Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this paper, a new method called as BioHashing which follows the technique of cancellable biometrics in the fingerprint domain is proposed. This proposed method does not require the re-alignment of fingerprints as all the minutiae are translated into a pre-defined two dimensional space based on a reference minutia. After that, the proposed Biohashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed approach is very much resistant to minor translation error and rotation distortion. An Equal Error Rates (EER) of less than 1% is achieved in this approach and performance of the approach is also significant.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this paper, a new method called as BioHashing which follows the technique of cancellable biometrics in the fingerprint domain is proposed. This proposed method does not require the re-alignment of fingerprints as all the minutiae are translated into a pre-defined two dimensional space based on a reference minutia. After that, the proposed Biohashing method is used to enforce the one-way property (non-invertibility) of the biometric template. The proposed approach is very much resistant to minor translation error and rotation distortion. An Equal Error Rates (EER) of less than 1% is achieved in this approach and performance of the approach is also significant.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Biometrics Security using SteganographyCSCJournals
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the security afforded by the system or to put off the normal functioning of the system. Various risks have been discovered while using biometric system. Proper use of cryptography greatly reduces the risks in biometric systems as the hackers have to find both secret key and template. It is notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to make system more secure by use of steganography. Here the secret key (which is in the form of pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the authentic user will be allowed to decode.
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
Behavioural
biometrics is a scien
tific study with the primary purpose of identifying the authenticity of a
user based on the way they interact with an authentication mechanism. While Association based password
authentication is a cognitive model of authentication system.
The work done shows the implementation of Keyboard Latency technique for Authentication,
implementation of Association Based Password authentication and comparison among two. There are
several forms of behavioural biometrics such as voice analysis, signat
ure verification, and keystroke
dynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method not
only for user verification, but also for identification as well. The work presented in this model borrows
ideas from th
e bioinformatics literature such as position specific scoring matrices (motifs) and multiple
sequence alignments to provide a novel approach to user verification and identification within the context
of a keystroke dynamics based user authentication system
. Similarly Cognitive approach can be defined in
many ways of which one is association based Technique for authentication
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A national crisis the state of computer science and information technology in...NAFCareerAcads
This session will explore the trends in the workforce for computing specialists as defined
by the U.S. Department of Labor and look at the pipeline to fill the nearly one and a half
million positions that will become available over the next six to eight years. Participants
will learn the approaches and resources available to deal with this problem.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION WITH FINGERPRINT-BASED BI...IJCNCJournal
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Biometrics Security using SteganographyCSCJournals
A biometric system is at risk to a variety of attacks. These attacks are intended to either avoid the security afforded by the system or to put off the normal functioning of the system. Various risks have been discovered while using biometric system. Proper use of cryptography greatly reduces the risks in biometric systems as the hackers have to find both secret key and template. It is notified that still fraudrant goes on to some extent. Here in this paper a new idea is presented to make system more secure by use of steganography. Here the secret key (which is in the form of pixel intensities) will be merged in the picture itself while encoding, and at decoding end only the authentic user will be allowed to decode.
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
Behavioural
biometrics is a scien
tific study with the primary purpose of identifying the authenticity of a
user based on the way they interact with an authentication mechanism. While Association based password
authentication is a cognitive model of authentication system.
The work done shows the implementation of Keyboard Latency technique for Authentication,
implementation of Association Based Password authentication and comparison among two. There are
several forms of behavioural biometrics such as voice analysis, signat
ure verification, and keystroke
dynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method not
only for user verification, but also for identification as well. The work presented in this model borrows
ideas from th
e bioinformatics literature such as position specific scoring matrices (motifs) and multiple
sequence alignments to provide a novel approach to user verification and identification within the context
of a keystroke dynamics based user authentication system
. Similarly Cognitive approach can be defined in
many ways of which one is association based Technique for authentication
In the age of Biometric Security taking over the traditional security features, this is a small intro to the Biometric features one can use to enhance the security. The various modalities have been explained.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A national crisis the state of computer science and information technology in...NAFCareerAcads
This session will explore the trends in the workforce for computing specialists as defined
by the U.S. Department of Labor and look at the pipeline to fill the nearly one and a half
million positions that will become available over the next six to eight years. Participants
will learn the approaches and resources available to deal with this problem.
JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5Gijmnct
The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated inthe recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G.
