Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Alka Chauhan, Dharamveer Singh, Mohd Vakil
DOI Link: https://doi.org/10.22214/ijraset.2022.44945
Certificate: View Certificate
This alludes to measurements identified or verified with human qualities. Biometrics techniques are validating is useful and utilized in the software testing or engineering as the any type of IDs and also access control. This is likewise used distinguish persons in collect or gatherings that are under re-co naissance. Biometric technique identifiers or validates are the particular, correct qualities used to identify name and depute individuals. The biometric validates or identifiers are frequently sorted as physiological vs behavioral (use as social) characteristics. The physiological or behavioral attributes are the identified or verified with the any part of the full body and we can see as well. Precedents incorporate, these are not any restricted to fingerprint impression, face, veins, DNA, hand geometry ,palm print bio, iris , eye retina and smell/odor/fragrance. The behavioral (like as Social) characteristics and attributes are verified or identified within this instance of conduct to a human like a man or women, including yet not also restricted to composing, walk, and human voice.
I. INTRODUCTION
A. Biometrics
Biometrics is the specialized term or we can say a specific for body estimations and digitally computations like different body language. Some scientists have instituted the term behavior metrics to portray the biometrics of the last class.
B. Verification And Identification
The system conducts and also checks only one-to-one (1:1) comparisons is to establish and buildup the identity (or identity) of the person individually.
D. Biometric Techniques
We use all biometric technique for identification and the verification of a person or a user and check that person or user is authorized or not for our system and here we are discussing two types of biometric techniques, first on is Physical Characteristics and other one is Behavioral Characteristics.
1. Physical Characterstics
The some examples of biometric and it is related on physical characteristics are as follows:
Fingerprint authentication systems scan the fingerprint pattern for authentication. The fingerprint authentication problem can be categorized into two sub-groups: one is the fingerprint verification and the other one is the fingerprint identification see Fig 1.2. The user put his or her finger on a scanner glass plate then the system captures a very high-resolution optical picture or impression of the fingerprint and also typically using a charge-coupled device camera (CCD camera).
The authentication of hand of a person, systems scans the hand or any larger parts of hand, as we decide and creates a comparison with the given patterns at the skin, it is very similar to fingerprint authentication. Here, The difference between a fingerprint authentication system and, a hand authentication system, depends mostly in the given size of the digital scanner and resolution of the concern scanner.
In the Face recognition technique or framework , we use some special features like the total distance between two eyes, jaw line , pattern, designed shape, check-bones positions , nose width etc, this system is automatically identify a person by using its face.
2. Behavioral Characteristics
The some other techniques is based on behavioral biometrics characteristics are as follows:
In this voice biometrics recognition techniques, we use voice pitch, voice tone, voice frequency etc and uses this voice recognition we can authenticate the concern person.
The Individuals are considered to marks as a method for exchange related character confirmation, and mostly see nothing surprising in stretching out this to incorporate biometrics. Mark confirmations gadgets are more sensibly exact in task and clearly loan to applications, where a unique mark is an acknowledged verifier or identifier. Here shockingly, generally couple of critical mark applications has developed contrasted and other biometric strategies. In any case, if your application fits, it is an innovation worth considering.
E. Comparison Of Various Biometric Technologies
Now we show here why we use the Fingerprint Biometrics only,
It is conceivable to comprehend if a human trademark can be utilized biometrics as far as the accompanying Parameters.
II. LITERATURE REVIEW
Jain A.K [1] “On-Line Fingerprint Verification”, In this paper, a short review of the idea of unique fingerprint details grouping and recognition as acknowledgment. In this paper demonstrate an investigation about biometrics attributes for acknowledgment or grouping and introduces how it is utilized for people acknowledgment. This methodology utilizes the robotized unique mark acknowledgment dependent on details. It is conceivable to confirm its helpfulness for kind example acknowledgment. It is available the outcome for this framework and end as per the quantity of tests and acknowledgment rate. This work depicts a details based fingerprint acknowledgment system. The error rate in this framework does not surpass the 10% when the quantity of tests increment amid the preliminary stage. This framework rehashes the details extraction everywhere throughout the unique finger impression (256×256) picture, and identifies the perceived particulars arranges. Here we have talked about the Comparison of Biometric innovation based on a few parameters like as all universality, acceptability, permanence, uniqueness, collectability, execution and circumvention. Thai Raymond [2] “Fingerprint Enhancement and Minutiae Extraction”, In this paper, a brief overview of the concept of comparison and discussion of off- line and on- line fingerprint recognition system. In this paper design of an online and implementation of an on-line fingerprint matching system with operates in two different stages: first one is minutiae based extraction and second one is minutiae based matching. We extract the minutiae features like as ridge ending and ridge bifurcation and by using the minutiae based algorithm and for minutiae matching algorithm that is an alignment based or related algorithm has been developed yet. This is to finding the sharing between the input minutiae and stored template. This framework has been verified and tested on the two sets of fingerprint images or picture captured with ink less scanners. It meets the concerned response time requirement of online authentication or verification with very high parameter of accuracy. In this paper approximate all steps like as Ridge extraction, Thinning and Minutiae Extraction has been covered. Amengual [3] “Real-Time Minutiae extraction in Fingerprint Images”, In this paper, a brief overview of the concept of Fingerprint Minutiae Extraction and Enhancement. In this thesis paper discuss the Enhancement and Minutiae extraction and all internal steps in details. We used the Gabor filter for this enhancement technique. Then image binarization applied on the enhanced image then discusses the ROI, segment then thinning and discuss the Gabor filter and the introduction of the fingerprint. The biometric, mainly fingerprint is the very oldest and mostly wide used form the biometric authentication. There is small and less statistical theory for the uniqueness of fingerprint image minutiae. A tight step for checking the statistics of fingerprint biometric minutiae is accurately and truly extract minutiae from the concerned fingerprint picture or images. Fingerprint images are used as a perfect quality rarely. They can be degrading and with error and corrupted due to the variations in our skin and our impression conditions depends on long time or any mishappening. Thus, an image enhancement techniques are posted previously to minutiae extraction to be obtain a more accurate and reliable measures of location of minutiae. Post processing has been discussed here and removal the false minutiae. Nanli[9] exhibited an examination paper on Diffie-Hellma key trade convention. It is seen that Nanli?s convention, still endures with pantomime assault. To manage this weakness, an enhanced key trade approach dependent on outsider confirmation conspire is proposed in this paper. Milene Arantes [11] “A System for Fingerprint Minutia Classification and Recognition“, In this paper, the recognizable proof framework is that in this paper depict a unique finger impression verification framework comprising of three fundamental advances Fingerprint picture pre-processing, Feature extraction and Feature matching as coordinating. The pre-preparing step improves unique mark picture to got binarized edges, which are required for highlight extraction. Highlight point which is likewise called details, for example, edge finishing; edge bifurcations are then extricated, trailed by the false particulars end. This proposed strategy utilizes particulars data to develop the details relationship outline is speak to and matches fingerprints. In this work the execution of the Fingerprint coordinating framework assessed by estimating its False Reject Rate(FRR) and False Accept Rate(FAR) . But it makes them inadequacy FAR and FRR is high and framework execution isn't better. Maltoni David [14] “Hand Book of Fingerprint Recognition”, In this handbook, a brief overview of the concept of fingerprint image matching based on ridge similarity. The author gives the different method , which estimate all the rotation angle between a fingerprint query and saved template minutiae using circularly field and after feeting samples taken by least square method and the optimal local orientation angle is formed or obtained. Finally we get a good matching score which is computed by projecting the given input query minutiae also set to the template. The experiment results on the public fingerprint database, FVC 2002 DB3 and a self collected database.
