126
 
I012274853
I012274853I012274853
I012274853
 
J012145256
J012145256J012145256
J012145256
 
An Assessment on Food Security in Developing Economies-Problems and Policy In...
An Assessment on Food Security in Developing Economies-Problems and Policy In...An Assessment on Food Security in Developing Economies-Problems and Policy In...
An Assessment on Food Security in Developing Economies-Problems and Policy In...
 
K017247882
K017247882K017247882
K017247882
 

Similar to I017335457

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
IJMER
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Iris scanning
Iris scanningIris scanning
Iris scanning
Ankit Kumar
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
ijcisjournal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
Shiva Krishna Chandra Shekar
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
J1076975
J1076975J1076975
J1076975
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
Hemanth Kumar
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
Iasir Journals
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
Journal For Research
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
Deepák Soni
 

Similar to I017335457 (20)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
J1076975
J1076975J1076975
J1076975
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 

Recently uploaded (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 

I017335457

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. III (May – Jun. 2015), PP 54-57 www.iosrjournals.org DOI: 10.9790/0661-17335457 www.iosrjournals.org 54 | Page “Enhancing Iris Scanning Using Visual Cryptography” Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur Trupti kumbhare Sneha Kallapur Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic or behavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniques among all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris. For authentication, the feature template in the database and the user template should be the same. Storing the template in the database securely is not a secure approach, because it can be stolen. To deal with this security issue, in our paper a new method for securely storing the template in the database is proposed. Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scanned image is divided into different parts i.e. called as shares; these shares are stored in the database. The proposed Visual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. In our proposed system, we present a powerful approach of iris recognition. It uses an improved circular Hough transform to detect the inner boundary. Keywords: Biometric Iris,Visual Cryptography,Hough Transform I. Introduction Now a days, providing security for accessing some secure resources is becoming a crucial process. Technology has introduced a much smarter solution to us which is known as Biometrics. Biometric is a Greek Word Bio means ―Life‖ and metrics means ―Measurement‖. Biometrics deal with automated methods of identifying a person or verifying the identity of person based on physiological or behavioral (signature, gait, etc.) characteristics. Applications such as ATM ,Bank,International identity card, aviation security, Reseach Lab require identication of people. Recognition systems which use iris biometric are believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability.Iris biometric is the one which can be easily available, less expensive, accurate.It is the most powerful and secure technique when compared to other methods. Iris is a thin circular structure in the human eye. Powerful feature of the iris is used for identification purpose. Iris is a very unique feature. Identification of a person is done using following steps. Human eye is acquired and the iris preprocessing steps are carried out. preprocessing consists of segmentation, normalization and feature extraction. Iris template is got after iris preprocessing. Then iris template is stored in the database and then the user authentication is verified using the comparison between the iris template. Fig1. Iris scan method The template is stored in database, hence security of stored templates get affected, the attacker can easily get unauthorized access. The hacked templates can be misused. e.g. Bank transactions. Hence, fool- proof methodologies are essential to securely store the templates.
  • 2. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 55 | Page In this paper a system is proposed by visual cryptography technique to protect the iris template to make it secure from attack in system database as well as dual layer of authentication to the users. The proposed model is a literature survey on "Enhancing Iris Recognition” based on Visual Cryptography". II. Motivation And Related Work Security of data is very important issue because many a times security lacks in encryption and decryption that way we use a powerful technique of Visual cryptography and provide a biometric authentication. Biometric is a method of identifying the identity of person based on physiological or behavioral characteristics. Many biometric technique are available such as Facial , iris, hand, palm print, voice and signature among those iris recognition is one of the most powerful and unique. Applications such as Bank and ATM require efficient security. Biometric identification methods that identify individual person are based on physiological and behavioral characteristics. Currently, fingerprint, face and iris are the most widely used recognition systems. Recognition systems which use iris biometric are believed to be very accurate, and hence efforts are being put to improve their accuracy and reliability. Iris recognition is define in three steps they are iris segmentation, normalization, feature extraction Segmentation is done in order to detect the inner and the outer boundaries of the iris that forms a circle. It is used for finding the center and the diameter of the iris. Normalization is done for mapping the iris from polar to Cartesian coordinates. It converts the iris ring into rectangular form. It will make all the iris patters to same size. For extracting the specific features from the iris, feature extraction method is used.The motivational theme behind this proposed literature