By Topic

Bio-cashier: Using Bezier curve data compression and advanced encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Palaniappan, A.R. ; Dept. of Comput. Sci. & Eng., Meenakshi Sundararajan Eng. Coll., Chennai, India ; Swaminathan, R. ; Rajkumar, S.B. ; Sandhya, M.K.

To reach the rural masses, banks are going all out in providing a user-friendly banking experience. To boost micro financing initiatives, banks are deploying biometric solutions with ATMs. Establishing the identity of a rural depositor through biometrics makes it possible for illiterate or barely literate folks to become part of the banking user community. Fingerprint recognition has been recognized as one of the most mature and established technique among all the biometrics systems. Fingerprinting, however, has the advantage of being a familiar concept worldwide. Naturally, with the mounting application of biometric systems, there arises a difficulty in storing and handling those acquired biometric data. In recent times, with fingerprint recognition receiving increasingly more attention the amount of fingerprints collected has been constantly creating enormous problems in storage and transmission. Henceforth, the Compression of fingerprints has emerged as an indispensable step in automated fingerprint recognition systems. The Proposed scheme utilizes the Bezier curve representations for effective compression of fingerprint images the control points are determined for all the ridges by visualizing each ridge as a Bezier curve. The control points of all the ridges determined are stored and are used to represent the fingerprint image. These control points are encrypted and transferred to central server of the bank for verification. This will reduce the transmission time of data, enables a quick processing.

Published in:

Advanced Computing (ICoAC), 2010 Second International Conference on

Date of Conference:

14-16 Dec. 2010