Uludag U [17] “Biometric cryptosystems: issues and challenges”, In this paper, here the ownership of secret keys, which goes into the disrepair, if the keys are not kept secrecy (imparted to non-legitimate clients). Further now, keys can be overlooked, and lost, or stolen and, along these lines, can not give non-repudiation. Current verifying frameworks dependent on physiological and social attributes of different people, known as biometrics, i.e fingerprints, intrinsically give answers for a big number of these issues and may supplant the validation segment of the conventional cryptosystems. In this paper, we present different types strategies that solidly tie a cryptographic key within the biometric format of a user put the database so that the key cannot be uncovered without a fruitful biometric validations. Now we evaluate the execution of one of these different biometric key authoritative/age measuring utilizing the unique mark biometric. We outline the difficulties engaged with biometric keys age principally because of radical securing different varieties in the portrayal of a biometric verifier or identifier and the blemished some idea of biometric highlight extraction and coordinating measurement. We expound on the this appropriateness of finding these calculations for the computerized rights administration frameworks. Li Shunshan [21] “Image Enhancement Method for Fingerprint Recognition Method”, In this paper, a brief overview of the concept of image enhancement method for fingerprint authentication method. The author presents the Gabor filter based for fingerprint image based enhancement. This method can be joint the all ridge and breaks and ensures the maximum gray scale values located at the very ridge centre and result shows improvement of image enhancement. For reducing effect of noise we use Gabor filter and calculate distances between the two different and nearest ridges for the next coming filter. He says that we need and get a good quality of fingerprint image and by this the performance of this Fingerprint authentication System has been definitely improved. Huang Tsong-Liang [22] “A Novel Scheme for Fingerprint Identification”, In this paper,a brief overview of the concept of Fingerprint Authentication System is given along with a concept of fingerprint identification preprocessing system. The author gives a technique to identify a person. In this paper the author presents an automatic worship and preprocessing with a fixed point DSP and a fingerprint sensor. He studies preprocessing algorithm including filtering, enhancement, image binarization, thinning and image matching. Huang Peihao [28] “Implementation of An Automatic Fingerprint Identification System”, In this paper, a brief overview of the concept of Fingerprint Authentication System is given along with a concept of implementation of automatic fingerprint identification algorithm. In this paper the author implements an Automatic Fingerprint Identification System (AFIS), with the help of fingerprint classification and a minutiae extraction matching. He discuss Image enhancement, image binarization, minutiae extraction, classification of fingerprints and pattern matching also, which are the most important concept for me. Huppmann Markus [29] “Fingerprint Recognition by Matching of Gabor Filter-based Patterns”, In this paper, a brief overview of the concept Fingerprint authentication system with Direction angles Difference method. In this paper the use of the minutiae extraction with fast feature and its matching algorithm. A matching algorithm is deployed on the bases of alignment based minutiae matching algorithm. We get a good performance results from this particular system based on a standard database (DB). The conclusion is that the quality of the digital scanner decides the good accuracy of the result. From one pixel thin image, It is able to correctly detect all the valid bifurcation and ridge-ending.. The Euclidian distances (D) and orientation angle difference of particular minutiae point are simple to implement and also matcher is the invariant to rotation of fingerprint. The main difference between the verification and identification are discussed here. Discuss the Fingerprint Enhancement in details with segmentation, Normalization, Gaussian smoothing, Intensity Transformation, Binarized and Thinning. The false minutia will be removed by using Pruning (Thinning) and the thinned image. The conclusion is that this algorithm takes a very less time and it is very less than the time taken by the other minutiae matching algorithm which was based on a filtering, Gabor filtering. Rao G.Sambasiva [33] “A Novel Fingerprint Identification System Based on The Edge Detection”, In this paper, a brief overview of the concept of Fingerprint Authentication System is given along with a concept of fingerprint identification technique .The author find out a ridges in the image by using a gray scale level water shed . In this two basic types of system discussed here , first one is Automatic Fingerprint Identification System (AFIS) and second one is Automatic Fingerprint Authentication System (AFAS). He discusses the classification of fingerprint and use novel technique, which consists: image acquisition, pre-processing, minutiae detection, minutia reduction and fingerprint matching. He says the percentage is matching is depends on the quality of scanner also the quality of fingerprint. Nawaj [36] “Development of academic Attendance Monitoring System Using Fingerprint Identification”, In this paper, a brief overview of the concept of Fingerprint Authentication System is given along with Fingerprint matching algorithm. This paper calculated the total attendance and maintains its records in an university and academic institute. This system takes a right attendance by fingerprint authentication with the help of fingerprint impression sensor and all records are saved on the main computer server. It is use to mark the attendance, student has to place his or her finger on fingerprint sensor. By using this technique no need of the stationary material and specially no need to keep personal records. The author says those captures the student’s fingerprint then retrieves the stored template from the database then performs an identification (one to many comparisons) method between the fingerprint feature sets and the template stored in fingerprint database. If match found, show the records of student. If verification is not done then system logout and goes back to its very first state without making the attendance. Ferhaoui Chafia [41] ”A biometric crypto-system for authentication”, In this paper, Biometric serves to gathers insights from individual and it is extremely usefull to especially discover the client with the both biometric method component depends on the characteristics of biometrics. The most profitable of this biometric strategy is to give the clear precision to database storage room of the layouts without the obliviousness of protection and security. Biometric crypto-framework method is useful to get security from the unapproved clients or access. The fluffy vault strategies is an extremely well known and in reality better bio-cryptography technique to get guarantee the layouts and its aggregate mystery enter in biometric methodology. This paper has surveys of the different past research work, which done in biometric crypto-framework utilizing fluffy vault. Li Nan [42] “Research on Diffie-Hellman key exchange protocol”, In this paper, Diffie-Hellman key trade (D-H) is a cryptographic convention that permits two gatherings that have no earlier information of one another to set up together a common mystery key over an uncertain correspondences channel. At