International Conference on Innovations in Computing Techniques (ICICT 2015) |
Foundation of Computer Science USA |
ICICT2015 - Number 3 |
July 2015 |
Authors: T. P. Kamatchi, K. Gokila Meena |
7bbd6dd7-2b39-4ddb-afea-ef8316013a6e |
T. P. Kamatchi, K. Gokila Meena . Secured User Authentication using Encrypted Palmprint. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 3 (July 2015), 25-29.
Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of are biometric technologies that identify and authenticate faces, hands, palmprints, fingers, signatures, irises, voices, and fingerprints. The biometric data whenever transmitted across the network can be stolen and misused, which provides a fear over the personal privacy. In order to provide personal privacy over palmprints we propose an idea using encryption scheme over the image. In this paper, the palmprint images are obtained from the user, then encrypted and stored in the database server thereby the personal privacy of palmprints can be provided.