SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
D-Secure Privacy Protection based on
Fingerprint
Abstract:
Fingerprint recognition is an active research area nowadays. In many areas we are using
fingerprint recognition for to improve the security and privacy. In finger print recognitions
system the recognition can be done by fingerprint matching techniques. Fingerprint matching
techniques are classified in two categories:

Fingerprint verification and Fingerprint

identification. In this project we are using the fingerprint verification. For this we propose
here a novel system for protecting finger print privacy by combining two different
fingerprints into a new identity. In the enrollment, two fingerprints are captured from two
different fingers. We extract the minutiae positions from one fingerprint, the orientation
from the other fingerprint, and the reference points from both fingerprints. Based on this
extracted information and our proposed coding strategies, a combined minutiae template is
generated and stored in a database. In the authentication, the system requires two query
fingerprints from the same two fingers which are used in the enrollment. A two-stage
fingerprint matching process is proposed for matching the two query fingerprints against a
combined minutiae template. With the help of an existing fingerprint reconstruction
approach, we are able to convert the combined minutiae template into a real-look alike
combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints,
which can be matched using minutiae-based fingerprint matching technique. We are going to
develop this project in Dot Net Technology.
Existing System:
In the Existing system finger prints are scanned single finger. And it is stored in database, and
while the authentication process stored finger print is matched with the enrollment finger
print. This type of system didn’t provide full security and privacy to the users.

Advantage:


Most convenient because of Single finger print



The prices of the finger print readers are pocket friendly



No need to remember Password.

Disadvantages:


Less Security ( rejects certain percentage of the people)



Limited Privacy Protection
o Store the registered and the objective images in the system, which
may cause the risk of exposure and leakage of the private
fingerprint image.



Require extra time to identify user



High attacks from hackers.



Proposed System:
In proposed system model contain biometric authentication. During Authentication, system
will verify the details in the database and identify whether the user authorized person or not.
If the user is unauthorized mean, the server gives the error message to that user. If the user
authorized mean, the server give the acknowledgment to user for further actions. Matching
process is proposed for matching the two query fingerprints against a combined minutiae
template. With the help of an existing fingerprint reconstruction approach, we are able to
convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a
new virtual identity is created for the two different fingerprints, which can be matched using
minutiae-based fingerprint matching algorithms.

Advantage:


Double level Security



No Limited Privacy Protection



System Can Achieve A Very Low Error Rate



High Performance

System Specification
Software Requirements:


MS Windows XP/2000



MS Visual Studio.Net 2005



MS SQL Server 2000

Hardware Requirements:


Hard Disk: 20GB and Above



RAM: 1GB and Above



Processor: Pentium III and Above
Architecture Diagram:

Enrolment
(Two fingerprint
input)

Combined Minutiae
Template Generation
Authorization
Database

Authentication
(Two fingerprint
input)

Yes/No

Two-Stage Fingerprint
Matching

Existing System Architecture
Enrolment
(Single fingerprint
input)

Authorization
Database

Authentication
(Single fingerprint
input)

Minutiae Fingerprint
Matching

s

Yes/No
Fingerprint Verification Algorithm
Proposed Method:
Minutiae Method Fingerprint verification Algorithm:
Minutia method uses feature information of the terminal points and separate points of
ridges of the fingerprint and their relative positions.

Existing Method:
Pattern Matching Method Fingerprint Verification Algorithm:
Pattern-matching method verifies the identity of the patterns by directly comparing
the objective fingerprint images with the registered image.

Weitere ähnliche Inhalte

Was ist angesagt?

Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHIJNSA Journal
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMijsptm
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Raghu Vamsy Sirasala
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)NikitaRajbhoj
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...ijtsrd
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 

Was ist angesagt? (20)

Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASHAN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH
 
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEMA WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
184
184184
184
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...Graphical Password Authentication using image Segmentation for Web Based Appl...
Graphical Password Authentication using image Segmentation for Web Based Appl...
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
Final ppt
Final pptFinal ppt
Final ppt
 

Ähnlich wie Fingerprint combination for privacy protection

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...EditorIJAERD
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
3d authentication system
3d authentication system3d authentication system
3d authentication systemRicha Agarwal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
 
Providing security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxProviding security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxSanviSanvi11
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 

Ähnlich wie Fingerprint combination for privacy protection (20)

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
K017257578
K017257578K017257578
K017257578
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
Providing security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptxProviding security to online banking Project Presentation-3.pptx
Providing security to online banking Project Presentation-3.pptx
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 

Mehr von Migrant Systems

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesMigrant Systems
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data PublishingMigrant Systems
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchMigrant Systems
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigmMigrant Systems
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrantMigrant Systems
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesMigrant Systems
 
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesMigrant Systems
 

Mehr von Migrant Systems (18)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Java introduction
Java introductionJava introduction
Java introduction
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Voyage planet
Voyage planetVoyage planet
Voyage planet
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
 
Business intelligent
Business intelligentBusiness intelligent
Business intelligent
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+Trees
 
Abstract
AbstractAbstract
Abstract
 
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+trees
 
Opass
OpassOpass
Opass
 

Kürzlich hochgeladen

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Kürzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Fingerprint combination for privacy protection

  • 1. D-Secure Privacy Protection based on Fingerprint
  • 2. Abstract: Fingerprint recognition is an active research area nowadays. In many areas we are using fingerprint recognition for to improve the security and privacy. In finger print recognitions system the recognition can be done by fingerprint matching techniques. Fingerprint matching techniques are classified in two categories: Fingerprint verification and Fingerprint identification. In this project we are using the fingerprint verification. For this we propose here a novel system for protecting finger print privacy by combining two different fingerprints into a new identity. In the enrollment, two fingerprints are captured from two different fingers. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. In the authentication, the system requires two query fingerprints from the same two fingers which are used in the enrollment. A two-stage fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching technique. We are going to develop this project in Dot Net Technology.
  • 3. Existing System: In the Existing system finger prints are scanned single finger. And it is stored in database, and while the authentication process stored finger print is matched with the enrollment finger print. This type of system didn’t provide full security and privacy to the users. Advantage:  Most convenient because of Single finger print  The prices of the finger print readers are pocket friendly  No need to remember Password. Disadvantages:  Less Security ( rejects certain percentage of the people)  Limited Privacy Protection o Store the registered and the objective images in the system, which may cause the risk of exposure and leakage of the private fingerprint image.  Require extra time to identify user  High attacks from hackers.  Proposed System: In proposed system model contain biometric authentication. During Authentication, system will verify the details in the database and identify whether the user authorized person or not. If the user is unauthorized mean, the server gives the error message to that user. If the user authorized mean, the server give the acknowledgment to user for further actions. Matching process is proposed for matching the two query fingerprints against a combined minutiae template. With the help of an existing fingerprint reconstruction approach, we are able to convert the combined minutiae template into a real-look alike combined fingerprint. Thus, a
  • 4. new virtual identity is created for the two different fingerprints, which can be matched using minutiae-based fingerprint matching algorithms. Advantage:  Double level Security  No Limited Privacy Protection  System Can Achieve A Very Low Error Rate  High Performance System Specification Software Requirements:  MS Windows XP/2000  MS Visual Studio.Net 2005  MS SQL Server 2000 Hardware Requirements:  Hard Disk: 20GB and Above  RAM: 1GB and Above  Processor: Pentium III and Above
  • 5. Architecture Diagram: Enrolment (Two fingerprint input) Combined Minutiae Template Generation Authorization Database Authentication (Two fingerprint input) Yes/No Two-Stage Fingerprint Matching Existing System Architecture Enrolment (Single fingerprint input) Authorization Database Authentication (Single fingerprint input) Minutiae Fingerprint Matching s Yes/No
  • 6. Fingerprint Verification Algorithm Proposed Method: Minutiae Method Fingerprint verification Algorithm: Minutia method uses feature information of the terminal points and separate points of ridges of the fingerprint and their relative positions. Existing Method: Pattern Matching Method Fingerprint Verification Algorithm: Pattern-matching method verifies the identity of the patterns by directly comparing the objective fingerprint images with the registered image.