A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff50a012000000f70e000001000b00
The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

Authors
U. Latha1 , K. Ramesh Kumar2
1Dhaanish Ahmed College of Engineering, India, 2Hindustan University, India

Keywords
Fingerprint Reconstruction, Complex Wavelet Transform (CWT), 2D Dual Tree Complex Wavelet Transform (DTCWT), Trigon Based Security Protocol, Binarization
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Image and Video Processing
( Volume: 4 , Issue: 1 , Pages: 652 - 656 )
Date of Publication :
August 2013
Page Views :
100
Full Text Views :

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.