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMijfcstjournal
In this paper, a semi-blind watermarking technique of embedding the color watermark using curvelet
coefficient in RGB cover image has been proposed. The technique used the concept of HVS that the human
eyes are not much sensitive to blue color. So the blue color plane of the cover image is used as embedding
domain. A bit planes method is also used, the most significant bit (MSB) plane of watermark image is used
as embedding information. Selected scale and orientation of the curvelet coefficients of the blue channel in
the cover image has been used for embedding the watermark information. All other 0-7 bit planes are used
as a key at the time of extraction. The results of the watermarking scheme have been analyzed by different
quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index
Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of
watermark, quality of extracted watermark and robustness against different attacks.
AN ALPHA -CUT OPERATION IN A TRANSPORTATION PROBLEM USING SYMMETRIC HEXAGONAL...ijfls
In this paper we introduce a new operation on alpha cut for a symmetric hexagonal fuzzy numbers. We
considered a transportation problem where the fuzzy demand and supply are in symmetric hexagonal fuzzy
numbers and the minimum optimal cost is arrived .Transportation problems have various purposes in
logistics and supply process for reducing the transportation cost’s The advantages of the proposed alpha
cut operations over existing methods is simpler and computationally more efficient in day to day
applications.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
International Journal of Fuzzy Logic Systems (IJFLS) ijfls
International Journal of Fuzzy Logic Systems (IJFLS) is an open access peer-reviewed journal that covers all topics in theoretical, experimental and applied fuzzy techniques and systems. It is aimed to bring together researchers and developers from both academia and industry to discuss the latest scientific and theoretical advances in this field, and to demonstrate the state-of-the-art systems. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Best Engineering Colleges of Computer science – GNIOTGniot group
The Department of computer science has well equipped laboratories with facilities such as servers, workstations, thin clients, mobile terminals, desktops, high speed internet and networking devices.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Delivered at the Network & Services Management Conference in Bonn, Germany on December 6th 2016. It comprises Deutsche Telekom's strategy and vision as it relates to real time network & services management and aggressive automation through AI and applied machine learning. It is fairly high-level but does include reference for further study and read-up, particular towards IETF and RTC publications.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt to build robust cryptographic keys, because, human users detect difficulties to call up long cryptographic keys. Biometric recognition provides an authentic solution to the authentication of the user problem in the identity administration systems. With the extensive utilization of biometric methods in different applications, there is growing concern about the confidentiality and security of the biometric technologies. This paper proposes biometric based key recreation scheme. Since human ears are not correlated. Until now, the encryption keys are generated using a swarm intelligence approach. Collective intelligence of simple groups of autonomous agents have been emerged by swarm intelligence. The crow search algorithm which is known as (CSA) is a new meta-intuitive method assembled by the intelligent group behavior of crows. Despite that CSA demonstrates important features, its search approach poses excessive challenges while faced with great multimodal formularization.
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo
Mobile Authentication with biometric (fingerprint or face) in #AndroidAppDeve...Harikrishna Patel
Biometric identification and authentication depends on unique biological attributes, such as a fingerprint, an iris, a face or even a heartbeat. These attributes are much more difficult for hackers and criminals to exploit because they’re unique to each individual.
Today’s biometric identification and authentication systems cover checks to verify that the biometric elements aren’t coming from video or audio recordings as well. #androidappdevelopment #iotplatform #Softqube
https://www.softqubes.com/blog/mobile-authentication-with-biometric-fingerprint-or-face-in-android/
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention since its introduction in 1992. In this study, authentication system contained two parts: registration part and matching part. In both parts, iris image is used for personal identification. Localization of inner boundary only, extracted a region from the iris (without eyelashes problem), a feature vector is deduced from the texture of the image. The feature vector is used for classification of the iris texture, then it's treated by the hash function to produce the hash value (authentic value of a person). In matching part, produced hash value searched in the authorized person's database for taking a decision (success or fail) of the authentication. The method was evaluated on iris images takes from the CASIA iris image database version 1.0 [15]. The experimental results show that the vector extracted by the proposed method has very discriminating values that led to a recognition rate of over 100% on iris database. Also, authentication system is very accurate because it's used a secure method of authentication that iris-biometric and a hash function for avoiding stealing data from database.
