Fingerprint based authentication application using visual cryptography methods (Improved ID card)

被引:0
作者
Rao, Y. V. Subba [1 ]
Sukonkina, Yulia [1 ]
Bhagwati, Chakravarthy [1 ]
Singh, Umesh Kumar [1 ]
机构
[1] Univ Hyderabad, Dept Comp & Informat Sci, Hyderabad 500134, Andhra Pradesh, India
来源
2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4 | 2008年
关键词
Visual Cryptography; Biometrics; Fingerprints; Authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The main idea of this paper is to efficiently apply the Visual Cryptography (VC) techniques onto the area of authentication using fingerprints. We present an alternative approach of using the fingerprints, attempting to solve two major problems related to fingerprint based automatic access control systems, which are falsification and the costly maintenance of the large fingerprint database. In the proposed application we divide an input fingerprint image into two shares with the help of the basic VC techniques, keeping one with the participant in the form of ID card and saving the other one in the database. This share kept in the database will be the same for all of the participants. While accessing, we will stack the corresponding shares together and compare the obtained image with the provided fresh fingerprint using any modern minutia extraction algorithm.
引用
收藏
页码:2133 / 2137
页数:5
相关论文
共 8 条
  • [1] BISTARELLI S, 2003, COMPUTER ALGEBRA FIN, P1
  • [2] Jain A, 1997, IDENTITY AUTHENTICAT, P1
  • [3] JOHNSON P, 2000, SWARM USER GUIDE, P1
  • [4] Maltoni D, 2003, HDB FINGERPRINT RECO, P1
  • [5] NOAR M, 1995, LECT NOTES COMPUTER, V950, P1
  • [6] RAO YJ, 2007, P OPT FIB COMM C EXP, P1
  • [7] STINSON DR, 2000, 7 ANN INT WORKSH WAT, P100
  • [8] TSAI CS, 2001, SHARING MULTIPLE SEC, P1