SECURING IMAGE BASE OF IRIS SECURITY SYSTEM USING CRYPTOGRAPHIC TECHNIQUES
Keywords:
Iris recognition, identification, encryptionAbstract
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per CPU, and with remarkably low false match rates. But here issue is that stored biometric sample is stolen by hacker than they can be missing used. The objective of our research is to secure the biometric samples taken during scanning using encryption mechanism. So if hacker does steal any information then he will not be able to understand it. Biometric security is nothing if the biometric samples are not secure.
References
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A Tool for Information Security", IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, 2006, pp. 125-143.
J. Daugman, "New Methods in Iris Recognition", IEEE Trans. on Systems, Man, and Cybernetics, Vol. 37, No. 5, 2007, pp. 1167-1175.
R. Wildes, "Iris Recognition: an Emerging Biometric Technology", Proceedings of the IEEE, Vol. 85, No. 9, 1997, pp. 1348-1363.
W. Boles, and B. Boashash, "A Human Identification Technique Using Images of the Iris and Wavelet Transform", IEEE Trans. on Signal Processing, Vol. 46, No.4, 1998, pp. 1185-1188.
W. Kong, and D. Zhang, "Accurate Iris Segmentation Based on Novel Reflection and Eyelash Detection Model", in International Symposium on Intelligent Multimedia, Video and Speech Processing, 2001, pp. 263-266.
L. Ma, and T. Tisse, "Personal Recognition Based on Iris Texture Analysis", IEEE Trans. on PAMI, Vol. 25, No. 12,2003, pp. 1519-1533. [7] N. Schmid, M. Ketkar, H. Singh, and B. Cukic, "Performance Analysis of Iris Based Identification System the Matching Scores Level", IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, 2006, pp. 154-168.
V. Dorairaj, A. Schmid, and G. Fahmy, "Performance Evaluation of Iris Based Recognition System Implementing PCA and ICA Encoding Techniques", in Proceedings of SPIE, 2005, pp. 51-58.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.