Securing the Images Using Biometric Cryptography Technique
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Issue 2013 by IJCTT Journal|
|Volume-4 Issue-3 |
|Year of Publication : 2013|
|Authors :K.Nandakumar, D.Prabakar, Dr.S.Karthik|
K.Nandakumar, D.Prabakar, Dr.S.Karthik "Securing the Images Using Biometric Cryptography Technique"International Journal of Computer Trends and Technology (IJCTT),V4(3):253-257 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work explores the possibility of using visual cryptography without pixel expansion for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a private face image is dithered into two host face images that are stored in two separate database servers such that the private image can be revealed only when both sheets are simultaneously available; at the same time, the individual sheet images do not reveal the identity of the private image.
 Agrawal. N and Savvides. M, (2009), “Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,” in Proc. Computer Vision and Pattern Recognition, vol. 0, pp. 85–92.
 Anil K. Jain and Umut Uludag, (2008), “Hiding Biometric Data”, IEEE Trans. Pattern Analysis And Machine Intelligence, Vol. 25, No. 11.
 Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, (2008), “Biometric Template Security”, EURASIP Journal on Advances in Signal Processing.
 Arun Ross and Asem Othman, (2011), “Visual Cryptography for Biometric Privacy,” IEEE trans. Information forensics and security, vol. 6, no. 1.
 Ateniese.G, Blundo.C, Santis.A, and Stinson.D, (2010), “Extended capabilities for visual cryptography,” Theor. Comput. Sci., vol. 250, no. 1–2, pp. 143–161.
Keywords— Multiple Secrets, Depth-equalization, Pixel Expansion.