SlideShare a Scribd company logo
Acharya Institute of TechnologyDepartment of ISEDepartment of ISE
Under the Guidance of
Prof. Yogesh N
By
Rahul K N
Acharya Institute of TechnologyDepartment of ISE
Contents
Acharya Institute of TechnologyDepartment of ISE
Introduction
Mobile cloud computing =
mobile computing + cloud computing
It presents new issues of security threats
such as unauthorized access to resources
exist in mobile cloud.
Here we’re using fingerprint recognition
system to secure mobile cloud.
Acharya Institute of TechnologyDepartment of ISE
Difference between Existing
System and Proposed System
Basis Existing System
(Password)
Proposed system
(Fingerprint)
Security Less secure ,as the passwords
can be reused ,phished or key
logged.
More secure, as Fingerprints are
unique and complex enough to
provide a robust template for
authentication.
Identification
Accuracy
Cannot be identified accurately
whether the one who is
accessing the resources is
authorized or not.
Authorized user is identified by his
fingerprint hence there is no
chance of unauthorized user to
get access to the resources in
cloud.
Protection
from the
attacks
Less protected ,as injection
attacks on the database is
possible .
More protected, as injection
attacks on the database is
impossible.
Others Remembering the passwords is
difficult .
Remembering anything is not
required as ultimately all the
system requires is the image of
your Fingertip.
Acharya Institute of TechnologyDepartment of ISE
Proposed system
Pre-processing -> convert to gray-scale ,edge
enhancement, filtering, binarization, thinning, map
direction, minutiae extraction
Core point detection
Input Finger image
Feature extraction
The User is Accepted
Matchig?
Data-
base
enrollment
yes
no
Acharya Institute of TechnologyDepartment of ISE
EXPERIMENTAL RESULTS AND DISCUSSION
The tests are separated into two parts:
1) Functionality 2)Performance
1. Evaluating Functionality
. Figure 2 summarizes the output from various functions, including (a) the original image, (b)
convert to gray-scale, (c) edge enhancement, (d)filtering, (e) binarization, (f) thinning, (g)
map direction, and (h) minutiae extraction
Figure 2: Functions - Output for Galaxy Note
Acharya Institute of TechnologyDepartment of ISE
Algorithms Used for
Matching
Relative Distance Matching
Image Mapping
Each algorithm having a different
threshold score for matching.
Acharya Institute of TechnologyDepartment of ISE
Simple Algorithm
• The similarity score (S) is the result of the comparison between the
extracted features and features stored in a database.
If (S is low value) then
Little similarity
If (S is high value) then
High similarity
•After that, the decision will be based on the similarity score (S), which is
compared to a predefined threshold (T).
If (S > T) then
The user is accepted
Else if (S < T)
The user is rejected
Acharya Institute of TechnologyDepartment of ISE
2. Evaluating Performance
In this section, the process time is calculated for
each function to test if the performance rate is
acceptable according to the rates established by
the National Institute of Standards and
Technology (NIST). Figures 3,4 and 5 show the
process time from testing the fingerprint images for
the Sony Xperia S , Samsung Galaxy S3 and
BlackBerry Z resp.
Acharya Institute of TechnologyDepartment of ISE
Figure 3 shows the experiment results of the fingerprint image taken with the Sony Xperia S
device, which recorded 0.9 seconds as the maximum time and 0.4 seconds as the average
Acharya Institute of TechnologyDepartment of ISE
Figure 4 illustrates the process time for an image taken with a Samsung Galaxy S3 device the
maximum time is 2.4 seconds and the average is 0.5 seconds.
Acharya Institute of TechnologyDepartment of ISE
Another example is the BlackBerry Z in Figure 5, with approximately 4 seconds as a maximum
time and 0.8 seconds as the average recorded time.
Acharya Institute of TechnologyDepartment of ISE
Discussion
From the experiment results, it is evident that,
 The range for the total processing time to pre-process a fingerprint image takes between 1
and 12 seconds.
Table 1 summarizes the range of process times for each function in the pre-processing class.
An acceptable enrolment time should be equal to or less than two minutes, which means that
the enrolment process must be completed in 120 seconds. When the total process time is
subtracted from the acceptable enrolment time, there are 108 seconds remaining for enrolment.
Acharya Institute of TechnologyDepartment of ISE
Figure 6 shows the process time of enrolment for six different mobile devices, and nearly all
are very similar.
Acharya Institute of TechnologyDepartment of ISE
Figure 7 illustrates that 0.2 seconds is the minimum time, 19 seconds is the maximum, and 0.4
seconds is the average. This means that the proposed approach achieved 19 seconds, with 108
seconds being the maximum acceptable time.
Acharya Institute of TechnologyDepartment of ISE
The Matching Process time is shown in Figure 8 for three mobile devices. The average
time is 0.4 seconds, which is an accepted rate.
Acharya Institute of TechnologyDepartment of ISE
Features
 The proposed solution is not only to secure
unauthorized access, but also to protect databases
from injection attacks due to the absence of string
input from users. The fingerprint image is the only
input from the user in accordance with the interface
design. No other input is permitted from the user to
enter the system.
 The interface in this solution is based on HTML5,
which is a cross-platform and has been tested on
different mobile platforms.
Acharya Institute of TechnologyDepartment of ISE
Applications
 User doesn’t have to remember the password as the
password would be user’s fingerprint.
As the fingertip’s image is captured by mobile phone’s
camera it is way cheaper than that of getting the fingerprint
by using fingerprint scanner.
It provides more security as compare to the traditional
approaches of authentication.
 With the addition of some filters to segment the method in
this solution, it will be able to work with web cameras.
Acharya Institute of TechnologyDepartment of ISE
Drawbacks
Due to the complicated background, hand and
camera shaking during taking photos, the result of
experiments indicates it is impossible to get a
desirable performance of fingerprint recognition
using mobile phone cameras in real-life scenarios
even though it might be working well under
laboratory environment.
mobile phone cameras are mostly optimized to
capture human face or other more “attracting”
objects in a frame instead of fingerprints.
Acharya Institute of TechnologyDepartment of ISE
Conclusion
 The focus in this research is on the mobile
cloud and protecting mobile cloud resources from
illegitimate access.
 The proposed solution for authenticating
mobile cloud users using the existing mobile
device camera as a fingerprint sensor to obtain a
fingerprint image, and then process it and
recognize it.
 Results show that the proposed solution has
added value to keep performance at an accepted
level.
Acharya Institute of TechnologyDepartment of ISE
References
• X. Li, "Cloud Computing: Introduction, Application and Security from Industry Perspectives,"
International Journal of Computer Science and Network Security, vol. 11, pp. 224-228, 2011.
• F. Omri, R. Hamila, S. Foufou, and M. Jarraya, "Cloud-Ready Biometric System for Mobile Security Access,"
Networked Digital Technologies, pp. 192-200, 2012.
• M. O. Derawi, B. Yang, and C. Busch, "Fingerprint Recognition with Embedded Cameras on Mobile
Phones," Security and Privacy in Mobile Information and Communication Systems, pp. 136-147,2012.
• H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing architecture,
applications, and approaches," Wireless Communications and Mobile Computing, 2011.
• R. Mueller and R. Sanchez-Reillo, "An Approach to Biometric Identity Management Using Low Cost
Equipment," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth
International Conference on, 2009, pp. 1096-1100.
• B. Y. Hiew, A. B. J. Teoh, and O. S. Yin, "A secure digital camera based fingerprint verification
system," Journal of Visual Communication and Image Representation, vol. 21, pp. 219-231, 2010.
• B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Pre-processing of fingerprint images captured with a
digital camera," in Control, Automation, Robotics and Vision, 2006. ICARCV'06. 9th International
Conference on, 2006, pp. 1-6.
Acharya Institute of TechnologyDepartment of ISE
Acharya Institute of TechnologyDepartment of ISE
Any questions ?

