A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints informatio...
Saved in:
Published in | ICTACT journal on image and video processing Vol. 4; no. 1; pp. 652 - 656 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
ICT Academy of Tamil Nadu
01.08.2013
|
Subjects | |
Online Access | Get full text |
ISSN | 0976-9099 0976-9102 |
DOI | 10.21917/ijivp.2013.0094 |
Cover
Abstract | The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process. |
---|---|
AbstractList | The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT). After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process. |
Author | U, Latha K, Ramesh Kumar |
Author_xml | – sequence: 1 givenname: Latha surname: U fullname: U, Latha – sequence: 2 givenname: Ramesh Kumar surname: K fullname: K, Ramesh Kumar |
BookMark | eNo9kM9PgzAYhhszE-fc3SP_ALNfWwo9mYoMiQss0B08NQVawzLHAsbE_979UE_fm-_wvG-eWzTZ93uL0D3gBQEB4UO37b4OC4KBLjAW7ApNsQi5LwCTyV_GQtyg-ThuMcYQsCjgYooepVepsshTr0riTZmpN29dFqqIi5UnU5nllfKWWZ4m5brMcuU9SyWfZJV4UikZv1Z36NqZ3Wjnv3eGNstExS_-qkizWK78BphgPhyn8UZEjgfAawrcRgC0bUNjiWEubAxQzlpMQ0MEwwEQEjlSi4YyxiJn6QxlF27bm60-DN2HGb51bzp9fvTDuzbDZ9fsrOY1MWCJcCGzLIhoxCgWx3KBW-EorY8sfGE1Qz-Og3X_PMD67FOffeqTT33ySX8AgIVjEg |
ContentType | Journal Article |
CorporateAuthor | Dhaanish Ahmed College of Engineering, India Hindustan University, India |
CorporateAuthor_xml | – name: Dhaanish Ahmed College of Engineering, India – name: Hindustan University, India |
DBID | AAYXX CITATION DOA |
DOI | 10.21917/ijivp.2013.0094 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences |
EISSN | 0976-9102 |
EndPage | 656 |
ExternalDocumentID | oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b 10_21917_ijivp_2013_0094 |
GroupedDBID | 5VS AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ IPNFZ OK1 RIG |
ID | FETCH-LOGICAL-c1494-12016c98f6516b316e8113dd7ae2a4f7ca1364d037a294051228f2b9c34448fe3 |
IEDL.DBID | DOA |
ISSN | 0976-9099 |
IngestDate | Wed Aug 27 01:30:09 EDT 2025 Thu Jul 31 00:40:39 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 1 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c1494-12016c98f6516b316e8113dd7ae2a4f7ca1364d037a294051228f2b9c34448fe3 |
OpenAccessLink | https://doaj.org/article/6b2a1e29f74e4583843096c990d9f33b |
PageCount | 5 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b crossref_primary_10_21917_ijivp_2013_0094 |
PublicationCentury | 2000 |
PublicationDate | 2013-08-01 |
PublicationDateYYYYMMDD | 2013-08-01 |
PublicationDate_xml | – month: 08 year: 2013 text: 2013-08-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | ICTACT journal on image and video processing |
PublicationYear | 2013 |
Publisher | ICT Academy of Tamil Nadu |
Publisher_xml | – name: ICT Academy of Tamil Nadu |
SSID | ssj0001548569 |
Score | 1.8447502 |
Snippet | The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to... |
SourceID | doaj crossref |
SourceType | Open Website Index Database |
StartPage | 652 |
SubjectTerms | 2D Dual Tree Complex Wavelet Transform (DTCWT) Binarization Complex Wavelet Transform (CWT) Fingerprint Reconstruction Trigon Based Security Protocol |
Title | A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS |
URI | https://doaj.org/article/6b2a1e29f74e4583843096c990d9f33b |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27TsMwFLVQJxbeiPKSBxaGqIntOPaE3NAHrwY1rlSmyHFsqQwFQeH7sZOAysTCakVWdG7se058fS4AF9riUpMQB6Ry9I0QUgYsZjZQWFmXf1UVWv9D_2FCxzNyO4_na62-fE1YYw_cANejJVKRQdwmxNRnfAQ71q3dJlpxi3Hpd9-Qh2tiqrkfTFhMG6O9hAbc8aDmjBJ5fdJbPC8-vVll5O1NOfmVk9as--scM9wBWy05hKJ5qV2wYZZ7YLslirBdhu_74ErAXE6zyQjmg3Q2vZFP8HGaySzN7qEYCSfIJRzWVQ6-2EHCayFFX-QDKKQU6V1-AGbDgUzHQdsJIdBOwXhjQcfMNGeWxhEtcUQNiyJcVYkySBGbaBVhSqoQJwpxR8EihJhFJdfYoc-swYegs3xZmiMAueKYGGsSaigpWcUUTVQSK-yYlNaIdsHlNxbFa2N4UTihUONW1LgVHrfC49YFfQ_Wz3PeqroecAEs2gAWfwXw-D8mOQGbqO5T4SvzTkFn9fZhzhxbWJXn9YfxBZlVslU |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+STRONG+SECURITY+PROTOCOL+AGAINST+FINGERPRINT+DATABASE+ATTACKS&rft.jtitle=ICTACT+journal+on+image+and+video+processing&rft.au=U.+Latha&rft.au=K.+Ramesh+Kumar&rft.date=2013-08-01&rft.pub=ICT+Academy+of+Tamil+Nadu&rft.issn=0976-9099&rft.eissn=0976-9102&rft.volume=4&rft.issue=1&rft.spage=652&rft.epage=656&rft_id=info:doi/10.21917%2Fijivp.2013.0094&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_6b2a1e29f74e4583843096c990d9f33b |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0976-9099&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0976-9099&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0976-9099&client=summon |