that point they utilize this key to encode resulting correspondences utilizing a symmetric-key figure. The plan was first distributed freely by Whitfield Diffie and Martin Hellman in 1976, Diffie-Hellman key assention itself is a mysterious (non-validated) key-understanding convention, it gives the premise to an assortment of verified conventions, and is utilized to give impeccable forward mystery in Transport Layer Security's brief modes as in [1]. In the first depiction papers, the Diffie-Hellman trade independent from anyone else does not give verification of the imparting parties and is along these lines vulnerable to a man-in-the-center assault. An assaulting individual in the center may set up two diverse Diffie-Hellman key trades, with the two individuals from the gathering "An" and "B", showing up as "A" to "B", and the other way around, enabling the aggressor to unscramble (and read or store) at that point re-scramble the messages go between them. A strategy to validate the conveying gatherings to one another is by and large expected to keep this kind of assault. Hisham Al [44] “Accuracy and Security Evaluation of Multi-Factor Biometric Authentication”, In this paper intends to assess the security and exactness of Multi-Factor Biometric Authentication (MFBA) plans that depend on applying User-Based Transformations (UBTs) on biometric highlights. Regularly, UBTs utilize change keys produced from passwords/PINs or recovered from tokens. In this paper, we not just feature the significance of reenacting the situation of bargained change keys thoroughly, yet additionally demonstrate that there has been misevaluation of this situation as the outcomes can be effectively confounded. Specifically, we uncover the deception of the generally revealed case in the writing that on account of stolen keys, validation precision drops yet stays near the verification exactness of biometric just framework. We demonstrate that MFBA frameworks setup to work at zero (%) Equal Error Rates (EER) can be undermined in case of keys being imperiled where the False Acceptance Rate achieves inadmissible dimensions. We exhibit that for usually utilized acknowledgment conspires the FAR could be as high as 21%, 56%, and 66% for iris, unique finger impression, and face biometrics separately when utilizing stolen change keys contrasted with close to zero (%) EER when keys are accepted secure. We likewise examine the exchange off between enhancing precision of biometric frameworks utilizing extra validation factor(s) and bargaining the security when the extra factor(s) are imperiled. At long last, we propose components to improve the security and additionally the exactness of MFBA plans. Alawi A [49] “Biometric Cryptosystem with Renewable Templates”, In this paper, the significant test of security assurance of biometric layout is enhance the security of the biometric format. Biometric cryptosystems were proposed to conceal the cryptographic keys and in addition furnish security assurance of biometrics related with the conventional biometric frameworks. A fluffy duty conspire is a case of such frameworks. In addition, the biometric information can't be dropped or changed, once the biometric layout is endangered. At that point, all applications relying upon this present client's biometric information are imperiled until the end of time. In this manner, it is attractive to have plans that secure the biometric format and also create another novel example if the one being utilized is lost to be received in viable biometric applications. In this paper, we coordinate the fluffy duty approach with biometrics to accomplish another and less difficult sort of cancelable biometric plot in which the layout is security ensured, and numerous fluffy duties of the formats can be gotten from the equivalent biometric format with the end goal of format inexhaustibility. Srivastava Himanshu [56] “A Comparison Based Study on Biometrics for Human Recognition”, In this paper, a biometric framework gives programmed acknowledgment of an individual dependent on a remarkable component or trademark controlled by the person. These biometric trademark may physiological or social. Not at all like other ID techniques, for example, id verification, tokens and secret key, the unmistakable part of biometric acknowledgment comes into light from arbitrarily circulated highlights in individual. In this paper, I portray the novel examination dependent on different angles to make simple determination for biometric gadget sending in particular condition. This paper proposes a correlation among all sort of biometric framework accessible in the general public. The current PC security frameworks utilized at different spots like saving money, international ID, Mastercards, shrewd cards, PIN , get to control and system security are utilizing username and passwords for individual distinguishing proof. Biometric frameworks additionally present a part of client comfort; it implies one can be approved by speaking to himself or herself. In this paper, the principle center is around working essential of biometric strategy, the different biometrics frameworks and their examinations. Shrivastava Ankit, [60] “Fingerprint identification using feature extraction”, In this paper, a writing overview of a few systems used to separate highlights of a unique mark and additionally coordinating them with the database is indicated in this paper. A portion of the studied research papers have utilized customary systems, for example, distinguishing proof strategies and confirmation procedures, while alternate articles have utilized novel techniques. To structure and build up a unique mark highlight extraction technique and to coordinate them utilizing pixel subtle elements, above all else fingerprints of good quality are procured utilizing a high goals scanner. Picture upgrade and diminishing should be possible. At long last highlights are extricated and assessed. These evaluated highlights are utilized to coordinate with the layout database utilizing pixel based coordinating calculation. The highlights are special, which enable a solitary element to be appropriately coordinated with high probability against a substantial database of highlights. Pakutharivu P. [61] “A Comprehensive Survey on Fingerprint Recognition Systems”, Coordinating fingerprints is the most prevalent biometric procedure utilized for giving validation. Unique fingerprint recognition frameworks checks for crude picture, performs small preprocessing, highlights are separated as vectors and put away in unique finger impression databases. An audit on different parts is displayed in this paper. The paper briefs different kinds of unique mark designs, trailed by details based methodology. Unique mark edges called details can catch the invariant and prejudicial data present in the unique mark pictures. Example acknowledgment based methodology is additionally contemplated pursued by wavelet based methodologies. The difficulties and issues identifying with fingerprint recognition system are basically checked on in this paper. It is imperative for unique mark acknowledgment framework to utilize great quality, clamor free unique finger impression picture as contribution to accomplish high exactness. Different unique mark picture improvement systems were likewise broke down and examined in this paper. Kashyap Bharti [63] “A Review on Multi-Biometric Cryptosystem for Information Security”, In this paper, Unique: Multi-biometric framework gives imperative and anchored philosophy for upgrading the security dimension of data innovation. The uniqueness of biometrics for a particular individual makes the ID framework more secure. The customary cryptosystem