scholarly journals Upgrading Information Security and Protection for Palm-Print Templates

Author(s):  
Poonam Poonia ◽  
Pawan K. Ajmera

Abstract Biometric systems proven to be one of the most reliable and robust method for human identification. Integration of biometrics among the standard of living provokes the necessity to vogue secure authentication systems. The use of palm-prints for user access and authentication has increased in the last decade. To give the essential security and protection benefits, conventional neural networks (CNNs) has been bestowed during this work. The combined CNN and feature transform structure is employed for mapping palm-prints to random base-n codes. Further, secure hash algorithm (SHA-3) is used to generate secure palm-print templates. The proficiency of the proposed approach has been tested on PolyU, CASIA and IIT-Delhi palm-print datasets. The best recognition performance in terms of Equal Error Rate (EER) of 0.62% and Genuine Acceptance Rate (GAR) of 99.05% was achieved on PolyU database.

2019 ◽  
Vol 1 (3) ◽  
pp. 1-16
Author(s):  
Musab T. Al-Kaltakchi ◽  
Raid R. Omar ◽  
Hikmat N. Abdullah ◽  
Tingting Han ◽  
Jonathon A. Chambers

Finger Texture (FT) is one of the most recent attractive biometric characteristic. Itrefers to a finger skin area which is restricted between the fingerprint and the palm print (just after including the lower knuckle). Different specifications for the FT can be obtained by employing multiple images spectrum of lights. This inspired the insight of applying a combination between the FT features that acquired by utilizing two various spectrum lightings in order to attain high personal recognitions. Four types of fusion will be listed and explained here: Sensor Level Fusion (SLF), Feature Level Fusion (FLF), Score Level Fusion (ScLF) and Decision Level Fusion (DLF). Each fusion method is employed and examined for an FT verification system. From the database of Multiple Spectrum CASIA (MSCASIA), FT images have been collected. Two types of spectrum lights have been exploited (the wavelength of 460 nm, which represents a Blue (BLU) light, and the White (WHT) light). Supporting comparisons were performed, including the state-of-the-art. Best recognition performance were recorded for the FLF based concatenation rule by improving the Equal Error Rate (EER) percentages from 5% for the BLU and 7% for the WHT to 2%.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

2014 ◽  
Vol 40 (1) ◽  
pp. 194-202 ◽  
Author(s):  
Rommel García ◽  
Ignacio Algredo-Badillo ◽  
Miguel Morales-Sandoval ◽  
Claudia Feregrino-Uribe ◽  
René Cumplido

Author(s):  
Shashidhara H. R. ◽  
Siddesh G. K.

Authenticating the identity of an individual has become an important aspect of many organizations. The reasons being to secure authentication process, to perform automated attendance, or to provide bill payments. This need of providing automated authentication has led to concerns in the security and robustness of such biometric systems. Currently, many biometric systems that are organizations are unimodal, which means that use single physical trait to perform authentication. But, these unimodal systems suffer from many drawbacks. These drawbacks can be overcome by designing multimodal systems which use multiple physical traits to perform authentication. They increase reliability and robustness of the systems. In this chapter, analysis and comparison of multimodal biometric systems is proposed for three physical traits like iris, finger, and palm. All these traits are treated independently, and feature of these traits are extracted using two algorithms separately.


2021 ◽  
pp. 1-8
Author(s):  
Jyoti Patil Devaji ◽  
Nalini C. Iyer ◽  
Rajeshwari Mattimani

Sign in / Sign up

Export Citation Format

Share Document