A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints informatio...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2013-08-01
|
Series: | ICTACT Journal on Image and Video Processing |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/Paper_4_652_656_online.pdf |
id |
doaj-6b2a1e29f74e4583843096c990d9f33b |
---|---|
record_format |
Article |
spelling |
doaj-6b2a1e29f74e4583843096c990d9f33b2020-11-24T22:10:08ZengICT Academy of Tamil NaduICTACT Journal on Image and Video Processing0976-90990976-91022013-08-0141652656A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKSU. Latha0K. Ramesh Kumar1Department of Information Technology, Dhaanish Ahmed College of Engineering, IndiaDepartment of Information Technology, Hindustan University, IndiaThe Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.http://ictactjournals.in/paper/Paper_4_652_656_online.pdfFingerprint ReconstructionComplex Wavelet Transform (CWT)2D Dual Tree Complex Wavelet Transform (DTCWT)Trigon Based Security ProtocolBinarization |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
U. Latha K. Ramesh Kumar |
spellingShingle |
U. Latha K. Ramesh Kumar A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS ICTACT Journal on Image and Video Processing Fingerprint Reconstruction Complex Wavelet Transform (CWT) 2D Dual Tree Complex Wavelet Transform (DTCWT) Trigon Based Security Protocol Binarization |
author_facet |
U. Latha K. Ramesh Kumar |
author_sort |
U. Latha |
title |
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
title_short |
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
title_full |
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
title_fullStr |
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
title_full_unstemmed |
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
title_sort |
strong security protocol against fingerprint database attacks |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Image and Video Processing |
issn |
0976-9099 0976-9102 |
publishDate |
2013-08-01 |
description |
The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process. |
topic |
Fingerprint Reconstruction Complex Wavelet Transform (CWT) 2D Dual Tree Complex Wavelet Transform (DTCWT) Trigon Based Security Protocol Binarization |
url |
http://ictactjournals.in/paper/Paper_4_652_656_online.pdf |
work_keys_str_mv |
AT ulatha astrongsecurityprotocolagainstfingerprintdatabaseattacks AT krameshkumar astrongsecurityprotocolagainstfingerprintdatabaseattacks AT ulatha strongsecurityprotocolagainstfingerprintdatabaseattacks AT krameshkumar strongsecurityprotocolagainstfingerprintdatabaseattacks |
_version_ |
1725809138085134336 |