experiences a few issues, for example, key administration, key protection. Consolidating cryptography with biometrics evacuates such sort of issues and utilized for key age. Here key might be created by utilizing at least two biometric factors. Mouad .M [64] “Overview of Fingerprint Recognition System”, In this paper, it is an outline of an ebb and flow inquire about dependent on unique mark acknowledgment framework. In this paper we featured on the past investigations of unique mark acknowledgment framework. This paper is a concise audit in the applied and structure of unique mark acknowledgment. The fundamental unique mark acknowledgment framework comprises of four phases: right off the bat, to catch the biometric information for is utilized in enrolment process and acknowledgments, we use some sensors. Furthermore, the pre-handling stage which is utilized to evacuate undesirable information and increment the lucidity of edge structure by utilizing upgrade strategy. Thirdly, to remove the unique mark highlights we collect all things from the pre-preparing stage include extraction organize .Fourthly, the coordinating stage is to contrast in the database to the obtained highlight and the layout. At long last, the DB which write the highlights for the coordinating levels. The point of this paper is to audit different as of late work on unique finger impression acknowledgment framework and clarify unique mark acknowledgment arranges well ordered and give synopses of unique finger impression databases with qualities. Kumar Amioy [65] “A Cell-Array-Based Multibiometric Cryptosystem”, In this paper displays another system the competitor biometric methodology is anchored utilizing two capacities: 1) BCH encoding, which conveys the equality code put away for the arrangement of the inquiry biometric format and 2) the Hash capacity to process hash-code with the end goal to protect its honesty. The shaped of cryptosystem by making two diverse cell-exhibits. The one cell-exhibit by scattered by hash-code on by a haphazardly picked section position, and the mystery key is appropriated throughout the second cell-cluster on a similar position. The other cell-cluster areas are lled with the haphazardly produced waste vectors. The equality code is then disordered up utilizing a regenerative XORCoding with the end goal to conceal it from unapproved get to. At the opening stage, the equality code is recovered utilizing XORcode and used to adjust the inquiry layout to the first one. On the off chance that the hashed-code figured from the adjusted layout can find the right areas of the first hash-code from the element cluster. The proposed calculation is actualized and assessed in two basic modes: (i) multimodal (ii) unimodal. Gupta Himanshu [66] “A model for biometric security using visual cryptography”, In this paper, the advancement of advances has begun for expanding the security dimension of information. Designer and clients cought to comprehend that there is no ideal answer for an anchored secret key and it has its own specific manner of encryption and unscrambling. Passwords are produced incidentally and they might be broken effortlessly. Human are having their very own particular personality which is interesting. Biometric is an element used to recognize a specific individual by its DNA structure, fingerprint or tongue. Then again this element should be secure from wrong hands since it might be abused by any assailant. Along these lines, this paper proposing a model which is comprising blend of Visual Cryptography and Steganography with the relationship of QR codes. Here, we are utilizing Visual Cryptography for making two offers in which one of the offer will be turned in a clock astute course around 180 degree and other around 270 degree and after that we are executing Steganography by utilizing two's supplement on both the offer picture. After the change of offers into stegano images, we are changing over one of the stegano image into a QR code which will be kept mystery with the client. Amid the confirmation time, the QR code will be required for the validation of client. Mouad M. H [67] “Fingerprint Recognition for Person Identification and Verification Based on Minutiae Matching”, In this paper, this article is a review of an ebb and flow examine dependent on fingerprint authentication system. We check in this paper featured at the past investigations of fingerprint (unique mark) acknowledgment framework. Here it is a concise audit in the calculated and structure of finger impression acknowledgment. The fundamental image acknowledgment framework comprises of four phases: right off the bat, the sensors, which is utilized for enrolment and acknowledgment to catch the biometric information. Besides, the pre stage of processing which is utilized to evacuate undesirable information and edge structure of the lucidity increment by utilizing improvement method. Thirdly, highlight extractions arrange take the contribution by the yield of the pre-preparing stage to remove the fingerprint highlights. Fourthly, the coordinating level is to contrast the procured highlight and the format in the DB. At long last, the store the highlights in database for the coordinating levels. The paper is to use to survey different as of late work on finger print acknowledgment system and clarify unique finger impression acknowledgment organizes well ordered and give rundowns of unique mark databases with qualities.
Goyal Hriday [68] “Fingerprint Detection and Authentication Using Feature Extraction Based on Minutiae”, In this research paper manages the unique mark recognition and Authentication utilizing highlight extraction dependent on particulars. A few ideas of picture handling like picture upgrade, picture division, picture are utilized in it. Different calculations are created to finish the previously mentioned assignment and for particulars coordinating. The figurings are prepared for finding correspondences between data details structure and set away particulars plan without relying upon careful request. From survey on a database, the different people fingerprint, we can make structure after execution. Pal Om [69] “Diffie-Hellman Key Exchange Protocol with Entities Authentication”, in this paper, the Diffie-Hellman key trade convention gives the chance to touch base at a typical mystery key by trading writings over unreliable medium without meeting ahead of time. Diffie-Hellman key trade convention is constrained to the trading of key as it were. Because of absence of verification of elements, this convention is helpless towards man-in-center assault and pantomime assault. To take out the man-in-center assault, Galla Lavanya K [70] “Implementation of RSA”, In this paper, open key Cryptography, otherwise called hilter kilter encryption is a type of cryptosystem which utilizes two keys, open key and private key for encryption and decoding separately. This sort of cryptosystem helps in accomplishing privacy, confirmation or both. Open key cryptography incorporates key trade, computerized marks, and encryption of squares of information. Among the general population key cryptosystem calculations, RSA is the most broadly utilized. It is a protected technique for transmitting information. It is a square figure framework, which depends on number hypothesis. RSA incorporates Key age, encryption and unscrambling steps. The security of RSA relies upon the factorization of numbers. Numerous effective calculations were created to upgrade the idea of number hypothesis in RSA and to defeat the assaults. In this paper, we talk about the Public-key cryptosystems and the usage of RSA calculation in detail and the utilization of RSA in current programming.
