Security of fingerprints in biometric authentication systems using cryptography and watermarking technique - Статья

бесплатно 0
4.5 106
Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

Скачать работу Скачать уникальную работу

Чтобы скачать работу, Вы должны пройти проверку:


Аннотация к работе
Security of fingerprints in biometric authentication systems using cryptography and watermarking technique Zaripov N.N. Teacher of Department of Information Technology, Bukhara State University Introduction Identity recognition is still an open problem and its solution can help for user authentication, the secure access to restricted areas and, more generally, anytime it is necessary to automatically acquire the identity of a human operator. It is worth to point out that the application of an identity recognition system can go beyond security issues, being the basic for a more sophisticated human machine interface in a pervasive context. A person can be identified through the analysis of her physical peculiar features: automated methods and algorithms for feature acquisition, analysis and recognition stand at the core of biometrics. A biometric identifier is a physiological or behavioral characteristic of a person such as face features, iris, palm, fingerprint, hand or finger geometry, retina, voice, handwritten signature, keystroke dynamics, etc., that are strictly linked to each person and cannot be easily tampered with. Basically, all them are unique, universal, unalterable, and can be measured. Due these properties, biometrics have been used to identify or authenticate users in a biometric system, which is becoming more popular than traditional identification techniques such as identification card (ID), password and personal identification number (PIN). In the recognition process acquired raw data are preprocessed to extract relevant geometric arrangements of features that are then compared and matched to those that form the user template stored in a backend database. Biometric systems are based on the following steps [5]: first, a biometric sample is taken from an individual, for example iris scan; then, this biometric can be presented as an image or some data are extracted from that sample which constitute a biometric template; finally, the biometric data, either the image or the template or both, are stored on a database or in a smart card. All these steps constitute the process known as enrollment. One time a person performs the enrollment process, he/she can identify (distinguish an individual from a larger set of individual biometric records, i.e. one-to-many matching) or authenticate (a live biometric sample presented by a person is compared with a stored sample, i.e. one-to-one matching) by presenting his/her biometric sample in the system, which will compare the submitted sample with stored sample and if the matching process succeeds, the person is recognized and the system will accept him/her. In other case, she/he is not recognized, i.e. will be rejected. Talking about the reliability of a biometric system, the submitted sample (actual) can present some variance with the stored reference sample, which could make of the comparison, matching and identification, an inexact process, i.e. the biometric system does not have 100% of accuracy.

Вы можете ЗАГРУЗИТЬ и ПОВЫСИТЬ уникальность
своей работы


Новые загруженные работы

Дисциплины научных работ





Хотите, перезвоним вам?