CFP last date
20 March 2024
Reseach Article

Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression

by Lovelesh Khard, Uday Chourasia, Raju Baraskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 7
Year of Publication: 2017
Authors: Lovelesh Khard, Uday Chourasia, Raju Baraskar
10.5120/ijca2017912976

Lovelesh Khard, Uday Chourasia, Raju Baraskar . Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression. International Journal of Computer Applications. 159, 7 ( Feb 2017), 12-16. DOI=10.5120/ijca2017912976

@article{ 10.5120/ijca2017912976,
author = { Lovelesh Khard, Uday Chourasia, Raju Baraskar },
title = { Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 7 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number7/27012-2017912976/ },
doi = { 10.5120/ijca2017912976 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:07.669212+05:30
%A Lovelesh Khard
%A Uday Chourasia
%A Raju Baraskar
%T Detection of PARD Attack using Key based Biometric Authentication System and Fingerprint Impression
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 7
%P 12-16
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Biometric verification assumes a noteworthy part in security as these are by nature interesting for each human. Be that as it may, the security is traded off when the example coordinating framework is not exact. Verification framework like unique finger impression acknowledgment is most ordinarily utilized biometric validation framework. In this paper overview is done on unique mark acknowledgment strategies. What's more, extraordinary methodologies are examined as far as precision and execution. As unique finger impression may likewise contain clamor; so picture de-noising systems are additionally concentrated Cross edge recurrence examination of finger impression pictures is performed by method for factual measures and weighted mean stage is ascertained. These distinctive components alongside edge unwavering quality or edge focus recurrence are given as contributions to a fluffy c-implies classifier.

References
  1. D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
  2. R. Derakhshani, S.A.C. Schuckers, L.A. Hornak, and L.O. Gorman, “Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners”, Pattern Recognition, vol. 36, pp. 383-396, 2003.
  3. N.K. Ratha, J.H. Connell, and R.M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
  4. S. Pankanti and M.M. Yeung, “Verification watermarks on fingerprint recognition and retrieval”, Proc. SPIE EI,vol. 3657, pp. 66-78, 1999.
  5. A.K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, “FingerCode: A filterbank for fingerprint representation and matching”, Proc. IEEE Conf. on Computer Vision and Pattern Recognition, vol. 2, pp. 187-193, 1999.
  6. A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An identity authentication system using fingerprints”, Proc. IEEE, vol. 85, no. 9, Sept. 1997, pp. 1365-1388.
  7. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of artificial 'gummy' fingers on fingerprint systems," in Proceedings of SPIE, Jan 2002, vol. 4677
  8. Reza Derakshani, Stephanie Schuckers, Larry Hornak, and Lawrence Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners,"Pattern Recognition Journal, vol. 36, no. 2, 2003
  9. A Jain, L Hong, and R Bolle, "On-line fingeroint verification,"IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no.4, pp. 302-314, 1997.
  10. A Jain, L Hong, and R Bolle, "On-line fingeroint verification,"IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302-314, 1997.
  11. M.Bellare, D. Pointcheval, and P. Rogaway, “Authenticated Key Exchange Secure Against Dictionary Attacks,” Advances in Cryptolog Eurocrypt ’00, 2000 pp. 139-155.
Index Terms

Computer Science
Information Sciences

Keywords

Component formatting style styling insert