III. BIOMETRIC SYSTEM DESIGN
A. Design Of Biometric System
A fingerprint, unique mark authentication framework comprises of fingerprint gaining gadget, minutia extractor and minutia matcher see Fig 3.1.
For fingerprint, unique mark caught, optically or semiconductor (semi-direct) sensors are utilized generally. They all comes with high effectiveness and also satisfactory precision aside from a very few conditions like as the user's finger is excessively noisy or dry. This minutia based extractor and the minutia based matcher modules are clarified in calculation plan and other ensuing segments.
B. Algorithm Design
To execute a minutia based extractor of a biometric, mainly fingerprint, here, a three-organize approach is broadly utilized by analysts. These are pre-processing concept; then minutia based extraction and finally post-preparing stage see Fig 3.2. For the unique finger picture pre-processing stage, we utilize Histogram Equalization technique and Fourier Transform technique to do picture improvement and then after that the unique finger impression picture or image is binarized and utilizing some locally technique with some limits. The part of picture division is to do the satisfied by a three-advance methodology: segmentation by direction intensity, block direction based estimation, and the Region of Interest (ROI) based extraction by Morphological activities.
Other generally creates techniques utilized in the pre-processing stage however they shape another blend through experimentation. Likewise I present the morphological activities for extraction ROI (Region of Interest) to unique finger impression picture segmentation.
The K is a decided steady as tentatively, here we pick up K=0.4 to compute. While having a much higher "the value of K" presence of the ridges using enhances, on the top off small openings in ridges, having much higher an estimation of "K" , it can produce result in bogus of ridges joining. In this manner an end can convert into a bifurcation. Fig 3.6 presents the picture after Gaussian filter improvement.
In picture preparing, a Gaussian channel is a channel whose motivation reaction is a capacity of Gaussian. The actual properties having of the Gaussian channels of no other overshoot to a stage work inputs while minimization the ascent and time of falling. This associated with the way that the Gaussian channel has the base conceivable deferral as a conduct is firmly. It is viewed as the perfect time area channel constantly; similarly as the sin c is the perfect recurrence space channel. This property is essential around there, for example, oscilloscopes and advanced media transmission frameworks. A Gaussian channel adjusts the any information motion by convolution with a Gaussian function.
D. Fingerprint Image Binarization
Binarization is a strategy for changing white or black pixels from grayscale picture on a threshold. Binarization is moderately simple to accomplish contrasted and other picture handling strategies.
E. Fingerprint Image Segmentation
To confine frontal region and establishment square insightful change at that point constrain is used. All around, only a Region of Interest (ROI) is very useful to be seen for every remarkable finger impression based picture. The image zone without convincing all ridges and all wrinkles is first discarded since it is holds just establishment information.
In this procedure an iterative, parallel diminishing calculation has awful proficiency despite the fact that it can get a perfect diminished edge outline enough sweeps. [22] It utilizes a one-in-all strategy to remove diminished ridges from dim level unique mark pictures specifically. This strategy follows along the ridges having most extreme dark gray esteem. In any case, binarization is certainly authorized since just pixels with most extreme dim power esteem are stayed unaltered. In this manner the third strategy is utilizes the worked in Morphological thinning function in MATLAB.
2) The Marking Of Minutia
After the fingerprint ridge thinning (unique mark edge diminishing), stamping minutia focuses is generally simple process. Be that as it may, it is no less than one exceptional case summons my alert amid the minutia stamping stage. Ridge bifurcation and endings are the agent highlight of a fingerprint, unique finger impression picture. In programmed or automatic recognizable proof framework the two essential highlights are alluded to as particulars minutia. To decide the area of particulars in a unique mark picture, we utilize the details Extraction technique proposed in a 3×3 window for particulars assurance set on a parallel binary picture. A pixel N with different eight neighboring point (Y1,… .., Y8)are characterized also. The request of nearest is allocated a clockwise way starting from the upper left corner. X (n) speaks to the estimation of pixel Yn.
Here just handles the case h1, h4, h5 and h6. It has not false evacuation minutia by essentially accepting the picture quality is great. It has not a deliberate mending technique to expel that fake minutia in spite of the fact that it records a wide range of false minutia appeared in Fig 3.13 aside from the h3 case.
In this strategies, the procedure 3 fathoms the h4, h5 and h6 cases in a solitary check schedule. What's more, after system 3, then the quantity of false minutia fulfilling the h7 case is altogether diminished.
4) Bifurcations And Terminations Of Ridges
Since different information procurement conditions are, for example, impression weight can without much of a stretch change the one sort of minutia into another yet most specialists embrace the unification portrayal for both end and bifurcation. So every minutia is totally described by the a few axis parameters finally: (i) x-facilitate (ii) y-organize, (iii) introduction or orientations.
The introduction estimation for a showing bifurcation should be extraordinarily considerable events. Each of the three edges getting from the all considered bifurcation point or pixels have their own bearing, just picks the base edge among the three anticlockwise introductions beginning from the x-hub. The two techniques cast that the other two bearings away, so here some loses of data.
Here we propose another portrayal to bifurcation break into three different terminations. Then the every one of the three neighbor pixels are the three new terminations of the bifurcation and every one of the other three edges associated with the bifurcation before its currently connected with an end separately observe Fig 3.14.
5) Match Score: Minutia Match
The relationship of particulars is additionally considered in existing work. This method can defeated impact of revolution issue with a huge edge or large angle. The arrangement uses less data and performed proficiently by utilizing the accompanying condition.
First we take the info inquiry unique fingerprint mark picture. At that point Take the center point is situated at the focal point of the element delineate. After then areas of particulars are mapped to comparing segments. Among the locale of an area, on the off chance that at least one points are endings of ridges or bifurcations then the estimation of a segment is also added to indicate the sort of details and total numbers.
