Abstract

Home security systems in the recent times have gained greater importance due to increasing threat in the society. Biometrics deals with automated approaches of recognizing a user or verifying the user identity based on behavioral or physiological features. Visual cryptography is a scheme of secret sharing where a secret image is encrypted into shares which disclose no data independently about the original secret image. As the template of biometric are stored in centralized database due to the threats of security the template of biometric may be changed by attacker. If the template of biometric is changed then the authorized user will not be permitted to access the resource. To manage this problem the schemes of visual cryptography can be used to secure the face recognition. Visual cryptography offers huge ways for supporting such needs of security as well as additional authentication layer. To manage this problem the visual cryptography schemes can be used to secure digital biometric information privacy. In this approach the face or private image is dithered in two varied host images that is sheets and are stored in separate servers of data so as to assure that the original image can get extracted only by accessing both sheets together at a time and a single sheet will not be capable to show any data of private image. The main aim of the study is to propose an algorithm which is a combination of CVC and Siamese network. This research implements visual cryptography for face images in a biometric application. The Siamese network is essential to solve one shot learning by representation of learning feature that are compared to verification tasks. In this research face authentication helps in accomplishing robustness by locating face image from an n input image. This research explores the availability of using visual cryptography for securing the privacy to biometric data. The results of the proposed approach provide an accuracy of 93% which is found to be superior when compared with that of the approaches that are already in practice.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call