More Related Content

What's hot

IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
IRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
 
IRJET- Text Reading for Visually Impaired Person using Raspberry Pi
IRJET- Text Reading for Visually Impaired Person using Raspberry PiIRJET- Text Reading for Visually Impaired Person using Raspberry Pi
IRJET- Text Reading for Visually Impaired Person using Raspberry Pi
IRJET Journal
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
Reallykul Kuul
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
IRJET Journal
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
mohanaprasad_v
 
Abstract for 3d password
Abstract for 3d passwordAbstract for 3d password
Abstract for 3d password
Divyaprathapraju Divyaprathapraju
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
ShantaJha2
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
codebangla
 
IJSRED-V2I5P43
IJSRED-V2I5P43IJSRED-V2I5P43
IJSRED-V2I5P43
IJSRED
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
IRJET Journal
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SYED HOZAIFA ALI
 

What's hot (19)

IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET- Text Reading for Visually Impaired Person using Raspberry Pi
IRJET- Text Reading for Visually Impaired Person using Raspberry PiIRJET- Text Reading for Visually Impaired Person using Raspberry Pi
IRJET- Text Reading for Visually Impaired Person using Raspberry Pi
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Abstract for 3d password
Abstract for 3d passwordAbstract for 3d password
Abstract for 3d password
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
IJSRED-V2I5P43
IJSRED-V2I5P43IJSRED-V2I5P43
IJSRED-V2I5P43
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
IRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance SystemIRJET - IoT based Portable Attendance System
IRJET - IoT based Portable Attendance System
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Viewers also liked

