Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Life- Your Heart Speaks Your Password

Author : Sujith nair.P 1 Paramsivam.S 2 Dhananjayan 3 S.Nithin Krishna 4 G Manjula. 5

Date of Publication :30th November 2017

Abstract: The security is an important aspect of our daily life whichever the system we consider security plays a vital role. The biometric person identification technique based on the pattern of the human Iris, face, fingerprint or heartbeat is well suited to be applied to access control and provides /Strong security. In this paper, we focus on an efficient methodology of fingerprint, heartbeat, iris and face for identification and verification with total success rate. In this method, the image of the fragment taken is normalized and converted into binaries. The anatomy image and the series of operations such as segmentation, normalization, feature encoding are performed and it is converted into binaries. These bits are compressed and crossed over into a combined biometric key. This combined biometric key is used to bind each bit of the cryptographic key. This bound version of the key is used for enrolment and to release the key. Instead of storing the actual key, its hashed version is stored in order to conceal the cryptographic key to provide a secure comparison method for key verification. This bound version of the key is released only if this matches with the one identically. During enrolment, these features are used to bind a cryptographic key. The operation involved is the binary XOR. Here, the goal of the system is to reject, an unauthorized subject who does not possess the original features, for example, used during enrolment. In contrast, a genuine subject with the correct features will be accepted. By this spoofing can be avoided, since two kinds of keys are needed to encrypt the data and these keys are generated at once. This reduces the false acceptance rate and false rejection rate thereby the total success rate seems to be high since the key preserves security level to high.

Reference :

    1. 1. Anil Kumar Jain, Arun A. Ross, and Karthik Nandakumar ,”Introduction to Biometrics”,
    2. 2. Book: Analog -to-Digital Conversion
    3. 3. Book by Marcel J.M. Pelgrom
    4. 4. Book by Song Y. Yan, Number theory of everything
    5. 5. The CC-BY book Openstax college, anatomy and physiology

Recent Article