By Topic

Fingerprint based authentication system using threshold visual cryptographic technique

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Rajeswari Mukesh ; Department of Computer Science and Engineering, Meenakshi College of Engineering, Chennai, India ; V. J. Subashini

Biometrics deals with automated method of identifying a person or verifying the identity of a person based on the physiological or behavioural characteristic, and so is used for authentication in many of the online transactions. The biometric that has been chosen for implementation is fingerprint, since fingerprint biometric is easily available and highly reliable compared to many other biometrics. In the existing biometric authentication system the fingerprint template of a person is stored as such in the authentication server and is prone to security attacks at the server side. To overcome this kind of server side attack, in the proposed system the fingerprint template is divided into two or more shares using visual cryptographic technique followed by compression. One of these shares is stored into the server and the remaining shares are given to the users. Only these two participants who possess these transparencies can reconstruct the secret (biometric template) by superimposition of shares. This kind of approach solves two major problems related to fingerprint based automatic access control systems such as falsification and costly maintenance of the large fingerprint database.

Published in:

Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on

Date of Conference:

30-31 March 2012