A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints informatio...

Full description

Bibliographic Details
Main Authors: U. Latha, K. Ramesh Kumar
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2013-08-01
Series:ICTACT Journal on Image and Video Processing
Subjects:
Online Access:http://ictactjournals.in/paper/Paper_4_652_656_online.pdf
id doaj-6b2a1e29f74e4583843096c990d9f33b
record_format Article
spelling doaj-6b2a1e29f74e4583843096c990d9f33b2020-11-24T22:10:08ZengICT Academy of Tamil NaduICTACT Journal on Image and Video Processing0976-90990976-91022013-08-0141652656A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKSU. Latha0K. Ramesh Kumar1Department of Information Technology, Dhaanish Ahmed College of Engineering, IndiaDepartment of Information Technology, Hindustan University, IndiaThe Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.http://ictactjournals.in/paper/Paper_4_652_656_online.pdfFingerprint ReconstructionComplex Wavelet Transform (CWT)2D Dual Tree Complex Wavelet Transform (DTCWT)Trigon Based Security ProtocolBinarization
collection DOAJ
language English
format Article
sources DOAJ
author U. Latha
K. Ramesh Kumar
spellingShingle U. Latha
K. Ramesh Kumar
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
ICTACT Journal on Image and Video Processing
Fingerprint Reconstruction
Complex Wavelet Transform (CWT)
2D Dual Tree Complex Wavelet Transform (DTCWT)
Trigon Based Security Protocol
Binarization
author_facet U. Latha
K. Ramesh Kumar
author_sort U. Latha
title A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
title_short A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
title_full A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
title_fullStr A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
title_full_unstemmed A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
title_sort strong security protocol against fingerprint database attacks
publisher ICT Academy of Tamil Nadu
series ICTACT Journal on Image and Video Processing
issn 0976-9099
0976-9102
publishDate 2013-08-01
description The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.
topic Fingerprint Reconstruction
Complex Wavelet Transform (CWT)
2D Dual Tree Complex Wavelet Transform (DTCWT)
Trigon Based Security Protocol
Binarization
url http://ictactjournals.in/paper/Paper_4_652_656_online.pdf
work_keys_str_mv AT ulatha astrongsecurityprotocolagainstfingerprintdatabaseattacks
AT krameshkumar astrongsecurityprotocolagainstfingerprintdatabaseattacks
AT ulatha strongsecurityprotocolagainstfingerprintdatabaseattacks
AT krameshkumar strongsecurityprotocolagainstfingerprintdatabaseattacks
_version_ 1725809138085134336