IV. METHODOLOGY
A. Aims And Objectives Of Biometric Cryptosystem
The objective of this research work for develop acceptance for input fingerprint based cryptosystem with authentication and security. It can also used in any secure transmission and communications with the help of intentionally used algorithm and security arrangement with trusted environment. The main objectives and aim of this biometric cryptosystem can be defined as follows:
In the above discussed cases, the cryptographic key or parameter is released for a successfully authentication system [11]
V. RESULTS
A. Experimentation
In this work, a database of fingerprint images from the Internet is utilized to test the analysis execution like FVC 2002, FVC 2004 and so on. My execution part, MATLAB program tests every one of the pictures with no calibrating for the database. The execution of a unique finger impression validation framework can be assessed by estimating its false acknowledge rate and the false reject rate. Here, by assessing the FAR and FRR, the threshold limit of coordinating, score of matching choosing whether to dismiss or acknowledge a match. In this paper, we have taken 50 fingerprint images from the finger impression database and each unique finger impression image put away four times in database. It implies I am investigating 200 fingerprint images and computing false reject rate and false accept rate and by utilizing matching score and this score depends on threshold value. In the event that I take less edge esteem it implies the likelihood of the acknowledged picture will be high and rejected picture will be low and because of this , odds of happening mistake will be expanded and the other way around.
The Simulation or find out the results of Gabor filter based and other one is Gaussian filter based fingerprint matching with different Threshold values and findings false reject rate and false accept rate is given below (Why we show here other filter because Gaussian filter is much better than some other filter):
Table 5.1: The simulation consequences of fingerprint image (Gabor filter based) matching with various threshold limit
Other Filter |
TH_V=8 |
TH_V=5 |
TH_V=3 |
TH_V=1 |
FAR |
0.8% |
1.5% |
2.4% |
3.2% |
FRR |
22.6% |
18.5% |
12.6% |
10.2% |
Table 5.2: The simulation consequences of fingerprint image (Gaussian filter based) matching with various threshold limit
Gaussan Filter |
TH_V=8 |
TH_V=5 |
TH_V=3 |
TH_V=1 |
FAR |
0.20% |
0.46% |
1.80% |
1.92% |
FRR |
16.0% |
12.0% |
10.0% |
8.8% |
The fingerprint database is comprised of fingerprint images. Here, I utilize an arrangement of 200 images. Each images caught by scanner or by unique finger impression database and apply the six stages on each picture, Image improvement by using image enhancement, Image binearization, Image division by image segmentation, Thinning, Minutiae stamping, Remove false particulars minutia, on each image and spare as a layout in database for later utilize. In the event that we need confirmation of a picture then we utilize the all means on this caught picture lastly we check the coordinating score by utilizing the two channels based on limit esteem.
Here all means are same for each picture with the exception of Image Enhancement step. In this progression we utilize Histogram evening out system and after that utilization the Gabor channel and Gaussian channel one by one and get results from each channel which results depend on the FAR and FRR. Which gives the lessened FAR and FRR, this channel is superior to other. We can state that by utilizing Gaussian channel and Gaussian channel is better observe in Fig 5.2 and Fig 5.3 by showing the signs of improvement observations. The recreation results are appeared in Table [5.1] and the Table [5.2].
VI. ACKNOWLEDGEMENT
Firstly, I would like to express my sincere thanks and deep sense of gratitude to my supervisor Prof. Mohd. Vakeel, Professor, Department of Computer Science & Engineering RDEC Ghaziabad who gave and provide me the opportunity to work on this topic and also inspired me to carry forward this work as a challenge. I am greatly indebted to Dr. Dharamveer Singh. Coordinator- M.Tech, RDEC, Ghaziabad for their kind suggestions and cooperation throughout my study. I also thank him for encouragement and take personal attention which have provided me good and smooth basis for my thesis work. I would like to thanks each and every one who has helped me directly or indirectly in completing my present study.
Finally, this thesis work is dedicated to my parent for their support throughout the course in RDEC, Ghaziabad.
Cryptography and Biometrics have been as competing technologies nowadays and very much useful in digital environment for security purpose. We can work separately or with as a collaboration. The two developed technologies activities in isolation, sometime in competition to each other. The two aspects have created to the establishment of new biometric cryptosystem by using two different types of security problems the adding between these. Based on this merging system, the biometric cryptosystem categorized into many modes like use RSA algorithm, use public key cryptosystem etc and in biometric we can use another filter and methods. We can also use fingerprint as a key for cryptographic system and in this thesis work if fingerprint matched then we use another method of key exchange, if the keys are matched now then we release the cryptographic key or secret message or any other data released from its secure location, like as a server etc. In this thesis work, it is very much secure method or system after merging of two best technique of security in this digital environment. This Biometric cryptosystem is giving to an ideal technology with combination of security integration. The biometric cryptosystem can be carried out in three different modes: fingerprint matching, key matching or key generation, binding to both and we can say it is 3-tire security. The biometric matching is very risky process and in this thesis work, we take two important aspects first one is False Accept Rate (FAR) and other one is False Reject Rate (FRR). Then the increases FAR are more dangerous thing then FRR because if FAR is low then any unauthorized person can enter in our system so we have taken a best filter to reduce the FRR and increase the FRR. After this high security if any unauthorized person enter in our system then again he/she face a next key exchange security if he/she have not an initial keys then they cannot success in his/her bad thinking. The cryptographic mode is designed to work with given biometric characteristics, which is represented as not in ordered set. The cryptography key with biometric has to be increase the security of the framework or system and to enhance the privacy issues related to the biometric template and extracted features. The biometric cryptosystem technique suffers from several limitations like biometric image based quality, good validation, image alignment and enhancement etc and in the next level technique the limitation is Man-in-Middle Attack aspect. If any unauthorized person can enter by using fake fingerprint impression and he/she also know the initial keys then they can loss to us. In this thesis work the fingerprint image quality assessment by using Gaussian filter analysis. This algorithm used good analysis level in evaluating fingerprint image. The benefit of this algorithm is that it concluded in deciding on the enrolment rejecting or accepting as well as on the type of image enhancements technique that is needed. This is developed by MATLAB (Matrix Laboratory) and related technology.
