CFP last date
20 May 2024
Reseach Article

Secured User Authentication using Encrypted Palmprint

Published on July 2015 by T. P. Kamatchi, K. Gokila Meena
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 3
July 2015
Authors: T. P. Kamatchi, K. Gokila Meena
7bbd6dd7-2b39-4ddb-afea-ef8316013a6e

T. P. Kamatchi, K. Gokila Meena . Secured User Authentication using Encrypted Palmprint. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 3 (July 2015), 25-29.

@article{
author = { T. P. Kamatchi, K. Gokila Meena },
title = { Secured User Authentication using Encrypted Palmprint },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 3 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 25-29 },
numpages = 5,
url = { /proceedings/icict2015/number3/21472-1507/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A T. P. Kamatchi
%A K. Gokila Meena
%T Secured User Authentication using Encrypted Palmprint
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 3
%P 25-29
%D 2015
%I International Journal of Computer Applications
Abstract

Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of are biometric technologies that identify and authenticate faces, hands, palmprints, fingers, signatures, irises, voices, and fingerprints. The biometric data whenever transmitted across the network can be stolen and misused, which provides a fear over the personal privacy. In order to provide personal privacy over palmprints we propose an idea using encryption scheme over the image. In this paper, the palmprint images are obtained from the user, then encrypted and stored in the database server thereby the personal privacy of palmprints can be provided.

References
  1. A. Gyaourova and A. Ross, A Novel coding scheme for indexing fingerprint patterns" Proceedings of S+SSPR Workshop, December 2008
  2. J. Dai, J. Feng, J. Zhou, "Robust and Efficient Ridge-Based Palmprint Matching," IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 34, No. 8, pp. 0162-8828, August 2012
  3. Jiaa, Huanga and Zhang, "Palmprint Verification based on robust line orientation code" Science Direct, May 2008
  4. D. Huang, W. Jia, and D. Zhang, "Novel algorithm for the automatic classification of low-resolution palmprints", IJARCSSE, January 2014
  5. D. Zhang, W. K. Kong, J. You, M. Wong, "Online Palmprint Identification," IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 25, No. 9, pp. 0162-8828,September 2003
  6. J . You, W. Kong, D. Zhang, and K. Cheung, "On hierarchical palmprint coding with multiple features for personal identification in large databases," IEEE Trans. Circuits Syst. Video Technol. , vol. 14, no. 2,pp. 234–243, February 2009
  7. W. Li, J. You, and D. Zhang, "An effective indexing and searching scheme for an image database" , IJDL, 1997
  8. S. M. Prasad, V. K. Govindan , P. S. Sathidevi, "Palmprint Authentication Using Fusion of Wavelet Based Representations," IEEE, pp. 978-1-4244-5612-3, 2009
  9. Cappelli, Ferrara, Maio, "High resolution Palmprint Recognition System", IEEE, June 2012
  10. ShikhaWadha and Monika Malhotra, "Enhancing security in palmprint recognition systems using Encryption algorithms" International Journal of Engineering and Computer Science, June 2014
  11. David Zhang, Guangminglu, Lei Zhang and Nan Luo, "Palmprint Recognition using 3D Information", IEEE, August 2009
  12. Wei Li Zhang, D. ; Zhang, D. ; Guangming Lu ; Jingqi Yan "Efficient joint 2D and 3D palmprint matching with alignment refinement", IEEE, June 2010
  13. Naidu Swathi, Chemudu Satish, Vaddi Seshu Satyanarayana, Pillem Ramesh, Hanumakumar, NareshBhuma, CH. Himabin du, "New palm print authentication system by Using wavelet based method" , AIRCCSE, March 2011
  14. Nageshkumar, Mahesh. PK and M. N. ShanmukhaSwamy, "An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image", IEEE, June 2009
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Cryptography Public-key Cryptography Revocability Security Encryption