A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints informatio...

Full description

Saved in:
Bibliographic Details
Published inICTACT journal on image and video processing Vol. 4; no. 1; pp. 652 - 656
Main Authors U, Latha, K, Ramesh Kumar
Format Journal Article
LanguageEnglish
Published ICT Academy of Tamil Nadu 01.08.2013
Subjects
Online AccessGet full text
ISSN0976-9099
0976-9102
DOI10.21917/ijivp.2013.0094

Cover

Abstract The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.
AbstractList The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.
Author U, Latha
K, Ramesh Kumar
Author_xml – sequence: 1
  givenname: Latha
  surname: U
  fullname: U, Latha
– sequence: 2
  givenname: Ramesh Kumar
  surname: K
  fullname: K, Ramesh Kumar
BookMark eNo9kM9PgzAYhhszE-fc3SP_ALNfWwo9mYoMiQss0B08NQVawzLHAsbE_979UE_fm-_wvG-eWzTZ93uL0D3gBQEB4UO37b4OC4KBLjAW7ApNsQi5LwCTyV_GQtyg-ThuMcYQsCjgYooepVepsshTr0riTZmpN29dFqqIi5UnU5nllfKWWZ4m5brMcuU9SyWfZJV4UikZv1Z36NqZ3Wjnv3eGNstExS_-qkizWK78BphgPhyn8UZEjgfAawrcRgC0bUNjiWEubAxQzlpMQ0MEwwEQEjlSi4YyxiJn6QxlF27bm60-DN2HGb51bzp9fvTDuzbDZ9fsrOY1MWCJcCGzLIhoxCgWx3KBW-EorY8sfGE1Qz-Og3X_PMD67FOffeqTT33ySX8AgIVjEg
ContentType Journal Article
CorporateAuthor Dhaanish Ahmed College of Engineering, India
Hindustan University, India
CorporateAuthor_xml – name: Dhaanish Ahmed College of Engineering, India
– name: Hindustan University, India
DBID AAYXX
CITATION
DOA
DOI 10.21917/ijivp.2013.0094
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
EISSN 0976-9102
EndPage 656
ExternalDocumentID oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b
10_21917_ijivp_2013_0094
GroupedDBID 5VS
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
IPNFZ
OK1
RIG
ID FETCH-LOGICAL-c1494-12016c98f6516b316e8113dd7ae2a4f7ca1364d037a294051228f2b9c34448fe3
IEDL.DBID DOA
ISSN 0976-9099
IngestDate Wed Aug 27 01:30:09 EDT 2025
Thu Jul 31 00:40:39 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1494-12016c98f6516b316e8113dd7ae2a4f7ca1364d037a294051228f2b9c34448fe3
OpenAccessLink https://doaj.org/article/6b2a1e29f74e4583843096c990d9f33b
PageCount 5
ParticipantIDs doaj_primary_oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b
crossref_primary_10_21917_ijivp_2013_0094
PublicationCentury 2000
PublicationDate 2013-08-01
PublicationDateYYYYMMDD 2013-08-01
PublicationDate_xml – month: 08
  year: 2013
  text: 2013-08-01
  day: 01
PublicationDecade 2010
PublicationTitle ICTACT journal on image and video processing
PublicationYear 2013
Publisher ICT Academy of Tamil Nadu
Publisher_xml – name: ICT Academy of Tamil Nadu
SSID ssj0001548569
Score 1.8447502
Snippet The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 652
SubjectTerms 2D Dual Tree Complex Wavelet Transform (DTCWT)
Binarization
Complex Wavelet Transform (CWT)
Fingerprint Reconstruction
Trigon Based Security Protocol
Title A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
URI https://doaj.org/article/6b2a1e29f74e4583843096c990d9f33b
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27TsMwFLVQJxbeiPKSBxaGqIntOPaE3NAHrwY1rlSmyHFsqQwFQeH7sZOAysTCakVWdG7se058fS4AF9riUpMQB6Ry9I0QUgYsZjZQWFmXf1UVWv9D_2FCxzNyO4_na62-fE1YYw_cANejJVKRQdwmxNRnfAQ71q3dJlpxi3Hpd9-Qh2tiqrkfTFhMG6O9hAbc8aDmjBJ5fdJbPC8-vVll5O1NOfmVk9as--scM9wBWy05hKJ5qV2wYZZ7YLslirBdhu_74ErAXE6zyQjmg3Q2vZFP8HGaySzN7qEYCSfIJRzWVQ6-2EHCayFFX-QDKKQU6V1-AGbDgUzHQdsJIdBOwXhjQcfMNGeWxhEtcUQNiyJcVYkySBGbaBVhSqoQJwpxR8EihJhFJdfYoc-swYegs3xZmiMAueKYGGsSaigpWcUUTVQSK-yYlNaIdsHlNxbFa2N4UTihUONW1LgVHrfC49YFfQ_Wz3PeqroecAEs2gAWfwXw-D8mOQGbqO5T4SvzTkFn9fZhzhxbWJXn9YfxBZlVslU
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+STRONG+SECURITY+PROTOCOL+AGAINST+FINGERPRINT+DATABASE+ATTACKS&rft.jtitle=ICTACT+journal+on+image+and+video+processing&rft.au=U.+Latha&rft.au=K.+Ramesh+Kumar&rft.date=2013-08-01&rft.pub=ICT+Academy+of+Tamil+Nadu&rft.issn=0976-9099&rft.eissn=0976-9102&rft.volume=4&rft.issue=1&rft.spage=652&rft.epage=656&rft_id=info:doi/10.21917%2Fijivp.2013.0094&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0976-9099&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0976-9099&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0976-9099&client=summon