Biometric System and Recognition Authentication and Security Issuesijtsrd
In recent days Biometric has become the most popular technique used. The purpose of biometric systems is used to achieve high security, authentication and many more. Through this scheme or technique it ensures that the services are accessed only by the authorized persons. This system works effectively and is user friendly. Biometric systems are progressively exchanging the ongoing password and authentication token based system. Authentication and Security recognition are the two most essential characteristic to consider in scheming a biometric system. In this paper, a broad review is presented to illuminate on the latest technologies in the study of fingerprint based biometric covering these two characteristic with a view to improving system security and authentication recognition. Shweta Naik ""Biometric System and Recognition: Authentication and Security Issues"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30195.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-security/30195/biometric-system-and-recognition-authentication-and-security-issues/shweta-naik
Secure Brokerless System for Publisher/Subscriber Relationship in Distributed...IJERA Editor
Public subscribe systems are more attracted academic and industrial interest in last few years, including certain
experiences of development and deployment. The primary requirements of security mechanisms such as
authentication and confidentiality in content based publish subscribe system. This system consists of various
types of brokers or agents where these brokers are organize their roles. These brokers are information or events
are published by publishers and this information is received by subscribers and it depends on their subscription.
Publisher and subscriber system is loosely coupled and asynchronous communication and this system is based on
distributed system. Broker play vital role in business development and obtain by question mark over the
trustworthiness of broker. The used of security coupled system for Brokerless is huge demand. In addition to our
previous work [1], this paper contributes 1) Owner key generation 2) Time based key generation 3)Two tier key
generation i.e. merging of owner key and time based key 4) Securely encryption techniques using reverse circle
cipher encryption 5) Key management 6 ) Event distribution
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
A biometric security is a technique by means of which digital contents are protected by a cryptographic key generated from the biometric features of a person like Retina, Iris, Fingerprint, Face, Voice and so on. Normally the digital contents like documents are protected by a cryptographic key generated from a unique password. The process in irreversible, i.e the key can be generated from the password but not the vice versa. Passwords are relatively easy to hack as most of the users keep their personal information like date of birth as password and also password length has a limit as human beings cannot remember a password of significantly large length. Hence guessing the password of a user, whose significant information is available, is easier. Therefore off late lot of emphasis has been given to biometric features. Biometric features of no two people are same. For example the finger prints or the face of any two people differ. Hence if a template (alphanumeric or binary representation of features from a biometric data) is selected for the key generation than cracking them for accessing information becomes significantly difficult. But as with every advantage comes certain limitations also. The keys are not time invariant. Templates tends to change based on the data acquisition, or with time. For example the finger prints or palm prints changes with ages. Iris, retina and face features changes with change in light intensity during the acquisition phase. Fingerprint features changes with change in the orientation of the finger while scanning. In a classic authentication problem, such variability’s can be easily dealt with by keeping a threshold for the acceptance of the features. Such acceptance threshold is not applicable for the case of biometric templates. Even slightest of the variability in the templates changes the generated key, therefore causing a high false rejection rate. Hence in this work we analyze the most accepted biometric features and techniques for key generation and propose the most invariable technique in terms of data acquisition invariability. The work analyzes Iris, Face, Fingerprint and Palm prints for analysis of the biometric template generation and key generation form the templates. Further a unique benchmark analysis technique is proposed for quantifying the quality of a biometric model or features.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERPRINT ID
1. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
DOI:10.5121/ijcis.2016.6404 39
MULTIMODAL BIOMETRIC AUTHENTICATION:
SECURED ENCRYPTION OF IRIS USING
FINGERPRINT ID
Sheena S1
and Sheena Mathew2
1,2
Department of Computer Science & Engineering, School of Engineering, Cochin
University of Science & Technology, Kochi, India
ABSTRACT
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral
biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The
proposed work explains about the biometric encryption technology which will securely generate a digital
key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is
given to the user. During the authentication time user input the template and the fingerprint. This template
is then decrypted and verified with the original template taken from the database to check whether the user
is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
KEYWORDS
Multi-modal Biometrics, Minutiae, Fingerprint, Iris, Feature Extraction, Encryption, Blowfish, Hamming
Distance, FAR, FRR, EER
1. INTRODUCTION
In modern era protecting our data in a unique manner is an inevitable requirement. Biometric
Technology has proven that it has an important role in the field of Security, access control and
monitoring the various applications because of its non-reputable authentication method. Reliable
user authentication technique has highly demanded due to the progress in networking and
communication. Biometric authentication based on physiological modalities like thefingerprint,
iris etc. is found to be more secure and reliable than the traditional way of authentication by
means of password [1]. The biometric authentication process is done by validating the unique
feature of an individual by using any of the physiological or behavioral features. During this
process, user's identity is compared with the template already stored, and the permission is
granted only to a genuine user that has an adequate match. Basically, biometric-based
authentication system operates in two modes viz. Enrollment and Authentication. The user's
biometric data is acquired using a biometric reader and then it is stored in the database with a user
identity for further verification. The user's biometric data is acquired once again to verify the
claimed identity of the user. Biometric authentication system which uses physical characteristics
to verify the identity of a person, which ensures much higher security compared to password or
PIN number, because Biometric feature cannot be forgotten and also difficult to forge easily.
2. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
40
However each biometric technology has its own strength and limitations and no single biometric
is expected to effectively satisfy the requirements of all verification or authentication applications
[2].
A single biometric sometimes fails to be accurate enough for the identification of a large user
population. Another disadvantage of using only one biometric is that the physical characteristics
of a person for the selected biometric might not be always available or readable. Biometrics
systems based on one biometric (uni-modal) are often not able to meet the desired performance
requirements and have to contend with a variety of problems such as noisy data, intra-class
variations, a restricted degree of freedom, non-universality, spoof attacks and unacceptable error
rates. These practical problems can be overcome by the use of multimodal biometrics system in
which two or more biometric features like finger, face, iris, or Gait can be used to improve the
recognition accuracy. One of the specific reasons for using multi-modal biometrics is the security
requirements of some specific applications [3].
Biometric encryption is one of the emerging research areas, which is a method of combining
biometric features with cryptographic keys. Consecutively will provide the advantage of both
fields and is named as biometric encryption. Such systems map biometric data into a unique
stream of a binary string, which in turn can be mapped to an encryption key or direct hashing [4].
This approach eliminates the need of storing the biometric template. The cryptographic key
generated from biometrics will enhance the security; hence it can be relinquished with the key
storage using passwords or PIN numbers.
There is a relatively high chance of intrusion at any step so that one must provide an additional
security management [5]. Encrypting one biometric modality (Iris in the proposed work) with
another biometric modality (fingerprint is the second biometric modality) is found to be the most
effective methods to enhance the security of the system. The security of the system is based on
the associated secret key [6].
2. RELATED WORKS
From the literature extensive researches have been reported for generating cryptographic keys
from biometric modalities and multimodal biometrics based user authentication. Brief reviews of
such recent research work are conferred here.
According to Selvarani et. al.[5] the data from the cloud is accessed by the secret key which is
wrapped by the two different biometric modalities viz. Fingerprint and the Iris for decryption.
Only after decryption the user gets the original message. Thus the user secures their data from
unauthorized access. Jagdeesan et.al.[1] proposed a method to generate a 256-bit secure
cryptographic key from the multi-biometrics template. For that the two biometric modalities like
fingerprint and the Iris is used. Vincenzo Conti et al.[17] put forward a feature level fusion of
Iris and fingerprint and resulted with a homogeneous biometric vector. In his work matching is
done using Hamming Distance matching algorithm. The template level fusion algorithm working
on a unified biometric descriptor was suggested in his work. Feng Hao et. al. [4] developed a
recurring binary string, called as biometric key, generated from an Iris image by using auxiliary
error correction data. This will help to conceal the biometric key and can be stored as a token
like a smart card. The Iris biometric and the token are required to reproduce the key. Sanaul
Hoque et al.[18] proposed an approach which generates the biometric key from the live
3. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
biometrics. In order to generate the key, they divided feature space int
cells and these cell subspaces contribute to the generation of the key. Muhammad Khurram
Khana et. al.[19] suggested a novel multi
limited tokens using face and fingerprint modalities
found to be a promising solution, at the same time biometric encryption system must be
acceptable only when it can consider a
modalities during the time of gene
3. SECURED MULTIMODAL
A secure authentication system using multimodal biometric system is an emerging research area.
