ijest10-02-07-24

Upload: mano-billi

Post on 06-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 IJEST10-02-07-24

    1/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    FINGERPRINT IDENTIFICATION SYSTEM combined with

    CRYPTOGRAPHY for Authentication.

    G.Prasanna Lakshmi*

    Research Scholar ,Computer Science, GITAM University, Opposite Rushikonda Beach,

    Visakhapatnam, Andhra Pradesh-530045, India

    [email protected] Phone No :9324230128

    Abstract:Biometrics technology, which uses physical or behavioral characteristics to identify users, has come to attract

    increased attention as a means of reliable personal authentication that helps the identity of an actual user.

    Among various modalities of Biometrics, Fingerprints are known to have the longest history of actual use in law

    enforcement applications with proven performance. This project surveys the state of the art in fingerprint

    identification technology. In this project, a design schema of a security authentication system combined with

    fingerprint identification and public key cryptography is explored, and its specific security mechanism is

    discussed in detail. In our schema, fingerprint is added into user's private key and served a security parameter,such that users secret key is separated into secret key parameters and fingerprint, by secret splitting mechanism,

    which makes the secret key to be bounded with user's information. This will increase the security of secret key

    ultimately. In such an authentication system, the diplex authentication technologies --- fingerprint and smart

    card --- are adopted, and the user fingerprint neednt to be transmitted during the authentication process, which

    can protect user's privacy effectively.

    Keywords: Biometric Cryptography 1; Minutiae2; Encryption3.

    1. Introduction.

    Verifying the identity of an individual can be done through three main methods; what an individual has, what an

    individual knows or owns, and what an individual is. The first method is typically achieved through the use of a

    token, such as an identification card, badge, magnetic stripe, or Radio Frequency Identification (RFID) tag. The

    second method can be achieved through the use of a password, or personal identification number (PIN), and the

    third method can be accomplished through what an individual is, more formally known as biometrictechnologies. Similar to the first two authentication methods, biometric systems too contain vulnerabilities and

    are susceptible to attack. Some of these vulnerabilities are similar or even overlapping across all three

    authentication mechanisms. However, attacks specific to biometric systems focus on liveness detection of a

    human i.e. is this finger from a live sample, or a gelatin sample. There have been various documented attacks in

    the literature which examine the attack on the sensor . While understanding and preventing attacks on thesensorare interesting research topics in need of investigation, this project examines the global and local features of a

    live sample compared to that of a gelatin finger from the same user after acquisition on a commercially available

    biometric fingerprint sensor.

    2. Biometric System Vulnerabilities

    All security measures, including mechanisms for authenticating identity, have ways of being circumvented.

    Certainly the processes in working around these measures vary in difficulty based on effort and resources

    needed to carry out the deceptive act. Authentication mechanisms based on secrets are particularly vulnerable to"guessing" attacks. Token mechanisms that rely on the possession of an object, most notably a card or badge

    technology are most vulnerable to theft or falsified reproduction. Biometric technologies closely tie the

    authenticator to individual identity of the user through the use of physiological or behavioral characteristics.

    While this property is an added advantage over the previous two authentication mechanisms mentioned; it

    places a great emphasis on validating the integrity of the biometric sample acquired and transferred in the

    biometric system. Ratha, N., et al. provided a model identifying vulnerabilities in biometric systems [3]. An

    .

    ISSN: 0975-5462 3054

  • 8/2/2019 IJEST10-02-07-24

    2/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    example of the threat model is shown below in Figure 1, and builds on the general biometric model outlined in

    Mansfield and Wayman [4].

    Figure 1: Biometric Threat Model

    2.1 FINGERPRINT FEATURES

    In fingerprint features are classified into three classes. Level 1 features show macro details of the ridge flow

    shape, Level 2 features (minutiae point) are discriminative enough for recognition, and Level 3 features (pores)

    complement the uniqueness of Level 2 features.

