Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 12
Abstract
In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parity Checker Method ensures that the change in Biometric Template should be minimum. The watermark that is embedded in the Biometric Template may contain person’s name, person’s address or some unique features of the person. The same watermark is embedded four times in the Biometric Template to enhance its security so that if one watermark is changed by attacker,the other watermark remains intact. For each biometric template there will be a secret key that is used for embedding of watermark. The maintenance of secret key will be responsibility of database manager. The same key can be used for all biometric templates which reduces the responsibility of database manager up to a greater extent but at the cost of security. So, we used the separate key for each Biometric Template.
Authors and Affiliations
Rajkumar Yadav , Kamaldeep , Ravi Saini
Comprehensive Survey on DDOS attack with its mitigation Techniques
The remarkable development and accomplishment of Internet has changed the way customary vital administrations, for example, managing an account, transportation, prescription, training and guard are worked. Presently they...
A Survey on Performance Testing Approaches of Web Application and Importance of WAN Simulation in Performance Testing
In today’s era of internet most of the applications developed are either web applications or web interface is provided to the applications. In either of the cases it’s very much critical for developers of such applicatio...
A Permutation Gigantic Issues in Mobile Real Time Distributed Database : Consistency & Security
Several shape of Information System are broadly used in a variety of System Models. With the rapid development of computer network, Information System users concern more about data sharing in networks. In conventional re...
The role of Ethics in the process of Technology Transfer and Development of 206 Peugeot
Looking at the past history we find that the first phenomenon of technology transfer was taught by people who were traveling to another community and bring their technology, they move. After the industrialization, transf...
Chairperson and Secretarius Meeting Guides for Electronic Meeting Direction
Facilitation and guidance of computer-supported meetings is a well-known activity that can be supported electronically. Various forms of facilitator support have been developed over the years. This paper presents a uniqu...