Fingerprint based authentication system using threshold visual cryptographic technique

Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online transactions. The biometric that has been chosen for implementation is fingerprint, since fingerprint biometric is easily available and highly reliable compared to many other biometrics. In the existing biometric authentication system the fingerprint template of a person is stored as such in the authentication server and is prone to security attacks at the server side. To overcome this kind of server side attack, in the proposed system the fingerprint template is divided into two or more shares using visual cryptographic technique followed by compression. One of these shares is stored into the server and the remaining shares are given to the users. Only these two participants who possess these transparencies can reconstruct the secret (biometric template) by superimposition of shares. This kind of approach solves two major problems related to fingerprint based automatic access control systems such as falsification and costly maintenance of the large fingerprint database.

[1]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[2]  M. El-Metwally,et al.  Simple new methods to estimate global solar radiation based on meteorological data in Egypt , 2004 .

[3]  A. A. Trabea,et al.  Correlation of global solar radiation with meteorological parameters over Egypt , 2000 .

[4]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[5]  G. Lewis,et al.  Estimates of irradiance over Zimbabwe , 1983 .

[6]  T. Samuel,et al.  Estimation of global radiation for Sri Lanka , 1991 .

[7]  Ralph Spencer Poore,et al.  Advances in Cryptography , 2003, Inf. Secur. J. A Glob. Perspect..

[8]  A. Angstroem Solar and terrestrial radiation , 1924 .

[9]  Douglas R. Stinson,et al.  Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings , 2001 .

[10]  Y.V.S. Rao,et al.  Fingerprint based authentication application using visual cryptography methods (Improved ID card) , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[11]  Stefano Bistarelli,et al.  Computer Algebra for Fingerprint Matching , 2003, International Conference on Computational Science.

[12]  George H. Hargreaves,et al.  Reference Crop Evapotranspiration from Temperature , 1985 .

[13]  F. J. Newland,et al.  A study of solar radiation models for the coastal region of South China , 1989 .

[14]  G. Campbell,et al.  On the relationship between incoming solar radiation and daily maximum and minimum temperature , 1984 .

[15]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[16]  Javier Almorox,et al.  Global solar radiation estimation using sunshine duration in Spain , 2004 .

[17]  V. Bahel,et al.  A correlation for estimation of global solar radiation , 1987 .

[18]  Chin-Chen Chang,et al.  Sharing multiple secrets in digital images , 2002, J. Syst. Softw..

[19]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.