CFP last date
20 December 2024
Reseach Article

Authentication using Hashed Fingerprint

by Kawther A. Sallal, Salah M. Darwash
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 28
Year of Publication: 2018
Authors: Kawther A. Sallal, Salah M. Darwash
10.5120/ijca2018916677

Kawther A. Sallal, Salah M. Darwash . Authentication using Hashed Fingerprint. International Journal of Computer Applications. 180, 28 ( Mar 2018), 24-27. DOI=10.5120/ijca2018916677

@article{ 10.5120/ijca2018916677,
author = { Kawther A. Sallal, Salah M. Darwash },
title = { Authentication using Hashed Fingerprint },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 180 },
number = { 28 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number28/29154-2018916677/ },
doi = { 10.5120/ijca2018916677 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:02:04.021420+05:30
%A Kawther A. Sallal
%A Salah M. Darwash
%T Authentication using Hashed Fingerprint
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 28
%P 24-27
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the great increase in information technology systems where user authentication is needed, security in those systems relies on using PINs or passwords. During the last years, the scientific community is trying to improve biometric techniques to be accepted as an alternative to other user authentication schemes. Fingerprints are the oldest and most widely used form of biometric identification. local and global features are important features in fingerprint images used for classification and matching purposes. The main goal of this work is using the fingerprint technology to generate a number of hashes that can be used for identifying person identity and authentication purposes. local and global features has been used to obtain a robust recognition system where a robust algorithm is used to extract these features accurately. The orientation and flow of ridges is used as the key factors for processing to avoid eliminating true features. Then, the hashing concept has been applied on the calculated distance between each feature extracted inside the region of interest and the core point. Finally, the extracted hash values is compared with those stored in the database. It is shown by the experiments that the presented verification system improves the features extraction accuracy and the performance of the matching process.

References
  1. Jean-Christophe P., “Biometrics: Fingerprint Identification System”, M.Sc. Thesis, Institute for Computer Science Carleton University, Ottawa, Ontario, November 2011.
  2. Second Asian applied computing conference, “applied computing, Nepal, 2005, Springer.
  3. Mithun D.,Kangkhita K., Shamima Y., “ATM Transaction Security Using Fingerprint Recognition”, American Journal of Engineering Research, Volume-6, Issue-8, pp-41-45, 2017.
  4. Uludag U., Pankanti S., Prabhakar S., and Jain A., “Biometric Cryptosystems: Issues and Challenges”, Proceedings of the IEEE, vol.92, no. 6, June 2004.
  5. Prabhakar, S., Wang, J., Jain, A. K., Pankanti, S., and Bolle, R., "Minutiae verification and classification for fingerprint matching", In Proc. 15th International Conference Pattern Recognition (ICPR) (September 2000), vol. 1, pp. 25–29.
  6. Ross, A., Jain, A., and Reisman, J. A., "hybrid fingerprint matcher", Pattern Recognition 36, 7 (July 2003), 1661–1673.
  7. Fuliang W., “The Implementation of A Fingerprint Enhancement System Based on GPU via CUDA”, Master thesis of Science in Electrical Engineering, Blekinge Institute of Technology, Sweden, 2017.
  8. Louisa L., Seong L., and Ching Y., “Thinning Methodologies – A Comprehensive Survey”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 9, p. 879, September 1992.
  9. Jason A., “The Basics of Information Security” 2nd edition, Elsevier, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Fingerprints Feature Extraction singular point Hash Function and Authentication