A Review on Security of Fingerprint Template Using Fingerprint Mixing
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 10, Issue 8
Abstract
Biometric recognition systems are becoming powerful means for automatic personal recognition. Nowadays, fingerprints are widely used in biometric recognition systems. In the 21 st century, having your identity stolen is no longer just a fear; it's a reality. Hence it is necessary to mitigate concerns related to data sharing and data mis use. In this method , two fingerprint from different finger are mixed to generate the new fingerprint image. Then each component is decomposed into continuous component and spiral component. Then after pre-aligning each component of fingerprint image, the continuous component of one fingerprint is combined with spiral component of other fingerprint image and vice-versa. (a) It can be used to obscure the information present in an individual fingerprint image prior to storing it in a central database.(b) mixing different fingerprint with the same fingerprint results in different identities, and (c) and is used to generate virtual identities by mixing two different fingerprint.
Authors and Affiliations
Jayashree Sonar , Mr. S. O. Dahad
Design of Convolutional Codes for varying Constraint Lengths
Convolutional codes play a vital role in wireless communication with the increase in usage of low-latency applications operating at high data rates. As the current technologies demand high data rates, the de...
Semantic Annotation and Search for Educational Resources Supporting Distance Learning
Multimedia educational resources play an important role in education, particularly for distance learning environments. With the rapid growth of the multimedia web, large numbers of education articles video resources are...
Optimization of Cost in Cloud Computing Using OCRP Algorithm
In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. Reservation plan is cheaper than that provisioned by on-demand p...
Cascaded Multilevel Inverter with PWM Control Method
A hybrid cascaded multilevel inverter with PWM method is presented in this paper. It consists of a standard 3-leg inverter (one leg for each phase) and Hbridge in series with each inverter leg. It can use only a...
Design of Low Power One-Bit Hybrid-CMOS Full Adder Cells
The aim of our work is to evaluate the performance of One-bit Hybrid full adder cell. To achieve a good-drivability, noise-robustness, and low energy operations for deep-sub micrometer, we explore Hybrid-CMOS sty...