Final EE
Final EEFinal EE
Final EE
Maurizio Cremi
 
For strokes, a brainy solution_160318
For strokes, a brainy solution_160318For strokes, a brainy solution_160318
For strokes, a brainy solution_160318Megan Carella
 
Prawn &amp; tofu pad thai friday night feasts jamie oliver
Prawn &amp; tofu pad thai   friday night feasts   jamie oliverPrawn &amp; tofu pad thai   friday night feasts   jamie oliver
Prawn &amp; tofu pad thai friday night feasts jamie oliver
Dimandi Kasane
 
Money? no problem!
Money? no problem!Money? no problem!
Money? no problem!
Stef Kuypers
 
La economía en ciencia
La economía en cienciaLa economía en ciencia
La economía en ciencia
daniel aguirre
 
Clipping cnc 07022017 versão de impressão
Clipping cnc 07022017   versão de impressãoClipping cnc 07022017   versão de impressão
Clipping cnc 07022017 versão de impressão
Paulo André Colucci Kawasaki
 
Shane A Treadwell.doc
Shane A Treadwell.docShane A Treadwell.doc
Shane A Treadwell.doc
Shane Treadwell
 
Bassem-CV
Bassem-CVBassem-CV
Bassem-CV
bassem mohamed
 
Relatório sobre o mercado de café da OIC - Outubro 2016
Relatório sobre o mercado de café da OIC - Outubro 2016Relatório sobre o mercado de café da OIC - Outubro 2016
Relatório sobre o mercado de café da OIC - Outubro 2016
Luiz Valeriano
 
revista-EXPOpizzaria_Ed2_FEV.1
revista-EXPOpizzaria_Ed2_FEV.1revista-EXPOpizzaria_Ed2_FEV.1
revista-EXPOpizzaria_Ed2_FEV.1
Patricia Galasini
 
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
Дина Рэй
 
18 Ways to Fill Your Hotel
18 Ways to Fill Your Hotel18 Ways to Fill Your Hotel
18 Ways to Fill Your Hotel
Net Affinity
 
Catalogo Loja das Torcidas - Vestuario
Catalogo Loja das Torcidas - VestuarioCatalogo Loja das Torcidas - Vestuario
Catalogo Loja das Torcidas - Vestuario
Cia de Franchising
 

Viewers also liked (14)

Final EE
Final EEFinal EE
Final EE
 
For strokes, a brainy solution_160318
For strokes, a brainy solution_160318For strokes, a brainy solution_160318
For strokes, a brainy solution_160318
 
Prawn &amp; tofu pad thai friday night feasts jamie oliver
Prawn &amp; tofu pad thai   friday night feasts   jamie oliverPrawn &amp; tofu pad thai   friday night feasts   jamie oliver
Prawn &amp; tofu pad thai friday night feasts jamie oliver
 
Money? no problem!
Money? no problem!Money? no problem!
Money? no problem!
 
La economía en ciencia
La economía en cienciaLa economía en ciencia
La economía en ciencia
 
Clipping cnc 07022017 versão de impressão
Clipping cnc 07022017   versão de impressãoClipping cnc 07022017   versão de impressão
Clipping cnc 07022017 versão de impressão
 
Ananya yog
Ananya yogAnanya yog
Ananya yog
 
Shane A Treadwell.doc
Shane A Treadwell.docShane A Treadwell.doc
Shane A Treadwell.doc
 
Bassem-CV
Bassem-CVBassem-CV
Bassem-CV
 
Relatório sobre o mercado de café da OIC - Outubro 2016
Relatório sobre o mercado de café da OIC - Outubro 2016Relatório sobre o mercado de café da OIC - Outubro 2016
Relatório sobre o mercado de café da OIC - Outubro 2016
 
revista-EXPOpizzaria_Ed2_FEV.1
revista-EXPOpizzaria_Ed2_FEV.1revista-EXPOpizzaria_Ed2_FEV.1
revista-EXPOpizzaria_Ed2_FEV.1
 
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
Книга Любовь: когда он говорит нет, как услышать, все-таки, да.
 