    Global Ridge Pattern

    A fingerprint is a pattern of alternating convex skin called ridges and concave skin called valleys with a spiral-

    curve-like line shape (Figure 1.1.5). There are two types of ridge flows: the pseudo-parallel ridge flows and

    high-curvature ridge flows which are located around the core point and/or delta point(s). This representation

    relies on the ridge structure, global landmarks and ridge pattern characteristics. The commonly used global

    fingerprint features are:

    singular points discontinuities in the orientation field. There are two types of singular points. A core is the

    uppermost of the innermost curving ridge.

    Figure: Global Ridge Patterns

    ISSN: 0975-5462 3055

  • 8/2/2019 IJEST10-02-07-24

    3/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    And a delta point is the junction point where three ridge flows meet. They are usually used for fingerprint

    registration, fingerprint classification.

    Ridge orientation map local direction of the ridge-valley structure. It is com- monly utilized for

    classification, image enhancement, and minutia feature verification and filtering.

    Ridge frequency map the reciprocal of the ridge distance in the direction per-pendicular to local ridge

    orientation. It is formally defined in [32] and is extensively utilized for contextual filtering of fingerprint

    images.This representation is sensitive to the quality of the fingerprint images [36]. However, the discriminative

    abilities of this representation are limited due to absence of singular points.

    (a) A ridge ending minutia: (x,y) are the minutia coordinates; is

    the minutias orientation

    (b) A ridge bifurcation minutia: (x,y) are the minutia coordinates; is the minutias orientation.

    Figure: Minutia ridge patterns

    Figure: Minutiae relation model.

    ISSN: 0975-5462 3056

  • 8/2/2019 IJEST10-02-07-24

    4/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    Block Diagrams

    Figure 2 : Fingerprint Enrollment & Authentication system

    2.1.1 ACTUAL SYSTEM

    Fingerprints are the most widely used biometric feature for person identification and verification in the field of

    biometric identification. This module re presents the implementation of a minutiae based approach to fingerprint

    ISSN: 0975-5462 3057

  • 8/2/2019 IJEST10-02-07-24

    5/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    identification and verification with cryptography. An ideal scheme for combining physical identity (biometric

    features) with logical identity (key)

    Biometric features are permanently associated with the user and can be used for identification.

    Protection of biometric data itself is a privacy issue Biometrics cannot be revoked

    Biometric cryptography:

    Combining Biometrics and Cryptography Use biometrics to generate cryptographic keys Successful biometric verification generates correct key

    The major steps involved in FINGERPRINT RECOGNITION:

    1. Fingerprint database

    2. Fingerprint features database3. Enrollment Module

    4. Authentication module.

    Figure 3: Steps in Fingerprint classification & recognition

    Figure: data collection is done using sensor Figure: preprocessing block output

    ISSN: 0975-5462 3058

  • 8/2/2019 IJEST10-02-07-24

    6/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    Figure: after wavelet transformation Image Figure: Feature extraction

    is converted into LL, LH,HL & HH

    frequency components

    3.FEATURE SELECTION

    DISCRETE WAVELET TRANSFORM :

    The main idea is the same as it is in the CWT. A time-scale representation of a digital signal is obtained using

    digital filtering techniques. Recall that the CWT is a correlation between a wavelet at different scales and the

    signal with the scale (or the frequency) being used as a measure of similarity. The continuous wavelet transform

    was computed by changing the scale of the analysis window, shifting the window in time, multiplying by the

    signal, and integrating over all times. In the discrete case, filters of different cutoff frequencies are used to

    analyze the signal at different scales. The signal is passed through a series of high pass filters to analyze the high

    frequencies, and it is passed through a series of low pass filters to analyze the low frequencies.

