We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Secured Biometric Authentication using Visual Cryptography and Transforms

by Priya Pradeep Bhirud, Nandana Prabhu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 8
Year of Publication: 2013
Authors: Priya Pradeep Bhirud, Nandana Prabhu
10.5120/13415-1081

Priya Pradeep Bhirud, Nandana Prabhu . Secured Biometric Authentication using Visual Cryptography and Transforms. International Journal of Computer Applications. 77, 8 ( September 2013), 23-28. DOI=10.5120/13415-1081

@article{ 10.5120/13415-1081,
author = { Priya Pradeep Bhirud, Nandana Prabhu },
title = { Secured Biometric Authentication using Visual Cryptography and Transforms },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 8 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number8/13415-1081/ },
doi = { 10.5120/13415-1081 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:49:44.651013+05:30
%A Priya Pradeep Bhirud
%A Nandana Prabhu
%T Secured Biometric Authentication using Visual Cryptography and Transforms
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 8
%P 23-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is secured by using a technique called Visual Cryptography (VC). In this technique, iris image is embedded in cover image and then using wavelet transform this output image is decomposed into four shares. These four shares are compressed at sender site. At receiver side, to obtain original iris image inverse DWT is obtained and finally bit matching procedure has been applied. The result shows that Stegnography and Visual cryptography implementation on biometrics, secures Iris and related textual information from getting identity forged. In comparison with existing approach quality of final watermarked cover images and Iris has been maintained which could be used for matching of it for authentication. Along with quality, goal of higher security and bandwidth reduction by reducing size of shares is achieved. Also technique of three least significant bits applied successfully that allows secret message of increased length by maintaining quality of Iris.

References
  1. Mrs. D. Mathivadhani1, Dr. C. Meena,"Biometric based Authentication using Visual cryptography and Wavelet Transform", IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011. 978-1-4577-0590-8/11/$26. 00 ©2011 IEEE. June 3-5 , 2011
  2. Yunhong Wang, Yong Zhu, Tieniu Tan, "BIOMETRIC PERSONAL IDENTIFICATION BASED ON IRIS PATTERN", ACTA AUTOMATICA SINICA, 2002, 28 (1): 1-10(in Chinese).
  3. Chang, C. , Tsai, C. and Chen, T. (2000) A new scheme for sharing secret colour images in computer network, Proceedings of International Conference on Parallel and Distributed Systems, Pp. 21–27.
  4. Chang, C. C. and Yu, T. X. (2002) Sharing a Secret Gray Image in Multiple Images, in the Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Pp. 230-237.
  5. Chang, C. C. , Wang, Z. H. and Yin, Z. X. (2009) An Ingenious Data Hiding Scheme for Colour Retinal Image, Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT '09) Huangshan, P. R. China, Pp. 1-6.
  6. Daugman J and Downing C (2001) Epigenetic randomness, complexity, and singularity of human iris patterns, Proceedings of the Royal Society, B, 268, Biological Sciences, Pp 1737 - 1740.
  7. Dharwadkar, N. V. , Amberker, B. B. and Joshi, S. R. (2010) Visual Cryptography for Color Image using Color Error Diffusion, ICGST - GVIP Journal, Vol. 10, Issue 1, Pp. 1-8.
  8. Dobes, M. and Machala, L. (2010) Iris Database, http://www. inf. upol. cz/iris.
  9. Hartung, F. and Kutter, M. (1999) Multimedia Watermarking Techniques, Proc. of IEEE, Tutorial, Survey, and Special Issue onData Hiding & Security, pp. 1079-1107.
  10. Hou, Y. C. (2003) Visual cryptography for color images, Pattern Recognition, Vol. 36, Issue 7, Pp. 1619-1629
  11. Kurak, C. and McHugh, J. (1992) A Cautionary Note on Image Downgrading, Proceedings of IEEE 8th Annual Computer Security Applications Conference. San Antonio, USA, Pp. 153-155.
  12. Lin, C. (2000) Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection, PhD Thesis, Columbia University.
  13. Naor, M. and Pinkas, B. (1997) Visual authentication and identification, Advances in Cryptology CRYPTO'97, Lecture Notes in Computer Science, Vol. 1294, Pp. 322–336.
  14. Yang, C. N. (2010) Visual cryptography: An introduction to visual secret sharing schemes, Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng, Hualien 974, TAIWAN, Last accessed on July 04, 2010, http://sna. csie. ndhu. edu. tw/~cnyang/vss/sld001. htm
  15. Verheul, E. and Tilborg, H. V. (1997) Constructions and properties of kout of n visual secret sharing schemes, Designs, Codes and Cryptography, Vol. 11, No. 2, Pp. 179-196.
  16. Yang, C. and Laih, C. (2000) New colored visual secret sharing schemes. Designs, Codes and Cryptography, Vol. 20, Pp. 325–335.
  17. Youmaran, R. , Adler, A. , Miri, A. , (2006) An Improved Visual Cryptography Scheme For Secret Hiding, 23rd Biennial Symposium on Communications, pp. 340-343
  18. Phoenix library for Iris Images. http://www. phoenix. inf. upol. c/Iris/
  19. Gonzalez Image Processing with matlab codes . Second edition.
  20. Wikipedia http://en. wikipedia. org/wiki/Cryptography
  21. Kekare's database
Index Terms

Computer Science
Information Sciences

Keywords

Selected Least Significant Bit (SLSB) Method LSB Visual Cryptography Wavelet Decomposition