CFP last date
22 April 2024
Reseach Article

Visual Cryptography Authentication for Locker Systems using Biometric Input

by Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 1
Year of Publication: 2015
Authors: Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru
10.5120/ijca2015906855

Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru . Visual Cryptography Authentication for Locker Systems using Biometric Input. International Journal of Computer Applications. 130, 1 ( November 2015), 15-19. DOI=10.5120/ijca2015906855

@article{ 10.5120/ijca2015906855,
author = { Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru },
title = { Visual Cryptography Authentication for Locker Systems using Biometric Input },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 1 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number1/23173-2015906855/ },
doi = { 10.5120/ijca2015906855 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:02.736259+05:30
%A Siddhesh Urkude
%A Pranjali Vaidya
%A Shagufta Rajguru
%T Visual Cryptography Authentication for Locker Systems using Biometric Input
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 1
%P 15-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Visual Cryptography is an encryption technique that hides information in the images such that it can be decrypted by the human vision if the correct key image is used. This technique divides a secret image into various parts called shares depending on the variation of pixels. Biometrics deals with the automated methods of verifying the identity of a person based on physiological or behavioral characteristics. This project aims to implement visual cryptography and biometric authentication to build a secure locker system. The fingerprint image of a user is considered as a secret image to generate shares that will be distributed among admin database and user. Authentication will take place by comparing the real time fingerprint image of the user and the image generated from the combination of the shares.

References
  1. http://users.telenet.be/d.rijmenants/en/visualcrypto.htm
  2. https://en.wikipedia.org/wiki/Visual_cryptography
  3. http://www.datagenetics.com/blog/november32013/
  4. M. Naor and A. Shamir, "Visual cryptography," Advances in Cryptology - EUROCRYPT'94, pp. 1-12, 1995.
  5. Mizuho Nakajima and Yasushi Yamaguchi, “Extended Visual Cryptography for Natural Images”
  6. Young-Chang Hou, "Visual cryptography for color images," Pattern Recognition, Vol. 36, No. 7, pp. 1619-1629, 2003.
  7. Z. Zhou, G.R. Arce and G. Crescenzo, "Halftone visual cryptography," IEEE Transactions on Image Processing, Vol. 15, No. 8, pp. 2441-2453, 2006.
  8. Nazanin Askari, Cecilia Moloney, Howard M. Heys, “Application of Visual Cryptography to Biometric Authentication”, Electrical and Computer Engineering, Memorial University of Newfoundland St. John’s, Canada, October 19, 2011.
  9. P.S.Revenkar Faculty of Department of Computer Science and Engineering Government College of Engineering, Aurangabad, Maharashtra, India, AnisaAnjum, Department of Computer Science and Engineering Government College of Engineering, Aurangabad, Maharashtra, India, W.Z.Gandhare, Principal of Government College of Engineering, Aurangabad, Maharashtra, India. “Secure Iris Authentication Using Visual Cryptography”. (IJCIS) International Journal of Computer Science and Information Security, Vol. 7, No
  10. Mr. Rohith S, Mr. Vinay G, Department of E&C,NCET, Bangalore, Karnataka, India. “A Novel Two Stage Binary Image Security System Using (2,2) Visual Cryptography Scheme”, International Journal Of Computational Engineering Research / ISSN: 2250–3005 IJCER | May-June 2012 | Vol. 2 | Issue No.3 |642-646 Page 642
  11. Rajeswari Mukeshi, Department of Computer Science and Engineering, Meenakshi College of Engineering, Chennai, India, V.J.Subashini, Department of Computer Applications, Jerusalem College of Engineering, Chennai, India. “Fingerprint Based Authentication System Using Threshold Visual Cryptographic Technique”. IEEE- International Conference on Advances in Engineering, Science and Management(ICAESM-2012), March 30,31, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography Shares Biometrics Authentication Fingerprint (2 2) VC