    ThThis procedure can mathematically be expressed asis procedure can mathematically be expressed as

    :

    Having said that, we now look how the DWT is actually computed: The DWT analyzes the signal at different

    frequency bands with different resolutions by decomposing the signal into a coarse approximation and detail

    information. DWT employs two sets of functions, called scaling functions and wavelet functions, which are

    associated with low pass and high pass filters, respectively. The decomposition of the signal into different

    frequency bands is simply obtained by successive high pass and low pass filtering of the time domain signal.

    The original signal x[n] is first passed through a half band high pass filter g[n] and a low pass filter h[n]. After

    the filtering, half of the samples can be eliminated according to the Nyquists rule, since the signal now has a

    ISSN: 0975-5462 3059

  • 8/2/2019 IJEST10-02-07-24

    7/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    highest frequency of /2 radians instead of . The signal can therefore be subsampled by 2, simply by

    discarding every other sample. This constitutes one level of decomposition and can mathematically be expressed

    as follows

    g

    Figure: Discrete Wavelet Transform Tree

    Figure: Divisions of image after D.W.T.

    3.1 FEATURE EXTRACTION

    Its combining process of cropping & centralizing. Before going to perform these, the image has to enhanced.

    ISSN: 0975-5462 3060

  • 8/2/2019 IJEST10-02-07-24

    8/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    Distortion of fingerprint is more serious issue:

    1 A fingerprint image is a 2D image of a 3D finger

    2 2D image is affected by pressure, scratches, sweat, alignment and

    position of finger.

    3 Applying weiner filter is more suitable.

    Figure: Cropping and Centralization

    Features

    Centralizing Cropping

    Weiner filter

    .Center

    ISSN: 0975-5462 3061

  • 8/2/2019 IJEST10-02-07-24

    9/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    3.1.1 WIENER FILTER

    Wiener Filter Perform 2-D adaptive noise-removal filtering.

    Wiener low-pass filters an intensity image that has been degraded by constant power additive noise. Wiener

    filter uses a pixel-wise adaptive Wiener method based on statistics estimated from a local neighborhood of

    each pixel.

    In the Digital Filters and Z Transforms chapter we introduced inverse filters as a way of undoing some

    instrumental effect to determine the "true" signal. Later in that chapter, we saw that if we have a filter which has

    a large number of terms in it:

    then we can do "another implementation" of the same filter in terms of its inverse that may have fewer

    significant terms in it:

    4. PRIVACY & SECURITY ISSUES IN BIOMETRIC

    SYSTEMS:

    Figure: Privacy & Security issues in Fingerprint identification system.

    ISSN: 0975-5462 3062

  • 8/2/2019 IJEST10-02-07-24

    10/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    4.1 Conventional Cryptography

    In conventional cryptography, also called secret-key or symmetric-key encryption, one key is used both for

    encryption and decryption. The Data Encryption Standard (DES) is an example of a conventional cryptosystem

    that is widely employed by the Federal Government. Figure 1-1 is an illustration of the conventional encryption

    process.

    Figure: conventional encryption

    Figure: conventional decryption

    ISSN: 0975-5462 3063

  • 8/2/2019 IJEST10-02-07-24

    11/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    4.1.2 RSA ALGORITHM

    Public Key Cryptography:

    One of the biggest problems in cryptography is the distribution of keys. Suppose you live in the United States

    and want to pass information secretly to your friend in Europe. If you truly want to keep the information secret,

    you need to agree on some sort of key that you and he can use to encode/decode messages. But you don't want

    to keep using the same key, or you will make it easier and easier for others to crack your cipher. But it's also a

    pain to get keys to your friend. If you mail them, they might be stolen. If you send them cryptographically, and

    someone has broken your code, that person will also have the next key. If you have to go to Europe regularly to

    hand-deliver the next key, that is also expensive. If you hire some courier to deliver the new key, you have to

    trust the courier, etcetera.