Studies reveal that this system is highly efficient and con
Password) and token-based (e.g. Key) techniques.
security-enhancement methodology by using both biometrics and encryption technology to secure
data access. In this work multi-biometric encryption, a methodology is proposed with the help of
two biometric modalities like Fingerprint and Iris. The figure1 shows the enrollment phase of the
proposed system. Here the Iris is encrypted using Fingerprint ID as a key. The sensor wil
the two inputs: Fingerprint and the Iris for each user. At first stage enrollment of a user is being
done. This process will be completed by extracting the fingerprint features through the
fingerprint reader R303. Correspondingly the Iris textur
different steps viz. segmentation, Iris Edge detection, Iris localization. After the feature
extraction the encryption is carried out by using Blowfish algorithm. Blowfish is an encryption
algorithm that can be used as a replacement for the DES or IDEA algorithms. It is a symmetric
block cipher that uses a variable-
In the second stage authentication of a user is performed. In this stage decrypting the biometric
template and matching is done using the Hamming distance.
A. Enrollment: Fingerprint Feature Extraction, Iris Feature Extraction, Encryption
B. Authentication: Decryption, Matching
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
biometrics. In order to generate the key, they divided feature space into subspaces and then to
cells and these cell subspaces contribute to the generation of the key. Muhammad Khurram
suggested a novel multi-modal biometrics authentication system on space
limited tokens using face and fingerprint modalities. Combining biometrics and cryptography is
promising solution, at the same time biometric encryption system must be
acceptable only when it can consider a minute change in the selection of similar biometric
modalities during the time of generating decisive keys.
ULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM
authentication system using multimodal biometric system is an emerging research area.
Studies reveal that this system is highly efficient and consistent than knowledge
based (e.g. Key) techniques. The proposed work focussed on describing the
enhancement methodology by using both biometrics and encryption technology to secure
biometric encryption, a methodology is proposed with the help of
two biometric modalities like Fingerprint and Iris. The figure1 shows the enrollment phase of the
proposed system. Here the Iris is encrypted using Fingerprint ID as a key. The sensor wil
the two inputs: Fingerprint and the Iris for each user. At first stage enrollment of a user is being
done. This process will be completed by extracting the fingerprint features through the
fingerprint reader R303. Correspondingly the Iris texture features are also extracted through
different steps viz. segmentation, Iris Edge detection, Iris localization. After the feature
extraction the encryption is carried out by using Blowfish algorithm. Blowfish is an encryption
as a replacement for the DES or IDEA algorithms. It is a symmetric
-length key, from 32 bits to 448 bits of binary strings.
In the second stage authentication of a user is performed. In this stage decrypting the biometric
template and matching is done using the Hamming distance.
Enrollment: Fingerprint Feature Extraction, Iris Feature Extraction, Encryption
Authentication: Decryption, Matching
Figure 1: Enrollment
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
41
o subspaces and then to
cells and these cell subspaces contribute to the generation of the key. Muhammad Khurram
modal biometrics authentication system on space-
Combining biometrics and cryptography is
promising solution, at the same time biometric encryption system must be
similar biometric
YSTEM
authentication system using multimodal biometric system is an emerging research area.
knowledge-based (e.g.
The proposed work focussed on describing the
enhancement methodology by using both biometrics and encryption technology to secure
biometric encryption, a methodology is proposed with the help of
two biometric modalities like Fingerprint and Iris. The figure1 shows the enrollment phase of the
proposed system. Here the Iris is encrypted using Fingerprint ID as a key. The sensor will accept
the two inputs: Fingerprint and the Iris for each user. At first stage enrollment of a user is being
done. This process will be completed by extracting the fingerprint features through the
e features are also extracted through
different steps viz. segmentation, Iris Edge detection, Iris localization. After the feature
extraction the encryption is carried out by using Blowfish algorithm. Blowfish is an encryption
as a replacement for the DES or IDEA algorithms. It is a symmetric
length key, from 32 bits to 448 bits of binary strings.
In the second stage authentication of a user is performed. In this stage decrypting the biometric
Enrollment: Fingerprint Feature Extraction, Iris Feature Extraction, Encryption
4. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
2.1. FINGERPRINT FEATURE E
Feature extraction of the Fingerprint is being done using the minutiae point extraction methods.