18 Ways to Fill Your Hotel
18 Ways to Fill Your Hotel18 Ways to Fill Your Hotel
18 Ways to Fill Your Hotel
 
Catalogo Loja das Torcidas - Vestuario
Catalogo Loja das Torcidas - VestuarioCatalogo Loja das Torcidas - Vestuario
Catalogo Loja das Torcidas - Vestuario
 

Similar to Rahuls final ppt

Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
Apurva Kini
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
IRJET Journal
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
IRJET Journal
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
IRJET Journal
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
LeMeniz Infotech
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
Sai Chandra Chittuluri
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
Winstina Kennedy
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
IRJET Journal
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
Suman Mia
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
International Journal of Computer and Communication System Engineering
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
IJERA Editor
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
YuvrajGanguly2
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
IRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET Journal
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET Journal
 

Similar to Rahuls final ppt (20)

Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 
IRJET - Hand Gestures Recognition using Deep Learning
IRJET -  	  Hand Gestures Recognition using Deep LearningIRJET -  	  Hand Gestures Recognition using Deep Learning
IRJET - Hand Gestures Recognition using Deep Learning
 
Sign Language Detection using Action Recognition
Sign Language Detection using Action RecognitionSign Language Detection using Action Recognition
Sign Language Detection using Action Recognition
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
User centric machine learning for cyber security operation center
User centric machine learning for cyber security operation centerUser centric machine learning for cyber security operation center
User centric machine learning for cyber security operation center
 
Hardware Design Practices For Modern Hardware
Hardware Design Practices For Modern HardwareHardware Design Practices For Modern Hardware
Hardware Design Practices For Modern Hardware
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 

