Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm

Author(s):  
Mustafa Sabah ◽  
Adil Abbas Majeed ◽  
Haider S. Hatem
2017 ◽  
Vol 10 (2) ◽  
pp. 446-453
Author(s):  
Neha Bhatia ◽  
Himani Himani ◽  
Chander Kant

Biometric authentication using fingerprint is one of the unique and reliable method of verification processes. Biometric System suffers a significant loss of performance when the sensor is changed during enrollment and authentication process. In this paper fingerprint sensor interoperability problem is addressed using Gabor filter and classifying images into good and poor quality. Gabor filters play an important role in many application areas for the enhancement of various types of fingerprint images. Gabor filters can remove noise, preserve the real ridges and valley structures, and it is used for fingerprint image enhancement. Experimental results on the FVC2004 databases show improvements of this approach.


2020 ◽  
Vol 21 (2) ◽  
pp. 37
Author(s):  
Muhammad Arif Budiman ◽  
I Gusti Agung Widagda

Security systems that use passwords or identity cards can be hacked and misused. One of alternative security system is to use biometric identification. The biometric system that is popularly used is fingerprints, because the system is safe and comfortable. Fingerprints have a distinctive pattern for each individual and this makes fingerprints relatively difficult to fake, so the system is safe. Comfortable because the verification process is easily done. The problem that often occurs on the system of fingerprint scanner is found an error and the user has difficulty when accessing. To handle with these problems has developed an artificial intelligence system. One of arificial intelligence in pattern identification is artificial neural networks (ANN). From some of the results of previous research showed that the ANN method is reliable in pattern identification. Based on these facts, the method used in this research is the perceptron ANN method with values learning rate varying. In the research the program conducted by testing 20 samples showed that the performance of the perceptron ANN method is relatively good method in fingerprint image recognition. This can be indicated from the value of accuracy (0.95), precision (0.83), TP rate (1), and FP rate (0.07)). In addition, the location of the point coordinate (FP rate; TP rate) is (0.07; 1) in ROC graphs is located on the upper left (perfect classifier region).


2016 ◽  
Vol 2016 ◽  
pp. 1-15 ◽  
Author(s):  
F. Abundiz-Pérez ◽  
C. Cruz-Hernández ◽  
M. A. Murillo-Escobar ◽  
R. M. López-Gutiérrez ◽  
A. Arellano-Delgado

Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems.


2009 ◽  
Vol 28 (10) ◽  
pp. 2683-2685
Author(s):  
Dan ZHANG ◽  
Xue-feng TONG ◽  
Guo-rong XUAN

2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


Sign in / Sign up

Export Citation Format

Share Document