This method will identify the local ridge discontinuities, which are of two types: ridge endings
and bifurcations. A good quality image has around 40 to 100 minutiae [7]. It is these minutiae
points which are used for determining the uniqueness of a Fingerprint. Fingerprint consist of
ridges in a different orientation, in this method ridges orientation at
image is identified in x and y directions. By using fingerprint reader R303 the minutiae points are
extracted and obtain a fingerprint ID from the fingerprint reader and this is converted into a hash
using MD5 algorithm and 32 b
symmetric block cipher algorithm encrypts block data of 32
2.2. IRIS FEATURE EXTRACTION
Iris biometric features are one of the most secure because the iris texture is formed
development and it is highly stable with age and health condition [8,9]. The uniqueness of iris
texture is highly promising and hence it is chosen as one of the biometric modality for the user
authentication. In this work CASIA, Iris v3 data
through the steps like Edge-detection using Sobel filters, Contrasting, Iris localization using
Hough Transform as shown in figure 3a, Normalization by the concept of Daugman's Rubber
Sheet model [10] as shown in figure 3b, and then extracting the Iris feature using Gabor filter,
which is the linear filter that gives the normalized image, from this normalized image each row of
pixel is taken as the input signal. Thus gets the iris code.
a
Figure3: a, b: Iris Localisation, Iris Normalisation
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
Figure 2: Authentication
EXTRACTION
Feature extraction of the Fingerprint is being done using the minutiae point extraction methods.
This method will identify the local ridge discontinuities, which are of two types: ridge endings
urcations. A good quality image has around 40 to 100 minutiae [7]. It is these minutiae
points which are used for determining the uniqueness of a Fingerprint. Fingerprint consist of
ridges in a different orientation, in this method ridges orientation at each pixel location in the
image is identified in x and y directions. By using fingerprint reader R303 the minutiae points are
extracted and obtain a fingerprint ID from the fingerprint reader and this is converted into a hash
using MD5 algorithm and 32 bit hash is treated as the key for encrypting the Iris. Blow
symmetric block cipher algorithm encrypts block data of 32-bits at a time.
XTRACTION
Iris biometric features are one of the most secure because the iris texture is formed
development and it is highly stable with age and health condition [8,9]. The uniqueness of iris
texture is highly promising and hence it is chosen as one of the biometric modality for the user
authentication. In this work CASIA, Iris v3 database is used. Iris feature extractions done
detection using Sobel filters, Contrasting, Iris localization using
Hough Transform as shown in figure 3a, Normalization by the concept of Daugman's Rubber
figure 3b, and then extracting the Iris feature using Gabor filter,
which is the linear filter that gives the normalized image, from this normalized image each row of
pixel is taken as the input signal. Thus gets the iris code.
b
Figure3: a, b: Iris Localisation, Iris Normalisation
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
42
Feature extraction of the Fingerprint is being done using the minutiae point extraction methods.
This method will identify the local ridge discontinuities, which are of two types: ridge endings
urcations. A good quality image has around 40 to 100 minutiae [7]. It is these minutiae
points which are used for determining the uniqueness of a Fingerprint. Fingerprint consist of
each pixel location in the
image is identified in x and y directions. By using fingerprint reader R303 the minutiae points are
extracted and obtain a fingerprint ID from the fingerprint reader and this is converted into a hash
it hash is treated as the key for encrypting the Iris. Blowfish
Iris biometric features are one of the most secure because the iris texture is formed in the fetal
development and it is highly stable with age and health condition [8,9]. The uniqueness of iris
texture is highly promising and hence it is chosen as one of the biometric modality for the user
base is used. Iris feature extractions done
detection using Sobel filters, Contrasting, Iris localization using
Hough Transform as shown in figure 3a, Normalization by the concept of Daugman's Rubber
figure 3b, and then extracting the Iris feature using Gabor filter,
which is the linear filter that gives the normalized image, from this normalized image each row of
5. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
43
2.3. ENCRYPTION
Here the biometric sources are fingerprint and iris image. The extracted biometric feature of the
fingerprint is used as the fingerprint ID which is used to encrypt the extracted Iris biometric
feature [11, 12]. The encrypted multimodal template is generated using the encryption of Iris
image and Fingerprint ID using Blowfish algorithm and this template is given to the user for
further authentication. Blowfish is an encryption algorithm that can be used as a replacement for
the DES or IDEA algorithms. It is a symmetric (that is, a secret or private key) block cipher that
uses a variable-length key, from 32 bits to 448 bits, making it useful for both domestic and
exportable use. The Encryption key generated using the Blowfish algorithm that provides fast
and secure communication. A hash function with MD5 algorithm and the 32 bit hash is taken
randomly. And the iris stored in the database is retrieved and is encrypted using this 32-bit
Fingerprint ID [13]. The encryption is done using Blowfish algorithm as mentioned earlier..