    Certification

    There is, of course, a problem with the scheme above. Since the public keys are really public, anyone can send a

    message to you. So your enemy can pretend to be your friend and send you a message just like your friend as

    they both have access to the public key. Your enemy's information can completely mislead you. So how can you

    be certain that a message that says it is from your friend is really from your friend? Here is one way to do it,

    assuming that you both have the public and private keys Ea, Eb, Da, and Db as discussed in the previous

    section. Suppose I wish to send my friend a message that only he can read, but in such a way that he is certain

    that the message is from me. Here's how to do it. I will take my name, and pretend that it is an encoded message,

    and decode it using Da. I am the only person who can do this, since I am the only person who knows Da. Then I

    include that text in the real message I wish to send, and I encode the whole message using Eb, which only my

    friend knows how to decode. When he receives it, he will decode it using Db, and he will have a message with

    an additional piece of what looks to him like junk characters. The junk characters are what I got by decoding my

    name. So he simply encodes the junk using my public key Ea and makes certain that it is my name. Since I am

    the only one who knows how to make text that will encode to my name, he knows the message is from me. You

    can encode any text for certification, and in fact, you should probably change it with each

    message, but it's easy to do.

    RSA Encryption and Decryption:

    One commonly used cipher form is called RSA Encryption, where RSA are the initials of the three creators:

    Rivest, Shamir, and Adleman. It is based on the following idea: It is very simply to multiply numbers together,

    especially with computers. But it can be very difficult to factor numbers. In practical applications, it is common

    to choose a small public exponent for the public key. In fact, entire groups of users can use the same public

    exponent, each with a different modulus. (There are some restrictions on the prime factors of the modulus when

    the public exponent is fixed.) This makes encryption faster than decryption and verification faster than signing.

    ISSN: 0975-5462 3064

  • 8/2/2019 IJEST10-02-07-24

    12/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    With the typical modular exponentiation algorithms used to implement the RSA algorithm, public key

    operations take O(k2) steps, private key operations take O(k3) steps, and key generation takes O(k4) steps,

    where k is the number of bits in the modulus. Fast multiplication techniques, such as methods based on the

    Fast Fourier Transform (FFT), require asymptotically fewer steps. In practice, however, they are not as common

    due to their greater software complexity and the fact that they may actually be slower for typical key sizes.

    Encryption Operation of RSA

    Figure: encryption operation of RSA

    Entity A wants to send secret message(cipher text) to B

    Uses Public key of B and Encrypt operation to generate Ciphertext

    Sends Ciphertext to Entity B

    Entity B wants to read the Message(M) sent by A

    Receives Ciphertext from A Uses its private key D and Decrypt operation to get Message(M)

    Authentication Operation of RSA

    Figure: authentication operation of RSA

    A BCiphertext

    Public Key of

    B

    Message(M)

    Encrypt

    operation

    Ciphertext

    Private Key D

    CiphertextDecrypt

    operation

    Message(M)

    A

    BSignature (S), Message (M)Private key D

    Message(M)

    Signing

    operation

    Signature(S)

    Public key Eof A

    Signature(S)

    Verifying

    operationMessage(M1)

    If M equals M1

    then identity ofEntity A isproved

    ISSN: 0975-5462 3065

  • 8/2/2019 IJEST10-02-07-24

    13/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    Entity A wants to prove its identity to B

    Signing operation to generate Signature (S)

    sends Message(M), Signature(S) to Entity B

    Entity B wants to verify identity of A

    Receives Signature(S) and Message(M) from A

    Verifying operation to generate Message(M1) from S

    Compares M1 and M to verify identity of A

    5 .ALGORITHM

    The algorithm can be given below.

    1. Find P and Q, two large (e.g., 1024-bit) prime numbers.

    2. Choose E such that E is greater than 1, E is less than PQ, also E and (P-1)(Q-1) are relatively prime,

    which means they have no prime factors in common. E does not have to be prime, but it must be odd.

    (P-1)(Q-1) can't be prime because it's an even number.

