Open Access Open Access  Restricted Access Subscription Access

Web based Biometric Authentication for data Security

Adithya C H

Abstract


There is an increasing need for privacy and information security in present-day scenarios since sensitive information is being stored over internet. Cryptography is considered as an effective solution for ensuring security of data. To address certain limitations, cryptography and biometric combined. The system is known as Cryptobiometric system. Cryptobiometric system which uses biometric traits to protect or generate cryptographic hash. But hash generation based on biometric has some problems with privacy of biometric and revocability of biometric. Hence, there is a need to generate an efficient crypto-biometric system which satisfies privacy and revocability of biometric data. Authentication is the act of proving identity of a computer system user. In contrast with identification, the act of indicating a person or thing’s identity, authentication is the process of verifying that identity.  The Authentication techniques are classified into three, i) Knowledge based ii)Property based iii) Biometric based. This project is to generate a cryptographic hash from cancellable fingerprint template. Authors propose Cartesian transformation to induce cancellable template from fingerprint template of users. The generated hash value is used for authentication purpose.

 

 


Full Text:

PDF

References


T. Ahmad, J. Hu and S. Wang (2011). Pair-polar coordinate-based cancelable fingerprint templates. Pattern recognition, 44(10-11), 2555–2564.

T. Ahmad, J. Hu and S. Wang (2011). String-based cancelable fingerprint templates. 2011 6th IEEE Conference on Industrial Electronics and Applications, 1028–1033. IEEE.

U. AR (2015). Cancelable biometrics.

S. Barman, D. Samanta and S. Chattopadhyay (2015). Fingerprint-based crypto- biometric system for network security. EURASIP Journal on Information Security, 2015(1), 1–17.

R. Cappelli, M. Ferrara and D. Maltoni (2010). Minutia cylinder-code: A new rep- resentation and matching technique for fingerprint recognition. IEEE transactions on pattern analysis and machine intelligence, 32(12), 2128–2141.

N. E. Costea and E. V. Moisi (2019). Fingerprint authentication for budget application. 2019 15th International Conference on Engineering of Modern Electric Systems (EMES), 105–108. IEEE.

Z. Hills, D. F. Arppe, A. Ibrahim and K. El-Khatib (2018). Compound password system for mobile. 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 1–4. IEEE.

Z. Jin, J. Y. Hwang, Y.-L. Lai, S. Kim and A. B. J. Teoh (2017). Rankingbased locality sensitive hashing-enabled cancelable biometrics: Index-ofmax hashing. IEEE Transactions on Information Forensics and Security, 13(2), 393–407.

Z. Jin, M.-H. Lim, A. B. J. Teoh and B.-M. Goi (2014). A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters, 42, 137–147.

A. V. Kayem (2016). Graphical passwords–a discussion. 2016 30th International Con-ference on Advanced Information Networking and Applications Workshops (WAINA), 596–600. IEEE.


Refbacks

  • There are currently no refbacks.