Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal biometric recognition is not able to meet the performance requirements of the applications. According to recent trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the directions of improving the performance of biometric identification system by going multimodal and, increasing the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction and presented outcomes justifies the effectiveness of the scheme.
Authors and Affiliations
Dr. N. Chaudhary
Particle Swarm Optimization based K-Prototype ClusteringAlgorithm
Abstract: Clustering in data mining is a discovery process that groups a set of data so as to maximize the intraclustersimilarity and to minimize the inter-cluster similarity. The K-Means algorithm is best suited f...
An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network
Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...
Social Engineering: Hacking a Human Being through Technology
Abstract: Social engineering is the art of extracting classified information by psychological manipulation. It is a strategical attack that depends on human interaction, a complex fraud system, tricking individuals into...
Evaluation of Bitmap Index Compression using Data Pump in Oracle Database
Abstract: Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. We review the existing technologies of Compression and introduce the bitmap index...
A Review on Resource Discovery Strategies in Grid Computing
Abstract : Technological, Finance, Scientific, engineering and other applications and in specific grandchallenge applications are becoming ever more demanding in terms of their computing requirements.Gradually, all...