Abstract
Iris is one of the most challenging biometric techniques. In many proposed biometric recognition technique, template's are store in the database for comparison. But there exists a vital problem in storing the template in the database since it can be easily bootlegged. In order to overcome these issues a novel method for person identification by their Iris, through securely storing the template is proposed. Visual Cryptography Encryption (VCE) technique is used for securely storing the iris template. By means of VCE, shares are generated for the iris template which is stored in the database instead of storing the entire template. Shares are generated by pixel expansion method. Authentication is provided by comparing the shares. Comparison is done by using Hamming Code. So it is a very effective method of person identification. The proposed method gives an extra security in iris recognition.
Highlights
In today’s society, security has become a major issues and it is more important
Biometric techniques have been developed for various features like fingerprint, facial image, voice, hand geometry, handwriting, iris and retina
This template should be given as the input for the visual cryptography algorithm and two shares are generated
Summary
In today’s society, security has become a major issues and it is more important. Secured data can be hacked or misused a days by using many types of attacks. One way of information protection can be done by setting password to our data, but passwords can be hacked. Biometric techniques have been developed for various features like fingerprint, facial image, voice, hand geometry, handwriting, iris and retina. Among all these features, iris is the most efficient and powerful technique (Riad et al, 2010) because of two major reasons, they are. A technique named Visual cryptography is used to store the template securely in the central database in the form of share (Revenkar et al, 2010)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Research Journal of Applied Sciences, Engineering and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.