“Enhancing Iris Scanning Using Visual Cryptography”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic orbehavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniquesamong all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris.For authentication, the feature template in the database and the user template should be the same. Storing thetemplate in the database securely is not a secure approach, because it can be stolen. To deal with this securityissue, in our paper a new method for securely storing the template in the database is proposed.Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scannedimage is divided into different parts i.e. called as shares; these shares are stored in the database. The proposedVisual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. Inour proposed system, we present a powerful approach of iris recognition. It uses an improved circular Houghtransform to detect the inner boundary.
Authors and Affiliations
Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur
Identifiying the Authorised User by Typing Speed Comparison
Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users....
Image De-noising By Decision Based Expanded Window Median Filter Using Multiple Scanning
Abstract: This paper proposes a new filter for noisy imagescorrupted with salt and pepper noise which are caused due to flaws in sensor, transmission. Proposed algorithm (Decision Based Expanded Window Median Filte...
Secure and Efficient Key Management Scheme in MANETs
Abstract: InMobile ad hoc networks (MANETs) security has become a primary requirements. Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentia...
Bandwidth Assurance Using Energetic Fusion Channel In Ad-Hoc Networks
Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and vigorous Internet access. Improving user throughput is a primary objective in a WMN. The system focus on wireless networks with ina...
Regression Test Case Selection &PrioritizationUsing Dependence Graph and Genetic Algorithm
Abstract: Regression testing is very important process in software maintenance. Unfortunately, it iscostly and time consumingto allow for the re-execution of all test cases during regression testing. The challenge...