    3. Compute D such that (DE - 1) is evenly divisible by (P-1)(Q-1). Mathematicians write this as

    DE = 1 (mod (P-1)(Q-1)), and they call D the multiplicative inverse of E. This is easy to do simply find

    an integer X which causes D = (X(P-1)(Q-1) + 1)/E to be an integer, then use that value of D.

    4. The encryption function is C = (T^E) mod PQ, where C is the cipher text (a positive integer), T is the

    plaintext (a positive integer), and ^ indicates exponentiation. The message being encrypted, T, must be

    less than the modulus, PQ.

    5. The decryption function is T = (C^D) mod PQ, where C is the cipher text (a positive integer), T is the

    plaintext (a positive integer), and ^ indicates exponentiation.

    Your public key is the pair (PQ, E). Your private key is the number D (reveal it to no one). The product PQ is

    the modulus (often called N in the literature). E is the public exponent. D is the secret exponent.

    You can publish your public key freely, because there are no known easy methods of calculating D, P, or Q

    given only (PQ, E) (your public key). If P and Q are each 1024 bits long, the sun will burn out before the most

    powerful computers presently in existence can factor your modulus into P and Q.

    5.1 RSA-CRT key generation

    1. Let p and q be very be two very large primes of nearly the same size such that gcd

    (p-1, q-1) = 2.

    2. Compute N = p*q. and Phi=(p-1)*(q-1);

    3. Pick two random integers dp and dq such that gcd (dp, p-1)=1, gcd (dq, q-1)=1 and

    dp==dq mod 2.

    ISSN: 0975-5462 3066

  • 8/2/2019 IJEST10-02-07-24

    14/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    4. Find a d such that d==dp mod p-1 and d==dq mod q-1.

    5. Compute e=d-1 (mod Phi ).

    The public key is and the private key is . Since gcd (dp, p-1)=1 and d==dp mod p-1, we

    have gcd (d, p-1)=1. Similarly, gcd (d, q-1)=1. Hence gcd (d, phi (N))=1 and by step 5, e can be computed.

    To apply the Chinese Remainder Theorem in step 4, the respective moduli have to be relatively prime in pairs

    for a solution to necessarily exist. We observe that p-1 and q-1 are even and that we cannot directly apply the

    Chinese Remainder Theorem. However, gcd ((p- 1)/2, (q-1)/2)=1. Since gcd (dp, p-1)=1 and gcd (dq, q-1)=1,

    essentially dp, dq are odd integers and dp-1, dq-1 are even integers. We have gcd (d, p-1)=1, which implies that

    d is odd and d-1 is even.

    To find a solution to

    d==dp mod p-1,

    d==dq mod q-1.

    We find a solution to

    d-1==dp 1 mod p-1,

    d-1==dq 1 mod q-1.

    By applying the cancellation law and taking the common factor 2 out, we have

    x=d== (d-1)/2==(dp 1)/2 mod( p-1)/2,

    x=d==(d-1)/2==(dq 1)/2 mod( q-1)/2.

    Using Chinese Remainder Theorem we find d such that d = (2*d) +1.

    5.1.2 RSA-CRT Decryption

    Since RSA-CRT encryption is same as that of the standard RSA encryption procedure, we now turn our

    attention to RSA-CRT decryption. Let M be the plaintext and C the cipher text.

    Theorem If C is not divisible by p and dp==d mod p-1, then Cdp==Cd (mod p).

    For decryption we find

    1. Mp=Cdp(mod p)= Cd(mod p) and Mq=Cdq(mod q)= Cd(mod q).

    2. Then using Chinese Remainder Theorem, we find a solution for

    M=Mp(mod p)= Cd(mod p),

    M=Mq=Cdq(mod q)= Cd(mod q).

    We now illustrate the scheme using an over simplified example. Choose p = 7, q = 11, gcd

    (p-1, q-1) = 2, N = p*q = 7*11 = 77, phi (N) = (p-1)*(q-1) = 6*10 = 60.