[1] Jain A.K, Hong L., and Bolle R., “On-Line Fingerprint Verification”, IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 19, Issue 4, pp. 302-313. Apr. 1997. [2] Thai Raymond,” Fingerprint Enhancement and Minutiae Extraction”. [3] Amengual, J. C., Juan, A., Prez, J. C., Prat, F., Sez, S., and Vilar, J. M. “Real-Time Minutiae extraction in Fingerprint Images”, IEEE, Proceedings of the 6th International Conference on Image Processing and its Applications, pp.871– 875, July 1997. [4] Soutar C., Roberge D., S. A. Stojanov, R. Gilroy, and B. V. K. Vijaya Kumar. Biometric encryption - enrollment and verification procedures. In Proc. SPIE, Optical Pattern Recognition IX, Vol. 3386, pages 24-35, 1998. [5] Davida G. I., Frankel Y., and B. J. Matt,”On enabling secure applications through on-line biometric identification. In Proc. 1998 IEEE Symposium on Privacy and Security, pages 148-157, 1998 [6] http://www.biometrics.org. [7] Soutar C., D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. Kumar, \"Biometric encryption using image processing,\" SPIE, Optical Security and Counterfeit Deterrence Techniques II, Vol. 3314, pp. 178-188., 1998. [8] Davida G. I, Frankel Y., and B. J. Matt, \"On enabling secure applications through off-line biometric identification,\" presented at IEEE Symposium on Security and Privacy Proceedings, USA, 1998. [9] Jain L.C., U.Halici, I. Hayashi, S.B. Lee and S.Tsutsui “Intelligent Biometric Techniques in Fingerprint and Face Recognition”,, the CRC Press. 1999. [10] Cole S.A.. Suspect Identities “ A History of Fingerprinting and Criminal Identification” ,IEEE, Harvard University Press, Cambridge, Massachusetts, London, England, 2001. [11] Arantes Milene, Alessandro Noriaki Ide, Jose Hiroki Saito “A System for Fingerprint Minutia Classification and Recognition”, IEEE, Vol. 5, pp 2474-2478, ICONIP-2002. [12] Maio D, Maltoni D, Wayman J. L,Jain A. K., \"FVC2002: Second Fingerprint Verification Competition,\" in Proceedings of International Conference on Pattern Recognition, Quebec City, Canada, August 2002, pp. 811-814. [13] Fingerprint Verification Competition (FVC), 2000, http://bias.csr.unibo.it/ fvc2000/. [14] David Maltoni, Dario Maio, Jain Anil k, Prabhakar Salil,” Hand Book of Fingerprint Recognition”, Springer Verlag, New York, NY, USA, June 2003. [15] Leniski A. C, Skinner R. C, McGann S. F,Elliott S. J., \"Securing the biometric model,\" presented at Security Technology. Proceedings of the 37th IEEE Annual 2003 International Carnahan Conference, 2003. [16] Chang Y.J, Zhang W, Chen,T \"Biometrics-based cryptographic key generation ,\" presented at IEEE International Conference on Multimedia and Expo, 2004. [17] Uludag U, Pankanti S., Prabhakar S, Jain A. K, \"Biometric cryptosystems: issues and challenges\" Proceedings of the IEEE, Vol. 92, pp. 948-960, 2004. [18] Jinwei Gu, \"a model-based method for the computation of fingerprints orientation field\", IEEE Transactions on Image Processing, Vol. 13, Issue 6, pp. 821-835, 2004. [19] Holder Eric H, Robinson Laurie O, Laub John H,”The Fingerprint: Source Book”, U.S Department of Justice. www.nij.gov [20] Fingerprint Verification Competition (FVC), 2004, http://bias.csr.unibo.it/ fvc2004/. [21] Shunshan Li, Min Wie, Haiying Tang, Zhuang Tiange ,Michael H. Buonocore”Image Enhancement Method for Fingerprint Recognition Method”, IEEE proceeding, Engineering in Medicine and Biology 27th annual Conference, Shanghai, Chaina, p.p.3386- 3389, Sep 2005. [22] Tsong-Liang Huang, Liu Che-Wei,Jui-Peng lin,Chien-ying li, Kuo Ting-Yi,”A Novel Scheme for Fingerprint Identification”, IEEE ,CRV- 2005. [23] Yang S, Verbauwhede I,” Automatic secure fingerprint verification system based on fuzzy vault scheme”, In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp 609-612, 2005 [24] li Shunshan, Wei Min, Tang Haiying, Zhuang Tiange , Buonocore Michael H, \"Image Enhancement Method for Fingerprint Recognition System.\", IEEE, pp. 3386-3389, Sep 2005. [25] Altarawneh M. S., Woo W.L., and Dlay S. S., \"Biometrics And Future Security\", in Proceedings of MU International Conference on Security, Democracy and Human Rights, Mutah, Jordan, 10-12 July 2006. [26] Hao F, Anderson R, Daugman J, \"Combining Crypto with Biometrics Effectively\", IEEE Transactions on Computers, Vol. 55, pp. 1081-1088, 2006. [27] Uludag U, Jain A.K, \"Securing fingerprint template: fuzzy vault with helper data\", Proc. IEEE Workshop on Privacy Research In Vision, pp. 163, June 2006. [28] Peihao Huang, Yung Chang Chia, Chan Chaur-Chin” Implementation of An Automatic Fingerprint Identification System”, IEEE ,EIT,2007 Proceeding ,p.p. 412-417, 2007. [29] Markus Huppmann”Fingerprint Recognition by Matching of Gabor Filter-based patterns”,15th January 2007. [30] Ross A, Shah J, Jain A.K,\" From Template to Image: Reconstructing Fingerprints From Minutiae Points\", IEEE Transactions on PAMI, Vol. 29, Issue 4, pp.544-560, Apr 2007 [31] Yuan Wang, Yao Lixiu, Zhou Fuqiang, \"A real time fingerprint recognition system based on novel fingerprint matching strategy\" ,The eighth international conference on electronic measurement and instruments, ICEMI 2007. [32] Zhao F, Tang X, \"Preprocessing and post processing for skeleton-based fingerprint minutiae extraction\", Pattern Recognition, Vol. 40, pp. 1270-1281, 2007. [33] Sambasiva Rao G, Nagarajun C., Reddy L.L.S., Prasad E.V.”A Novel Fingerprint Identification System Based on The Edge Detection”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 8, Issue 12, pp.394-397,Dec 2008. [34] Qijun Zhao, Lei Zhang, David Zhang, Nan Luo, \"Adaptive Pore Model for Fingerprint Pore Extraction\", Proc. IEEE, 978-1-4244-2175-6/08, 2008. [35] Kaur Manvjeet, Singh Mukhwinder, Akshay Girdhar, Parvinder S. Sandhu, \"Fingerprint Verification System using Minutiae Extraction Technique\", World academy of Science, Engineering and Technology, page no. 46, 2008. [36] Nawaj Tabassam, Saim Parvaiz, Korrani Arash, Azhar-Ud-Din,” Development of ademic Attendance Monitoring System Using Fingerprint Identification”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 9, Issue 5, pp.164-168, May 2009. [37] Vatsa Mayank, Singh Richa, Noore Afzel, Singh Sanjay K, \"Combining pores and ridges with minutiae for improved fingerprint verification.