IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 5, May 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cryptosystem Based On Finger Vein Patterns Using Vas Algorithm

[Full Text]

 

AUTHOR(S)

G.Kanimozhi, Dr. A. Shaik Abdul Khadir

 

KEYWORDS

Cryptosystem, hidden platform, biometrics, finger vein identification

 

ABSTRACT

Cryptosystems based on biometrics authentication is developing areas in the field of modernize security schemes. Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint identification function, it is especially dangerous in opposite identification function, such as note list and reduplication function. In such function, malicious possessors may purposely distort their fingerprints to evade identification. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. The current document deals with the application of finger veins pattern as an approach for possessor confirmation and encryption key generation. The design of the optical imprison scheme by near infrared is described. We propose a step for the location of the vein crossing points and the quantification of the angles between the vein-branches, this information is used to generate a personal key that allows the possessor to encrypt information after the confirmation is approved. In order to demonstrate the potential of the suggested approach, and model of figure encryption is developed. All action: biometric imprison, figure presetting, key generation and figure encryption are performed on the identical hidden platform adding an important portability and diminishing the execution time.

 

REFERENCES

[1] D. Bhattacharyya, R. Ranjan, F. Alisherov, and M. Choi, “Biometric authentication: A review,” International Journal of u-and e Service, Science and Technology, vol. 2, no. 3, pp. 13–28, 2009.

[2] F. Hao, R. Anderson, and J. Daugman, “Combining cryptography with biometrics effectively,” University of Cambridge Computer Laboratory, Tech. Rep, 2005.

[3] K. He, J. Sun, and X. Tang, “Guided image filtering,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 6, pp. 1397– 1409, 2013.

[4] J. Hoffstein, J. C. Pipher, J. H. Silverman, and J. H. Silverman, An introduction to mathematical cryptography. Springer, 2008.

[5] T. Ignatenko and F. M. Willems, “Biometric systems: Privacy and secrecy aspects,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 956–973, 2009.

[6] S. Joardar, A. Chatterjee, and A. Rakshit, “A real-time palm dorsa subcutaneous vein pattern recognition system using collaborative representation-based classification,” IEEE Transactions on Instrumentation and Measurement, vol. 64, no. 4, pp. 959–966, 2015.

[7] A. Kumar and Y. Zhou, “Human identification using finger images,” IEEE Transactions on Image Processing, vol. 21, no. 4, pp. 2228–2244, 2012.

[8] L. Lam, S.-W. Lee, and C. Y. Suen, “Thinning methodologies-a comprehensive survey,” IEEE Transactions on pattern analysis and machine intelligence, vol. 14, no. 9, pp. 869–885, 1992.

[9] T. S. Lee, “Image representation using 2d gabor wavelets,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 10, pp. 959–971, 1996.

[10] M. Mansoor, S. Sravani, S. Zahra Naqvi, I. Badshah, and M. Saleem, “Real-time low cost infrared vein imaging system,” in Signal Processing Image Processing & Pattern Recognition (ICSIPR), 2013 International Conference on. IEEE, 2013, pp. 117–121.

[11] M. Murillo-Escobar, C. Cruz-Hern´andez, F. Abundiz-P´erez, and R. L´opez-Guti´errez, “A robust embedded biometric authentication system based on fingerprint and chaotic encryption,” Expert Systems with Applications, 2015.

[12] N. Otsu, “A threshold selection method from gray-level histograms,” Automatica, vol. 11, no. 285-296, pp. 23–27, 1975.

[13] K. Parthiban, A. Wahi, S. Sundaramurthy, and C. Palanisamy, “Finger vein extraction and authentication based on gradient feature selection algorithm,” in 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2014, pp. 143–147.

[14] R. Raghavendra, K. B. Raja, J. Surbiryala, and C. Busch, “A low-cost multimodal biometric sensor to capture finger vein and fingerprint,” in 2014 IEEE International Joint Conference on Biometrics (IJCB). IEEE, 2014, pp. 17.

[15] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol. 2011, no. 1, pp. 1–25, 2011.

[16] U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.

[17] S. J. Xie, J. Yang, S. Yoon, L. Yu, and D. S. Park, “Guided gabor filter for finger vein pattern extraction,” in 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS). IEEE, 2012, pp. 118–123.

[18] J. Yang, J. Yang, and Y. Shi, “Finger-vein segmentation based on multichannel even-symmetric gabor filters,” in IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009. ICIS 2009., vol. 4. IEEE, 2009, pp. 500–503.

[19] A. Yimit, M. Takagi, Y. Hagihara, T. Miyoshi, and Y. Hagihara, “Visual vein segmentation for an intravenous injection support system,” in SICE Annual Conference (SICE), 2013 Proceedings of. IEEE, 2013, pp. 2290–2295.

[20] Yuksel, L. Akarun, and B. Sankur, “Hand vein biometry based on geometry and appearance methods,” IET computer vision, vol. 5, no. 6, pp. 398–406, 2011.