    Let dp = 5, gcd (dp , p-1) = gcd (5,6) = 1.

    dq = 3, gcd (dq , q-1) = gcd (3,10) = 1.

    ISSN: 0975-5462 3067

  • 8/2/2019 IJEST10-02-07-24

    15/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    We are to find d such that

    d==5 mod 6,

    d==3 mod 10.

    We cannot apply the Chinese Remainder theorem since gcd (6,10) . 1, hence we convert the system of

    congruences in such a manner that the cancellation law can be applied

    Therefore, we have

    d-1==5-1 mod 6,

    d-1==3-1 mod 10.

    On applying the cancellation law,

    (d-1)/2==(5-1)/2 mod (6/2),

    (d-1)/2==(3-1)/2 mod (10/2).

    x = d= (d-1)/2== 2 mod 3,

    x = d= (d-1)/2== 1 mod 5.

    Solving using Chinese Remainder Theorem,

    M = 3*5 = 15, M1 =15/3 = 5, M2 = 15/5=3.

    5*N1==1 mod 3, N1=2,

    3*N2==1 mod 5, N2=2.

    We have,

    d = x = 2*5*2 + 1*3*2 = 26(mod 15) = 11.

    Therefore d = 11 and d = (2*d)+1 = (2*11) +1 = 23, d = 23.

    Now we find, e such that

    e*d==1 mod phi(N),

    e*23==1 mod 60, e = 47.

    Let the plaintext M=5.

    C=547 mod 77 = 3.

    For decryption, we find

    M = Mp mod p = cd mod p,M = Mq mod q = cd mod q.

    Mp = 35 mod 7 = 243 mod 7 = 5,

    Mq = 33 mod 11= 27 mod 11 = 5.

    Using the Chinese Remainder Theorem,

    ISSN: 0975-5462 3068

  • 8/2/2019 IJEST10-02-07-24

    16/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    M = 7*11 = 77, M1 = 77/7 = 11, M2 = 77/11 = 7.

    11*N1==1 mod 7, N1=2,

    7*N2==1 mod 11, N2=8.

    x = 5*11*2 + 5*7*8 = 390 mod 77 =5.

    Thus x = M = 5, as desired. In this specific example (Mp and Mq)=5 is a common solution and it is not

    necessary to further apply the Chinese Remainder Theorem.

    5.1.3 CRT to Multi-Prime RSA:

    Based on the property of the RSA algorithm, the modulus N is the product of large prime numbers. Thus we can

    use Chinese Remainder Theorem (CRT) to accelerate the computation. In 2-prime CRT and 2-prime RSA, the

    modulus

    S1=M D mod p

    S2=M D mod q

    By applying Fermats theorem, we can obtain

    S1=M D 1 mod p

    S2=M D 2 mod q

    where D1=D mod (p-1) and D2=D mod(q-1). Applying CRT we can compute the results

    S as

    S = (S1c1q+S2c2p) mod N 2

    Where

    c1=q-1 mod p

    c2=p-1 mod q.

    The size of p and q about half of N. Thus the size of the exponents is reduced to half of the original size in 2-

    prime RSA. In multi prime CRT and RSA

    we have S=MD mod (pqr)

    We can obtain

    S1=MD1 mod p

    S2=MD2 mod q

    S3=MD3 mod r.

    Where,

    D1=Dmod(p-1)

    D2=Dmod(q-1)

    D3=Dmod(r-1)

    ISSN: 0975-5462 3069

  • 8/2/2019 IJEST10-02-07-24

    17/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    We can apply the CRT to retrive S as S=(S1c1qr+ S2c2pr+ S3c3pq)

    Where

    C1=(rq)-1 mod p

    C2=(pr)-1 mod q

    C3=(pq)-1 mod r

    Hence the size of the exponents is further reduced to one third the original. Based on above analysis, 1024-bit 2-

    prime and multi-prime RSA can be done with 512-bit and 341-bit exponents and modulus respectively.

    7 Results and Conclusions

    GUI

    ISSN: 0975-5462 3070

  • 8/2/2019 IJEST10-02-07-24

    18/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    ISSN: 0975-5462 3071

  • 8/2/2019 IJEST10-02-07-24

    19/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    ISSN: 0975-5462 3072

  • 8/2/2019 IJEST10-02-07-24

    20/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    ISSN: 0975-5462 3073

  • 8/2/2019 IJEST10-02-07-24

    21/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    ISSN: 0975-5462 3074

  • 8/2/2019 IJEST10-02-07-24

    22/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    8 APPLICATIONS

    Markets for fingerprint technology include entrance control and door-lock applications, fingerprint identification

    mouses, fingerprint mobile phones, and many others. The fingerprint markets are classified as

    follows:

    Figure: market applications of fingerprint identification

    As the advanced technology enables even more compact fingerprint sensor size, the range of application is

    extended to the mobile market. Considering the growing phase of the present mobile market, its potential is the

    greatest of all application markets.

    ISSN: 0975-5462 3075

  • 8/2/2019 IJEST10-02-07-24

    23/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    SYSTEMSECURITY:

    Figure: role of bad user

    If there is only fingerprint or any of the biometric technology is used, then there may be a chance of a bad user

    tampering or corrupting the data. so we are combining the fingerprint technology with cryptography which

    results in a totally secured system.

    Figure: cryptography in system security

    ISSN: 0975-5462 3076

  • 8/2/2019 IJEST10-02-07-24

    24/24

    G.Prasanna Lakshmi / International Journal of Engineering Science and Technology

    Vol. 2(7), 2010, 3054-3077

    The problem faced by the single biometric system is solved by combining the system with cryptography which

    is yielding many advantages & applications in real time.

    References

    [1] R. Cappelli, Synthetic Fingerprint Generation,Handbook of Fingerprint Recognition, D. Maltoni, D. Maio, A.K. Jain, and S.

    Prabhakar, eds. New York: Springer, 2003.[2] R. Cappelli, A. Erol, D. Maio, and D. Maltoni, Synthetic Fingerprint-Image Generation, Proc. 15th Int'l Conf. Pattern Recognition,pp.

    475-478, Sept. 2000.

    [3] R. Cappelli, D. Maio, and D. Maltoni, Modelling Plastic Distortion in Fingerprint Images, Proc. Second Int'l Conf. Advances in

    Pattern Recognition, pp. 369-376, Mar. 2001.[4] R. Cappelli, D. Maio, and D. Maltoni, Synthetic Fingerprint-Database Generation, Proc. 16th Int'l Conf. Pattern Recognition, vol. 3,

    pp. 744-747, Aug. 2002.

    [5] Y. Dit-Yan et al., SVC2004: First International Signature Verification Competition, Proc. Int'l Conf. Biometric Authentication, pp. 16-

    22, July 2004.

    [6] G. Doddington et al., Sheep, Goats, Lambs and Wolves: A Statistical Analysis of Speaker Performance, Proc. Int'l Conf. Language

    and Speech Processing, pp. 1351-1354, Nov. 1998.[7] S. Pankanti, N.K. Ratha, and R.M. Bolle, Structure in Errors: A Case Study in Fingerprint Verification, Proc. 16th Int'l Conf. Pattern

    Recognition, 2002.

    [8] P.J. Phillips, A. Martin, C.L. Wilson, and M. Przybocky, An Introduction to Evaluating Biometric Systems, Computer, vol. 33, no. 2,

    Feb. 2000.[9] P.J. Phillips, H. Moon, S.A. Rizvi, and P.J. Rauss, The FERET Evaluation Methodology for Face-Recognition Algorithms,IEEE

    Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 10, pp. 1090-1104, Oct. 2000.