An Authentication Protocol to Authenticate Users Against Fingerprint Database with Aid of Trigon-Based Method


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that, the reconstructed fingerprint image features are stored in the database and this extracted fingerprint features information is protected by our proposed security protocol. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


2D Dual Tree Complex Wavelet Transform (DTCWT); Trigon Based Security Protocol; Authentication Server; Backend Server; Authentication Key

Full Text:

PDF


References


Muna F. Hanoon, "Contrast Fingerprint Enhancement Based on Histogram Equalization Followed By Bit Reduction of Vector Quantization "IJCSNS International Journal of Computer Science and Network Security, Vol. 11 No. 5, May 2011.

Arun Ross, Jidnya Shah and AnilK.Jain, Towards Reconstructing Fingerprints from Minutiae Points", In proceedings of SPIE conference on biometric technology for human identification II, Vol. 5799, pp 68-80, USA, 2005

Brendan Babb, "Evolved Transforms Surpass the FBI Wavelet for Improved Fingerprint Compression and Reconstruction", In Proceedings of the 2007 GECCO conference companion on Genetic and evolutionary computation, USA, 2007

Jianjiang Feng, Anil K. Jain, Fellow, "Fingerprint Reconstruction: From Minutiae to Phase", IEEE transactions on pattern analysis and machine intelligence, Vol. 33, No. 2, pp. 209-223, February 2011

K. Srinivasan, C. Chandrasekar, "An Efficient Fuzzy Based Filtering Technique for Fingerprint Image Enhancement", American Journal of Scientific Research, No. 43, pp. 125-140, 2012

Dhruv Batra, Girish Singhal and Santanu Chaudhury, "Gabor Filter based Fingerprint Classification using Support Vector Machines ", IEEE India Annual Conference 2004, pp. 256-261, Dec 2004

Muhammad Umer Munir and Dr. Muhammad Younas Javed, "Fingerprint Matching using Gabor Filters", National Conference on Emerging Technologies, pp. 147-151, 2004

Avinash pokhriyal, Aushma lehri, "A new method of fingerprint authentication using 2d wavelets " Journal of Theoretical and Applied Information Technology Vol. 13 No. 2, pp. 131 – 138, March, 2010

Poramate Prasarn, Keokanlaya Sihalath, and Somsak Choomchuay, "A dynamic enhancement method for fingerprint matching ", The 3rd Biomedical Engineering International Conference, pp. 237-241, 2010

Jie Zhang, Bo Zhang, Xinjing Liu, Xiaojun Jing, "A Matching-Improved Reparation Method for Incomplete Fingerprint ", In Proceedings of IEEE CCIS, 2011

YANG Jian-bin, "Image inpainting using complex 2-D dual-tree wavelet transform", Applied Mathematics - A Journal of Chinese Universities, Vol. 26, No. 1, pp. 70-76, 2011.

Tripathy, P.K., Biswal, D., Multiple server indirect security authentication protocol for mobile networks using elliptic curve cryptography (ECC), (2013) International Review on Computers and Software (IRECOS), 8 (7), pp. 1571-1577.

Vinothkanna, R., Wahi, A., An efficient finger print enhancement and recognition system viz fuzzy based filtering technique, (2013) International Review on Computers and Software (IRECOS), 8 (7), pp. 1506-1516.

Abdelghani Djebbari, Fethi Bereksi-Reguig, A New Chirp–Based Wavelet for Heart Sounds Time–Frequency Analysis , (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 92-102.

Ghandi Manasra, Osama Najajri, Samer Rabah, Hashem Abu Arram, DWT Based on OFDM Multicarrier Modulation Using Multiple Input Output Antennas System, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (5), pp. 312-320.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize