Biometric Fingerprint Combination to Improve AnonymityProtection
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Fingerprint techniques are widely used in authentication systems, therefore its privacy protectionbecomes an important issue. Securing a stored fingerprint template is very important because once fingerprintsare compromised, it cannot be easily revoked. So, we review here a new system for preserving fingerprintconfidentiality. In this system, the fingerprint privacy is maintained by combining two different fingerprints intoa new identity. In the enrollment phase, two fingerprints are taken from two different fingers. We obtain theminutiae positions of one fingerprint, the orientation of another fingerprint, and the reference points from bothfingerprints. Based on the obtained information, a combined minutiae template is generated and stored in adatabase. In the authentication phase, we use the fingerprints of the same fingers that are already used inenrollment phase. For matching the two query fingerprints against a combined minutiae template, a two-stagefingerprint matching process is used. By storing the combined minutiae template in the database, the completeminutiae characteristic of a single fingerprint will not be compromised when the database is stolen by theattackers. The attacker cannot distinguish a combined minutiae template from the original minutiae templatesas there is a similarity in topology. The combined minutiae template is converted into a real-look alikecombined fingerprint by using existing fingerprint reconstruction approach. This results into a new virtualidentity for the two different fingerprints. This new virtual identity can be matched using minutiae-basedfingerprint matching algorithms. The main objective of this paper is to review the fingerprint privacy protectionschemes
Authors and Affiliations
Urmila M. Sawant , Kalyan K. Pattekar , Prof. S. D. Sapkal , Dr. R. R. Deshmukh
Performance Comparison of Transport Layer Protocols for Multimedia Application in Wired Networks
Abstract: In this paper, we present to discuss the performance of transport layer protocols for multimedia application in the wired network. More precisely, TCP and UDP Performance are evaluated then compared. Two scenar...
A Survey of the Internet of Things
Abstract: This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of in...
Secure Group Key Management using Ciphertext in MANETs
Abstract: The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted com...
Privacy-Preserving Public Auditing For Secure Cloud Storage
Abstract: By using Cloud storage, users can access applications, services, software whenever they requires over the internet. Users can put their data remotely to cloud storage and get benefit of on-demand services...
Detection of Network Intrusion and Countermeasure Selection in Cloud Systems
Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful...