Call for Paper - March 2020 Edition
IJCA solicits original research papers for the March 2020 Edition. Last date of manuscript submission is February 20, 2020. Read More

Amended Biometric Authentication using Secret Sharing

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 98 - Number 21
Year of Publication: 2014
Janhavi Sirdeshpande
Sonali Patil

Janhavi Sirdeshpande and Sonali Patil. Article: Amended Biometric Authentication using Secret Sharing. International Journal of Computer Applications 98(21):28-32, July 2014. Full text available. BibTeX

	author = {Janhavi Sirdeshpande and Sonali Patil},
	title = {Article: Amended Biometric Authentication using Secret Sharing},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {98},
	number = {21},
	pages = {28-32},
	month = {July},
	note = {Full text available}


Visual cryptography is a secret sharing scheme where a secret image gets divided into number of pieces called shares and not a single share disclose any information about secret image. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyze the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. The addition in number of users increases the size of the database which affects space and time complexity. The intent of this paper is to overcome these issues by applying (2, 2) visual cryptography for amend biometric authentication. The experimental results show great reduction in space and time complexity.


  • Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
  • Noar M. , Shamir A. , 1995. Visual cryptography. Advances in Cryptography. Eurocrypt'94, Lecture Notes in Computer Science, vol. 950, Springer-Verlag. 1 – 12.
  • Jain A. , Hong L. , Pankanti S. , Bolle R. ,. An Identity Authentication System Using fingerprints. Department of Computer Science, Michigan State University, USA. 1997,pp 1- 66.
  • C. C. Wu, L. H. Chen, "A Study On Visual Cryptography", Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R. O. C. , 1998.
  • Wu, HC and Chang, CC, "Sharing Visual Multisecrets Using Circle Shares," Computer Standards & Interfaces, Vol. 28, pp. 123-135. 373, 2005.
  • Y. V. Subba Rao, Ms. Yulia Sukonkina "Fingerprint based authentication application using visual cryptography methods (Improved ID card),' , IEEE TENCON 2008, pp 1-5.
  • N. Askari, C. Moloney, H. M. Heys "Application of Visual Cryptography to Biometric Authentication", Newfoundland Electrical and Computer Engineering conference, 2011
  • Mrs. A. Vinodhini, M. Premchand, M. Natarajan "Visual Cryptography Using Two Factor Biometric system for Trust Worthy Authentication", IJSRP 2012, vol. 2, Issue 3.
  • R. Mukesh, V. J. Subashini "Fingerprint based authentication System Using Threshold Visual Cryptographic Technique", IEEE ICAESM 2012
  • Sonali Patil and Prashant deshmukh, "An Explication of Multifarious Secret Sharing Schemes", International Journal of Computer Applications (0975 – 8887), Volume 46– No. 19, May 2012
  • Sonali Patil, Janhavi Sirdeshpande and Kapil Tajane, "Analysing Secure Image Secret Sharing Schemes based on Steganography", International Journal of Computer Engineering and Technology, Volume 4, Issue 2, pp. 172-178, March-April 2013
  • Sonali Patil, Kapil Tajane and Janhavi Sirdeshpande, "Secret Sharing Schemes for Secure Biometric Authentication", International Journal of Scientific & Engineering Research, Volume 4, Issue 6, ISSN 2229-5518 June-2013
  • Sonali Patil and Prashant Deshmukh, "Enhancing Security in Secret Sharing with Embedding of Shares in Cover Images", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 5, ISSN (Online) : 2278-1021, ISSN (Print) 2319-5940 May 2014