Rahuls final ppt

  • 1. Acharya Institute of TechnologyDepartment of ISEDepartment of ISE Under the Guidance of Prof. Yogesh N By Rahul K N
  • 2. Acharya Institute of TechnologyDepartment of ISE Contents
  • 3. Acharya Institute of TechnologyDepartment of ISE Introduction Mobile cloud computing = mobile computing + cloud computing It presents new issues of security threats such as unauthorized access to resources exist in mobile cloud. Here we’re using fingerprint recognition system to secure mobile cloud.
  • 4. Acharya Institute of TechnologyDepartment of ISE Difference between Existing System and Proposed System Basis Existing System (Password) Proposed system (Fingerprint) Security Less secure ,as the passwords can be reused ,phished or key logged. More secure, as Fingerprints are unique and complex enough to provide a robust template for authentication. Identification Accuracy Cannot be identified accurately whether the one who is accessing the resources is authorized or not. Authorized user is identified by his fingerprint hence there is no chance of unauthorized user to get access to the resources in cloud. Protection from the attacks Less protected ,as injection attacks on the database is possible . More protected, as injection attacks on the database is impossible. Others Remembering the passwords is difficult . Remembering anything is not required as ultimately all the system requires is the image of your Fingertip.
  • 5. Acharya Institute of TechnologyDepartment of ISE Proposed system Pre-processing -> convert to gray-scale ,edge enhancement, filtering, binarization, thinning, map direction, minutiae extraction Core point detection Input Finger image Feature extraction The User is Accepted Matchig? Data- base enrollment yes no
  • 6. Acharya Institute of TechnologyDepartment of ISE EXPERIMENTAL RESULTS AND DISCUSSION The tests are separated into two parts: 1) Functionality 2)Performance 1. Evaluating Functionality . Figure 2 summarizes the output from various functions, including (a) the original image, (b) convert to gray-scale, (c) edge enhancement, (d)filtering, (e) binarization, (f) thinning, (g) map direction, and (h) minutiae extraction Figure 2: Functions - Output for Galaxy Note
  • 7. Acharya Institute of TechnologyDepartment of ISE Algorithms Used for Matching Relative Distance Matching Image Mapping Each algorithm having a different threshold score for matching.
  • 8. Acharya Institute of TechnologyDepartment of ISE Simple Algorithm • The similarity score (S) is the result of the comparison between the extracted features and features stored in a database. If (S is low value) then Little similarity If (S is high value) then High similarity •After that, the decision will be based on the similarity score (S), which is compared to a predefined threshold (T). If (S > T) then The user is accepted Else if (S < T) The user is rejected
  • 9. Acharya Institute of TechnologyDepartment of ISE 2. Evaluating Performance In this section, the process time is calculated for each function to test if the performance rate is acceptable according to the rates established by the National Institute of Standards and Technology (NIST). Figures 3,4 and 5 show the process time from testing the fingerprint images for the Sony Xperia S , Samsung Galaxy S3 and BlackBerry Z resp.
  • 10. Acharya Institute of TechnologyDepartment of ISE Figure 3 shows the experiment results of the fingerprint image taken with the Sony Xperia S device, which recorded 0.9 seconds as the maximum time and 0.4 seconds as the average
  • 11. Acharya Institute of TechnologyDepartment of ISE Figure 4 illustrates the process time for an image taken with a Samsung Galaxy S3 device the maximum time is 2.4 seconds and the average is 0.5 seconds.
  • 12. Acharya Institute of TechnologyDepartment of ISE Another example is the BlackBerry Z in Figure 5, with approximately 4 seconds as a maximum time and 0.8 seconds as the average recorded time.
  • 13. Acharya Institute of TechnologyDepartment of ISE Discussion From the experiment results, it is evident that,  The range for the total processing time to pre-process a fingerprint image takes between 1 and 12 seconds. Table 1 summarizes the range of process times for each function in the pre-processing class. An acceptable enrolment time should be equal to or less than two minutes, which means that the enrolment process must be completed in 120 seconds. When the total process time is subtracted from the acceptable enrolment time, there are 108 seconds remaining for enrolment.
  • 14. Acharya Institute of TechnologyDepartment of ISE Figure 6 shows the process time of enrolment for six different mobile devices, and nearly all are very similar.
  • 15. Acharya Institute of TechnologyDepartment of ISE Figure 7 illustrates that 0.2 seconds is the minimum time, 19 seconds is the maximum, and 0.4 seconds is the average. This means that the proposed approach achieved 19 seconds, with 108 seconds being the maximum acceptable time.
  • 16. Acharya Institute of TechnologyDepartment of ISE The Matching Process time is shown in Figure 8 for three mobile devices. The average time is 0.4 seconds, which is an accepted rate.
  • 17. Acharya Institute of TechnologyDepartment of ISE Features  The proposed solution is not only to secure unauthorized access, but also to protect databases from injection attacks due to the absence of string input from users. The fingerprint image is the only input from the user in accordance with the interface design. No other input is permitted from the user to enter the system.  The interface in this solution is based on HTML5, which is a cross-platform and has been tested on different mobile platforms.
  • 18. Acharya Institute of TechnologyDepartment of ISE Applications  User doesn’t have to remember the password as the password would be user’s fingerprint. As the fingertip’s image is captured by mobile phone’s camera it is way cheaper than that of getting the fingerprint by using fingerprint scanner. It provides more security as compare to the traditional approaches of authentication.  With the addition of some filters to segment the method in this solution, it will be able to work with web cameras.
  • 19. Acharya Institute of TechnologyDepartment of ISE Drawbacks Due to the complicated background, hand and camera shaking during taking photos, the result of experiments indicates it is impossible to get a desirable performance of fingerprint recognition using mobile phone cameras in real-life scenarios even though it might be working well under laboratory environment. mobile phone cameras are mostly optimized to capture human face or other more “attracting” objects in a frame instead of fingerprints.
  • 20. Acharya Institute of TechnologyDepartment of ISE Conclusion  The focus in this research is on the mobile cloud and protecting mobile cloud resources from illegitimate access.  The proposed solution for authenticating mobile cloud users using the existing mobile device camera as a fingerprint sensor to obtain a fingerprint image, and then process it and recognize it.  Results show that the proposed solution has added value to keep performance at an accepted level.
  • 21. Acharya Institute of TechnologyDepartment of ISE References • X. Li, "Cloud Computing: Introduction, Application and Security from Industry Perspectives," International Journal of Computer Science and Network Security, vol. 11, pp. 224-228, 2011. • F. Omri, R. Hamila, S. Foufou, and M. Jarraya, "Cloud-Ready Biometric System for Mobile Security Access," Networked Digital Technologies, pp. 192-200, 2012. • M. O. Derawi, B. Yang, and C. Busch, "Fingerprint Recognition with Embedded Cameras on Mobile Phones," Security and Privacy in Mobile Information and Communication Systems, pp. 136-147,2012. • H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing architecture, applications, and approaches," Wireless Communications and Mobile Computing, 2011. • R. Mueller and R. Sanchez-Reillo, "An Approach to Biometric Identity Management Using Low Cost Equipment," in Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on, 2009, pp. 1096-1100. • B. Y. Hiew, A. B. J. Teoh, and O. S. Yin, "A secure digital camera based fingerprint verification system," Journal of Visual Communication and Image Representation, vol. 21, pp. 219-231, 2010. • B. Hiew, A. B. J. Teoh, and D. C. L. Ngo, "Pre-processing of fingerprint images captured with a digital camera," in Control, Automation, Robotics and Vision, 2006. ICARCV'06. 9th International Conference on, 2006, pp. 1-6.
  • 22. Acharya Institute of TechnologyDepartment of ISE
  • 23. Acharya Institute of TechnologyDepartment of ISE Any questions ?