2.4. DECRYPTION
The decryption is the reverse process of encryption as represented in figure 4. The decryption can
be performed with the appropriate digital key only if the same biometric sample is presented
during authentication time [14]. In the proposed work the blowfish algorithm is used for
decryption. This is done by inputting the template generated during the encryption and the
fingerprint. During the decryption process an iris image is taken from the database. Similarly the
template corresponding to the given fingerprint is taken from the database and it is also
decrypted. For decryption again the same Blowfish algorithm is applied by supplying the Pi sub-
keys in reverse order [15]
Figure 4: Image Decryption
2.5. MATCHING
The iris decrypted from the template inputted by the user and the one which is decrypted from the
database using fingerprint ID as the key will be compared. The Hamming distance method is used
in matching. The Hamming distance gives a measure of how many bits are the same between two
bit patterns. Using the Hamming distance of two bit patterns, a decision can be made as to
whether the two patterns were generated from different irises or from the same one. If the
compared irises are same, then the user is granted access else it is denied. The table1 shows the
evaluation based on different observations on various inputs. Based on this observation FRR
(False Rejection Rate) and FAR (False Acceptance Rate) on different values of Hamming
distance was plotted as shown in the figure 5a. From this figure EER(Equal Error Rate) is found
as 6. Figure 5b is plotted based on the Hamming distance 6.
6. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
Table 1.Evaluation based on various inputs observations
Sl. No. Input Image
1 a20
2 a1b
3 a1c
4 a1
5 a1b
6 a2crop
7 a7
8 a7a
9 a13
10 a13
11 a3
12 a49
13 a49a
14 a13a
15 a3crop
16 a2c
17 a2d
18 a7d
19 a20c
20 a13c
Figure 5a. FAR & FRR on different values of hamming distances
Figure 5b. FAR & FRR at Hamming Distance of 6
3. CONCLUSION
In this paper Security of data storage using multimodal biometrics is proposed
biometric encryption. Multimodal Biometric authentication is done using Iris and Fingerprint
aims to achieve data storage security. For that biometric features like Fingerprint and Iris of the
user is collected and extracted. A template
using a blowfish algorithm. Then the template is stored in the database. When the user logins in
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
Table 1.Evaluation based on various inputs observations
Input Image Detected Image Hamming
Distance
a20a 3.46
a1a 0.797
a1c 1.917
a1c 1.917
a2 8.651
a1b 1.04
a7a 2.16
a7c 0.136
a7a 7.4
a13a 4.9
a3crop 2.3
a49crop 6.02
a7a 4.9
a13d 3.2
a3b 3.4
a2c 0.03
a2 5.034
a7 4.02
a20 2.9
a7d 5.02
Figure 5a. FAR & FRR on different values of hamming distances
Figure 5b. FAR & FRR at Hamming Distance of 6
In this paper Security of data storage using multimodal biometrics is proposed with the help of
biometric encryption. Multimodal Biometric authentication is done using Iris and Fingerprint
aims to achieve data storage security. For that biometric features like Fingerprint and Iris of the
user is collected and extracted. A template is created using this features by encrypting the iris
using a blowfish algorithm. Then the template is stored in the database. When the user logins in
International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
44
with the help of
biometric encryption. Multimodal Biometric authentication is done using Iris and Fingerprint
aims to achieve data storage security. For that biometric features like Fingerprint and Iris of the
using this features by encrypting the iris
using a blowfish algorithm. Then the template is stored in the database. When the user logins in
7. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
45
order to use the cloud storage system, the system authenticates the user by using the template
provided and the fingerprint, which is used here as the key for decryption. Without the use of
fusion the proposed work reduces the complexity of the algorithm and this method increases the
overall security of the system with less computational time.
REFERENCES
[1] A. Jagadeesan et.al.”Cryptographic Key Generation from Multiple Biometric Modalities: fusing
Minutiae with Iris features”, International Journal of Computer Applications (0975-8887) volume: 2
No.6, 2010.
