Reducing vulnerability of a fingerprint authentication system

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A fingerprint authentication system usually suffers from privacy problem. A third party intruder can steal the information stored in the database and try to recreate the original fingerprint. Here a system is proposed which prevents the possibility of generating fingerprints from the information in the database. Two different fingerprints are acquired from a person. Then the orientation of ridges is calculated from the first fingerprint and minutiae points are extracted from a reference area in second fingerprint. They are combined to form a mixed template which is encrypted using blowfish cipher. The encrypted template serves as a virtual biometric. This prevents the revealing of original fingerprints to third party intruders. Moreover the attacker may not be aware that it is a mixed template that is used rather than the original fingerprint.

Cite

CITATION STYLE

APA

Athira Ram, A., & Jyothis, T. S. (2015). Reducing vulnerability of a fingerprint authentication system. In Communications in Computer and Information Science (Vol. 536, pp. 157–167). Springer Verlag. https://doi.org/10.1007/978-3-319-22915-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free