We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Amended Biometric Authentication using Secret Sharing

by Janhavi Sirdeshpande, Sonali Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 21
Year of Publication: 2014
Authors: Janhavi Sirdeshpande, Sonali Patil
10.5120/17308-7770

Janhavi Sirdeshpande, Sonali Patil . Amended Biometric Authentication using Secret Sharing. International Journal of Computer Applications. 98, 21 ( July 2014), 28-32. DOI=10.5120/17308-7770

@article{ 10.5120/17308-7770,
author = { Janhavi Sirdeshpande, Sonali Patil },
title = { Amended Biometric Authentication using Secret Sharing },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 21 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number21/17308-7770/ },
doi = { 10.5120/17308-7770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:48.159855+05:30
%A Janhavi Sirdeshpande
%A Sonali Patil
%T Amended Biometric Authentication using Secret Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 21
%P 28-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyze the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. The addition in number of users increases the size of the database which affects space and time complexity. The intent of this paper is to overcome these issues by applying (2, 2) visual cryptography for amend biometric authentication. The experimental results show great reduction in space and time complexity.

References
  1. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
  2. Noar M. , Shamir A. , 1995. Visual cryptography. Advances in Cryptography. Eurocrypt'94, Lecture Notes in Computer Science, vol. 950, Springer-Verlag. 1 – 12.
  3. Jain A. , Hong L. , Pankanti S. , Bolle R. ,. An Identity Authentication System Using fingerprints. Department of Computer Science, Michigan State University, USA. 1997,pp 1- 66.
  4. C. C. Wu, L. H. Chen, "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R. O. C. , 1998.
  5. Wu, HC and Chang, CC, "Sharing Visual Multisecrets Using Circle Shares," Computer Standards & Interfaces, Vol. 28, pp. 123-135. 373, 2005.
  6. Y. V. Subba Rao, Ms. Yulia Sukonkina "Fingerprint based authentication application using visual cryptography methods (Improved ID card),' , IEEE TENCON 2008, pp 1-5.
  7. N. Askari, C. Moloney, H. M. Heys "Application of Visual Cryptography to Biometric Authentication", Newfoundland Electrical and Computer Engineering conference, 2011
  8. Mrs. A. Vinodhini, M. Premchand, M. Natarajan "Visual Cryptography Using Two Factor Biometric system for Trust Worthy Authentication", IJSRP 2012, vol. 2, Issue 3.
  9. R. Mukesh, V. J. Subashini "Fingerprint based authentication System Using Threshold Visual Cryptographic Technique", IEEE ICAESM 2012
  10. Sonali Patil and Prashant deshmukh, "An Explication of Multifarious Secret Sharing Schemes", International Journal of Computer Applications (0975 – 8887), Volume 46– No. 19, May 2012
  11. Sonali Patil, Janhavi Sirdeshpande and Kapil Tajane, "Analysing Secure Image Secret Sharing Schemes based on Steganography", International Journal of Computer Engineering and Technology, Volume 4, Issue 2, pp. 172-178, March-April 2013
  12. Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, "Secret Sharing Schemes for Secure Biometric Authentication", International Journal of Scientific & Engineering Research, Volume 4, Issue 6, ISSN 2229-5518 June-2013
  13. Sonali Patil and Prashant Deshmukh, "Enhancing Security in Secret Sharing with Embedding of Shares in Cover Images", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 5, ISSN (Online) : 2278-1021, ISSN (Print) 2319-5940 May 2014
Index Terms

Computer Science
Information Sciences

Keywords

Minutiae extraction PIN SSIM Visual cryptography.