survey is to built meaningful shares which overcome the problem of security crucial. The key source of inspiration is an opportunity to know which researches has been done on visual cryptography. III. Literature Review Authentication can be implemented in different ways, such as password based authentication, device based authentication and biometric authentication .Password based authentication is one of the best ways to provide security but it can be hacked easily. Device based authentication includes the methods for providing the security by means of hardware token,software tokens ,smart card and USB tokens but these methods are very expensive. Biometric authentication provide different types for recognizing human based on their physical and behavioral characteristics.Biometrics makes use of physical characteristics such as Iris, Finger Print, , Palm Prints, Retinal, Ear, Hand Geometry, DNA, and Face where as behavioral characteristics such as Handwriting, Signature, Gait, Body Odor, and Thermal Emission of Human Body. Iris authentication is one of the most powerful and secure technique. Iris is one of the most unique features in the human body and it can be used for rmost secured identification purpose. Biometric templates should not be stored securely in plain text form different methods are needed to securely stored the templates in database. Biometric data and templates can be protected using cryptography, stenography and watermarking. In this paper, the proposed method visual cryptography is used for securely storing templates in database system. Visual cryptography concept is used for generating the meaningful shares so that quality of image will not be reduced. IV. System Architecture Visual Cryptography technique is used for protecting the iris template from attackers and to avoid an unauthorized access The proposed system consist of two modules Enrollment module and Authentication module. Enrollment module is classified into two sub modules : SNF module and VC module. An authorized person will have to pass through these phases as explained below. 3.1 Enrollment : During enrollment phase, all biometric information from an authorized person is captured. 3.1.1 SNF Module: The system administrator will collect the eye image of person for authentication purpose. This image will be passed to the SNF module which consists of three steps : Segmentation, Normalization and Feature extraction. The extracted iris image is created and stored in the database and it is named as any system generated random number. Then, png image of this number will be sent to the VC module. In Segmentation, main objective is to extract the iris template from the eye image. The Hough Transform algorithm is used in this step. In Normalization, the iris region is transformed to the fixed dimensions in order to allow comparisons. In Feature extraction, accurate recognition of individuals is obtained.The most essential information of an iris must be extracted. Only the desired features of the iris must be encoded so that templates can be compared.
  • 3. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 56 | Page 3.1.2 VC Module: Using Random number generator algorithm the extracted iris template is stored in database. This number is given as input to the VC module and then two shares are generated. out of which one share is stored in the database and the other is kept with employee. 3.2 Authntication phase: In this phase, eye image of the user will passed through the SNF process. Then this extracted image and iris template will be compared. If both the templates match then that the user is a registered employee. Fig2. Future Request System Architecture Fig3. Stages of iris recognition V. Future Scope The proposed method will work for monochrome images. The future work is to be on the colored eye image.The shared should be generated using color visual cryptography. VI. Conclusion There are various techniques adopted by researchers to secure raw biometric template but in this paper a new approach for authenticating the person by securely the iris template by generating the shares. The visual cryptography proposed in this paper will generates the meaningful shares which reduces the problem of existing method. In existing method, meaningless shares generates the poor quality compared to original image. The new method invented in this paper will be more secure and efficient .Hence iris system will be more secured and reliable in security critical applications. References [1]. PDont Blink:Iris Recognition for Biometric Identication", SANS Institute InfoSec Reading Room [2]. L.Masek, P Kovesi, "Recognition of human iris patterns for biometric identification". Tech. Rep., The School of Computer Science and Software Engineering, The University of Western Australia. [3]. Libor Masek ,"Recognition of Human Iris Patterns for Biometric Identication", The University of Western Australia, 2003. [4]. Moni Nair and Adi Shamir, "Visual cryptography" .In Proceedings of the advances in cryptology- Eurocrypt, 1- 12,1995. [5]. S. Lim K. Lee O. Byeon and T. Kim, "Ecient Iris Recognition through Improvement of Feature Vector and Classier." ETRI J., vol. 23, no. 2,pp. 61-70, 200l [6]. "Biometric Template Protection With Robust Semi Blind Watermarking Using Image Intrinsic Local Property", International Journal of Biometrics and Bio-informatics (I1BB), Volume (5) : Issue (2) : 2011 [7]. Chander Kant, Ranjender Nath & Sheetal Chaudhary,"Biometrics Security using Steganography", International Journal of Security, Volume (2) : Issue (1).
  • 4. “Enhancing Iris Scanning Using Visual Cryptography” DOI: 10.9790/0661-17335457 www.iosrjournals.org 57 | Page [8]. Zhifang Wang, Qi Han and Xiamu Niu, Christoph [9]. Busch," A Novel Template Protection Algorithm For Iris Recognition", Eighth International Conference on Intelligent Systems Design and Applications. [10]. "Iris matching using multi-dimensional artificial neural network" R.M. Faroukl R. Kumar2 K.A. Riad, The Institution of Engineering and Technology 2011, lET Com put. Vis., 2011, Vol. 5, Iss. 3, pp. 178-184 [11]. Wen-Pinn Fang "Non-expansion visual secret sharing in reversible style". I1CSNS International Journal of Computer Science and Network Security, 9(2), February 2009. ISBN: 978-