29 research outputs found

    Implementation of AES using biometric

    Get PDF
    Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process

    Image enhancement and segmentation on simultaneous latent fingerprint detection

    Get PDF
    A simultaneous latent fingerprint (SLF) image consists of multi-print of individual fingerprints that is lifted from a surface, typically at the crime scenes. Due to the nature and the poor quality of latent fingerprint image, segmentation becomes an important and very challenging task. This thesis presents an algorithm to segment individual fingerprints for SLF image. The algorithm aim to separate the fingerprint region of interest from image background, which identifies the distal phalanx portion of each finger that appears in SLF image. The algorithm utilizes ridge orientation and frequency features based on block-wise pixels. A combination of Gabor Filter and Fourier transform is implemented in the normalization stage. In the pre-processing stage, a modified version of Histogram equalization is proposed known as Alteration Histogram Equalization (AltHE). Sliding windows are applied to create bounding boxes in order to find out the distal phalanges region at the segmentation stage. To verify the capability of the proposed segmentation algorithm, the segmentation results is evaluated in two aspects: a comparison with the ground truth foreground and matching performance based on segmented region. The ground truth foreground refers to the manual mark up region of interest area. In order to evaluate the performance of this method, experiments are performed on the Indian Institute of Information Technology Database- Simultaneous Latent Fingerprint (IIITD-SLF). Using the proposed algorithm, the segmented images were supplied as the input image for the matching process via a state art of matcher, VeriFinger SDK. Segmentation of 240 images is performed and compared with manual segmentation methods. The results show that the proposed algorithm achieves a correct segmentation of 77.5% of the SLF images under test

    OPTIMIZATION OF FINGERPRINT SIZE FOR REGISTRATION

    Get PDF
    The propose algorithm finds the optimal reduced size of latent fingerprint. The algorithm accelerates the correlation methods of fingerprint registration. The Algorithm is based on decomposition and reduction of fingerprint to one dimension form by using the adoptive method of empirical modes. We choose the most appropriate internal mode to determine the minimum distance between the extremes of empirical modes. We can estimate how many times the fingerprint in the first step of the comparison can be reduced so as not to lose the accuracy of registration. This algorithm shows best results as compared to conventional fingerprint matching techniques that strongly depends on local features for registration. The algorithm was tested on latent fingerprints using FVC2002, FVC2004 and FVC2006 databases

    Identification of Biometrics Using Fingerprint Minutiae Extraction Based on Crossing Number Method

    Get PDF
    Biometrics based on fingerprint images is a self-recognition technique using fingerprint to represent a person's identity. Fingerprint is characteristic of someone's identity precisely and safely because there are no similarities and cannot be falsified. The purpose of this research is to develop a biometrics identification system based on fingerprint images by utilizing a cell phone camera for the acquisition of fingerprint images. This is based on its simplicity because almost everyone has a cell phone so that a person's identification system based on fingerprint can be used anytime and anywhere. The research was conducted using images generated from cell phone cameras with camera specifications of 2, 5 and 8 mega pixels. The method used in image processing consists of the minutiae crossing number method for the feature extraction process and the minutiae based matching method for the similarity measurement process. The results of the research concluded that cell phone cameras with specifications of 5 and 8 mega pixels can be used for the process of image acquisition in biometrics systems based on fingerprint. The feature extraction process of image results using the minutiae crossing number method and the match measurement process using the minutiae based matching method resulted in an accuracy value of 92.8% on a 5 mega pixel camera and 95.3% on an 8 mega pixel camera. The accuracy value depends on the results of the image acquisition stage, pre-processing, the threshold value in the identification process, and the number of images used in the training data in the database

    DETECTION SYSTEM OF TEN FINGERPRINT PATTERN USING MATHEMATICAL MORPHOLOGY AND BACKPROPGATION ARTIFICIAL NEURAL NETWORK

    Get PDF
    This research has aim to produce for detection system of human ten fringerprints patterns that according to Dermatoglypic. The fringerprints patterns able to use for advanced analysis to biological and psychological characteristics. This research use back propagation algorithm of neural network to identify of fringerprint patterns. Initial processing is used mathematical morphology method before it is detected. The image is changed to digital image and then it is processed by dilation and erotion for enhancement image. The image that as neuron input of back propagation is changed to gray scale and 8 x 8 of size. Training process use 2000 epochs and patterns [200 2 1]. The output result  are identification of human ten fringerprints patterns. This research produce identification are whorl, arch,  right loop and left loop patterns of fringerprints. The result of research are whorl patterns 51.67%, right loop patterns 23.33%  and left loop 18.33%. The accuration of detection system is 93.33%

    Fingerprint Recognition in Biometric Security -A State of the Art

    Get PDF
    Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud. so that they square measure being replaced by identity verification mechanisms. Among bioscience, fingerprint systems are one amongst most generally researched and used. it\'s fashionable due to their easy accessibility. during this paper we tend to discuss the elaborated study of various gift implementation define strategies together with their comparative measures and result analysis thus as realize a brand new constructive technique for fingerprint recognition

    Investigating digital watermark dynamics on carrier file by feed-forward neural network

    Get PDF
    Carrier files are commonly described as host files in digital watermarking in which hidden files are embedded on it. As a result, new files are formed which contain the hidden files or messages. This paper aim at resolving the problem of capacity in Image watermarking and utilizes the bits ratios of the watermark and carrier file as the raw data for analysis. The data are obtained from the result of the first project undertaken to determine the implementation of different applications available in the public domain for embedding a watermark. Feed-forward neural network (FFNN) is used for analysis because is applicable to a wide range of forecasting problems and yields a high degree of accuracy for the bits ratios of watermark and host. The result indicates the relationship between the carrier file and the hidden file, which establishes a pattern where the larger the bits of the carrier file, the larger the watermark bits and vice versa. Although this is only in terms of Image watermarking. Further studies should apply the same technique on video and audio watermarkin
    corecore