Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal biometric recognition is not able to meet the performance requirements of the applications. According to recent trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the directions of improving the performance of biometric identification system by going multimodal and, increasing the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction and presented outcomes justifies the effectiveness of the scheme.
Authors and Affiliations
Dr. N. Chaudhary
An Energy Efficient Traffic Routing On Wake-Up Process in Wireless Sensor Network
Abstract: Wireless network consists of distributed sensor nodes to monitor the physical conditions and establish the traffic system. Every node in WSN sends and receives the packet, resulting in wastage of bandwidth.Howe...
Classification Algorithms for Predicting Computer Science Students Study Duration
The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than fou...
Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm
In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...
Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications
Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...
Network Traffic Load Balancing In Gateways
Abstract: Load balancing is the practice of evenly distributing work among multiple devices. This technique provides several important benefits. Load Balancing in Gateways is a very important in today's emerging wo...