[2] P.Balakumar et. al, “A Survey on Biometrics based Cryptographic Key Generation Schemes”,
IRACST - International Journal of Computer Science and Information Technology & Security
(IJCSITS), ISSN: 2249-9555, Volume: 2, No. 1, 2012
[3] Vinayak Ashok Bharadi et.al., “Multimodal Biometric Recognition using Iris & Fingerprint By
Texture Feature Extraction using Hybrid Wavelets”, Conference Paper, September 2014.
[4] Feng Hao et.al., “Combining cryptography with biometrics effectively”, Technical Report, Computer
Laboratory, Cambridge University, UKICAM-CL-TR-640, ISSN 1476-2986.
[5] Selvarani et.al., “Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher
Security”, Research Journal of Applied Sciences, Engineering and Technology 11(1): 95-101, 2015
[6] Abhishek Nagar, Karthik Nandakumar, Anil K. Jain, and Dekun Hu,"Multibiometric Cryptosystems
Based on Feature-Level Fusion, IEEE Transactions on Information forensics and security", volume 7,
no. 1, pp. 255268, February 2012
[7] DrPS SV Ravi Kumar ,"Novel Cryptographic Algorithm based Fusion of Multimodal Biometrics
Authentication system",Journal of Research in Science, Technology, Engineering and Management
(JoRSTEM) Volume:1 and Issue -1, September 2015
[8] Sowkarthika.S et.al., “ Securing Iris Templates using Double Encryption Method”, IJARCSSE.
Volume: 2, Issue 11, November 2012, ISSN: 2277 128X
[9] A. Jagadeesan et.al, “Secured Cryptographic Key Generation From Multimodal Biometrics: Feature
Level Fusion of Fingerprint and Iris”, (IJCSIS) International Journal od Computer Science and
Information Security, Volume: 7, N0.2, February 2010.
[10] M.Natarajan et.al.” Multimodal Crypto-Biometric System Based On Session Key Navigation for
Secure Transaction, 2014 International Conference on Secure Transaction, 2014 International
Conference on Innovations Conference on Innovations in Engineering Technology (ICIET' 14)
[11] Saad Abuguba, Milan M. Milosavljevi and Nemanja Maek, "An Efficient Approach to Generating
Cryptographic Keys from Face and Iris Biometrics Fused at the Feature Level", in IJCSNS
International Journal of Computer Science and Network 6 Security, Volume.15 No.6, June 2015
[12] Muthukumar Arunachalam and Kannan Subramanian," AES Based Multimodal Biometric
Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print" in The
International Arab Journal of Information Technology September 2015
[13] M. Devi, "Secure Crypto Multimodal Biometric System for the Privacy Protection of User
Identification", in International Journal of Innovative Research in Computer and Communication
Engineering, March 2014
[14] Ann Cavoukian et.al., “ Biometric Encryption Chapter from the Encyclopedia of Biometrics”, Office
of the Information and Privacy Commissioner, Toronto, Ontario, Canada
[15] Algimantas Venckausakas et. al. “Cryptographic Key Generation from Finger Vein”, Conference
of Informatics and Management Sciences, March 25-29, 2013.
8. International Journal on Cryptography and Information Security (IJCIS), Vol. 6, No. 3/4, December 2016
46
[16] Bo Fu, Simon X. Yang, Jianping Li, and Dekun Hu, "Multibiometric Cryptosystem: Model Structure
and Performance Analysis", IEEE Transactions on information forensics and security, volume: 4, no.
4, pp.867882, December 2009
[17] Conti, Vincenzo, et al. "A frequency-based approach for features fusion in fingerprint and iris
multimodal biometric identification systems." IEEE TRANSACTIONS ON SYSTEMS, MAN, AND
CYBERNETICS PART C, Applications and reviews" 40.4 (2010)
[18] Sanaul Hoque , Michael Fairhurst and Gareth Howells, "Evaluating Biometric Encryption Key
Generation Using Handwritten Signatures", in Proceedings of the 2008 Bio-inspired, Learning and
Intelligent Systems for Security, pp.17-22, 2008.
[19] Muhammad Khurram Khana and Jiashu Zhanga, "Multimodal face and fingerprint biometrics
authentication on space-limited tokens ", Neurocomputing, volume:71, no. 13-15, pp.3026-3031,
August 2008.