CFP last date
20 May 2024
Reseach Article

VC of IRIS Images for ATM Banking

by S. Koteswari, P. John Paul, S. Indrani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 18
Year of Publication: 2012
Authors: S. Koteswari, P. John Paul, S. Indrani
10.5120/7445-0198

S. Koteswari, P. John Paul, S. Indrani . VC of IRIS Images for ATM Banking. International Journal of Computer Applications. 48, 18 ( June 2012), 1-5. DOI=10.5120/7445-0198

@article{ 10.5120/7445-0198,
author = { S. Koteswari, P. John Paul, S. Indrani },
title = { VC of IRIS Images for ATM Banking },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 18 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number18/7445-0198/ },
doi = { 10.5120/7445-0198 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:23.168628+05:30
%A S. Koteswari
%A P. John Paul
%A S. Indrani
%T VC of IRIS Images for ATM Banking
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 18
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

It is of great importance over a past few years, the increasing concern to preserve the privacy of biometric data over personal information that is stored in computer systems. It mostly has increased interest in data security. For possible use in biometric identification and protection, in this paper it applies visual cryptography(VC) which is a perfectly secured method of maintaining image security. The basic concept of visual cryptography is to divide secret images in to random shares using key and decryption is performed by superimposing the shares using the similar key which is used at encryption side. In this process it required special software for cryptographic computations and in this paper it is implemented using mat lab 7. 9. A modified version of pixel sieve method is proposed in this paper for iris images to achieve more security than existing pixel sieve method. It is the modified version of pixel and is based on key shifting scheme. The simulations results show that the quality of the encrypted and decrypted images is better than existing pixel sieve method.

References
  1. Daugman, J. , "Complete Discrete 2-D Gabor Transforms by Neural Networks for Image Analysis and Compression", IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. 36, no. 7, July 1988, pp. 1169-1179
  2. Daugman, J. "How Iris Recognition Works", available at http://www. ncits. org/tc_home/m1htm/docs/m1020044. pdf.
  3. Daugman, J. , "High Confidence Visual Recognition of Persons by a Test of Statistical Independence,"IEEE transactions on pattern analysis and machine intelligence, vol. 15, no. 11, November 1993, pp. 1148-1161.
  4. . An improved pixel sieve method for visual cryptography by vaibhav choudhary et al.
  5. Biometric data security using recursive visual cryptography,by lakshmi madhuri. K et al
  6. Gonzalez, R. C. , Woods, R. E, Digital Image Processing, 2rd ed. , Prentice Hall (2002).
  7. Lim, S. , Lee, K. , Byeon, O. , Kim, T, "Efficient Iris Recognition through Improvement of Feature Vector and Classifier", ETRI Journal, Volume 23, Number 2, June 2001, pp. 61-70.
  8. C. H Daouk,F. D. Kammoun"Iris Recognition", IEEE ISSPIT 2002,pp. 558-562
  9. P. John Paul , P. N. Girija, "A High Performance Novel Image Compression Technique using Hybrid Transform for Multimedia Applications" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 4, April 2011. pp119-125
  10. Wildes, R. P, "Iris Recogntion: An Emerging Biometric Technology", Proceedings of the IEEE, VOL. 85, NO. 9, September 1997, pp. 1348-1363
  11. Moni Naor and Adi Shamir. Visual Cryptography, EUROCRYPT 1994, ppl- 12.
  12. Shamir, Adi. "How to share a secret". Communications of the ACM 22 (II): 1979,6 12-613.
  13. A. Incze, "Pixel Sieve method for secret sharing & visual cryptography". 9th RoEduNet IEEE International Conference 2010.
  14. P. S. Revenkar, Anisa Anjum, W . Z. Gandhare. " Survey of Visual Cryptography Schemes ". International Journal of Securityand Its Applications ,Vol. 4, No. 2, April, 2010.
  15. Peng Chungan, Cao Xixin, Yu Dunshan, Zhang Xing, "A 250MHz optimized distributed architecture of 2D 8x8 DCT," 7th International Conference on ASIC, pp. 189 – 192, Oct. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography (vc) Iris Image Dct Dht Key Shifting Encryption Decryption