“Enhancing Iris Scanning Using Visual Cryptography”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Biometric technique consists of uniquely identifying person based on their physical characteristic orbehavioral characteristic. It is mainly used for authentication. Iris sacnning is one of the most secure techniquesamong all biometrics because of its uniqueness and stability i.e. no two persons in the world can have same iris.For authentication, the feature template in the database and the user template should be the same. Storing thetemplate in the database securely is not a secure approach, because it can be stolen. To deal with this securityissue, in our paper a new method for securely storing the template in the database is proposed.Visual Cryptography (VC) concept is used in our proposed system. Using Visual Cryptography concept scannedimage is divided into different parts i.e. called as shares; these shares are stored in the database. The proposedVisual Cryptography will generate meaningful shares which overcomes the problem in traditional methods. Inour proposed system, we present a powerful approach of iris recognition. It uses an improved circular Houghtransform to detect the inner boundary.
Authors and Affiliations
Anuja Pawar, Trupti Kumbhare, Pradnya Murkute, Prof. Sneha kallapur
Renal Calculi Detection in Ultrasound images and Diagnosis of Images using Image Segmentation
Abstract: Now-a-days Renal Calculi is becoming a most common disease in both men and women. Calculi are due to abnormal collection of certain chemicals like oxalate, phosphate and uric acid. These calculi can be pr...
Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be...
Segmentation of Lung Tumor in CT Scan Images using FA-FCM Algorithms
Abstract: Lung Cancer is dangerous disease that cause most human to death at early age and it is an uncontrolled cell growth in tissues on the lung. Many algorithms and technologies are introduced for identifying the lun...
Off-Line Signature Verification Using Principal ComponentVariances
Abstract: Signature verification system is always the most sought after biometric verification system. Being abehavioral biometric feature which can always be imitated, the researcher faces a challenge in designing...
Trust Modeling Scheme using Cluster Aggregation of Messages for Vehicular Ad hoc Networks
Abstract: A VANET is a decentralized network as every node performs the functions of both host and router. The main benefit of VANET communication is the enhanced passenger safety by virtue of exchanging warning messages...