SECURING IMAGE BASE OF IRIS SECURITY SYSTEM USING CRYPTOGRAPHIC TECHNIQUES

Authors

  • VAISHALI BHATIA Research Scholar, Department of CSE, OM INSTITUTE OF TECHNOLOGY AND MANAGEMENT
  • DR. ANUJ SHARMA Department of CSE, OM INSTITUTE OF TECHNOLOGY AND MANAGEMENT

Keywords:

Iris recognition, identification, encryption

Abstract

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex random patterns are unique, stable, and can be seen from some distance. Databases of enrolled templates are searched by matcher engines at speeds measured in the millions of templates per second per CPU, and with remarkably low false match rates. But here issue is that stored biometric sample is stolen by hacker than they can be missing used. The objective of our research is to secure the biometric samples taken during scanning using encryption mechanism. So if hacker does steal any information then he will not be able to understand it. Biometric security is nothing if the biometric samples are not secure.

References

A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A Tool for Information Security", IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, 2006, pp. 125-143.

J. Daugman, "New Methods in Iris Recognition", IEEE Trans. on Systems, Man, and Cybernetics, Vol. 37, No. 5, 2007, pp. 1167-1175.

R. Wildes, "Iris Recognition: an Emerging Biometric Technology", Proceedings of the IEEE, Vol. 85, No. 9, 1997, pp. 1348-1363.

W. Boles, and B. Boashash, "A Human Identification Technique Using Images of the Iris and Wavelet Transform", IEEE Trans. on Signal Processing, Vol. 46, No.4, 1998, pp. 1185-1188.

W. Kong, and D. Zhang, "Accurate Iris Segmentation Based on Novel Reflection and Eyelash Detection Model", in International Symposium on Intelligent Multimedia, Video and Speech Processing, 2001, pp. 263-266.

L. Ma, and T. Tisse, "Personal Recognition Based on Iris Texture Analysis", IEEE Trans. on PAMI, Vol. 25, No. 12,2003, pp. 1519-1533. [7] N. Schmid, M. Ketkar, H. Singh, and B. Cukic, "Performance Analysis of Iris Based Identification System the Matching Scores Level", IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, 2006, pp. 154-168.

V. Dorairaj, A. Schmid, and G. Fahmy, "Performance Evaluation of Iris Based Recognition System Implementing PCA and ICA Encoding Techniques", in Proceedings of SPIE, 2005, pp. 51-58.

Downloads

Published

30-06-2016

How to Cite

VAISHALI BHATIA, & DR. ANUJ SHARMA. (2016). SECURING IMAGE BASE OF IRIS SECURITY SYSTEM USING CRYPTOGRAPHIC TECHNIQUES. International Journal for Research Publication and Seminar, 7(3). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/813

Issue

Section

Original Research Article