\" Elsevier, Signal Processing 89, pp 2676-2685, 2009. [38] Chen Yi, Jain A K, \"Beyond Minutiae: A Fingerprint Individuality Model with Patteren Ridge and Pore Features\", International Conference on Biometrics, pp. 523-533, 2009. [39] Ramaswamy G, Sreenivasarao V, Ramesh P, Kiran Dr, “A Novel Approach for Human Identification through Fingerprints”, International Journal of Computer Applications (0975 –8887).pp 169-173, July 2010. [40] Stalling, William, “Cryptography and Network Security” Principles and Practice, Upper Saddle River, NJ:Prentice Hall Press, 2010 [41] Ferhaoui Chafia,Chitroub Salim,Benhammadi Farid,” A biometric crypto-system for authentication”, IEEE, Nov 2010. [42] Li Nan ,” Research on Diffie-Hellman key exchange protocol”, 2nd International Conference on Computer Engineering and Technology, IEEE, June 2010. [43] Bansal Roli, Sehgal Priti, Bedi Punam, \"Minutiae Extraction from Fingerprint Images\", IJCSI International Journal of Computer Science, Vol. 8, Issue 5, September 2011. [44] Hisham Al-Assam, Harin Sellahewa, Sabah Jassim,”Accuracy and Security Evaluation of Multi-Factor Biometric Authentication”, International Journal for Information Security Research (IJISR), Vol 1, Issues 1/2, pp 11-19, March/June 2011. [45] Pannirselvam S, Raajan P “An Efficient Finger Print Enhancement Filtering Technique with High Boost Gaussian Filter (HBG)”, International Journal of Advanced Research in Computer Science and Software Engineering, pp- 370- 378, Vol 2, Issue 11, Nov 2012. [46] Ramamoorthy R. P, \"Fingerprint and palmprint Recognition Approach based on Multiple Feature extraction\", European Journal of scientific research, Vol. 76, Issue 4, 2012. [47] Deshpande A. S, Patil S. M, Lathi R., \"A Multimodel Biometric Recognition System based on Fusion of Palmprint Fingerprint and Face\", Internntional Journal of Electronics and Computer Science Engineering, 2012. [48] Gayathri R, Ramamoorthy P, \"Fingerprint and palmprint Recognition Approach based on Multiple Feature extraction\", European Journal of scientific research, Vol. 76, Issue 4, 2012. [49] Alawi A. Al-Saggaf, Lahouari Ghouti, Haridas S. Acharya “Biometric Cryptosystem with Renewable Templates”, National Workshop on Information Assurance Research, April 2012. [50] Thomas,Ginu , Rahimunnisa K, Parayil Sonima “Efficient Cryptographic Key Generation Using Fingerprint”, International Journal of Scientific & Engineering & Research, pp 942-945, Vol 4, Issue 4, April-2013. [51] Kumar R, Chandra P, Hanmandlu M, \"Local directional pattern (LDP) based fingerprint matching using SLFNN\", IEEE Second International Conference on Image Information Processing (lCIIP), pp. 5493-498, 2013. [52] Zahedi Morteza, Ghadi Ozra Rostami, \"Combining Gabor filter and FFT for fingerprint enhancement based on a regional adaption method and automatic segmentation\", in SIViP, london:springer verlag, 2013. [53] Yang Jucheng, Shanjuan Xie, Sook Yoon, Dongsun Park, Zhijun Fang, Shouyuan Yang, \"Fingerprint matching based on extreme learning machine\", in Neural comput& applic, London:Springer-Verlag, Vol. 22, pp. 435-445, 2013. [54] Chen F, Huang,X, Zhou J, \"Hierarchical minutiae matching for fingerprint and palmprint identification\", IEEE Trans. Image Process., Vol. 22, pp. 4964-4971, 2013. [55] Singh Gurpreet, \"A study of encryption algorithms (RSA DES 3DES and AES) for information security\", International Journal of Computer Applications, Vol. 67, Issue 19, 2013. [56] Srivastava Himanshu,”A Comparison Based Study on Biometrics for Human Recognition”,IOSR Journal of Computer Engineering (IOSR-JCE),e-ISSN: 2278-0661, ISSN: 2278-8727, Vol 15, Issue 1, PP 22-29, Sep. - Oct. 2013. [57] Sousedik Ctirad, Busch Christoph” Presentation attack detection methods for fingerprint recognition systems: a survey” , Published in IET Biometrics, , IET Biom, Vol. 3, Issue 4, pp. 219–233, Nov 2013. [58] Harsha S. Gardiyawasam Pussewalage, Jiankun Hu, Josef Pieprzyk, \"A survey: Error control methods used in bio-cryptography\", Fuzzy Systems and Knowledge Discovery (FSKD) 2014 11th International Conference on, pp. 956-962, 2014. [59] Vij Akhil, Namboodiri Anoop \"Learning Minutiae Neighborhoods: A New Binary Representation for Matching Fingerprints\", 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2014. [60] Shrivastava Ankit, Srivastava Devesh Kumar,” Fingerprint identification using feature extraction: A survey”, International Conference on Contemporary Computing and Informatics (IC3I), IEEE, 2015. [61] Pakutharivu P. , Srinath M. V. ,” A Comprehensive Survey on Fingerprint Recognition Systems”, “Indian Journal of Science & Technology”, Vol 8, Issue 35, pp1-7, Dec 2015. [62] Pal Singh Ravindra, Dixit Manish, \"Histogram Equalization: A Strong Technique for Image Enhancement\", International Journal of Signal Processing Image Processing and Pattern Recognition, Vol. 8, Issue 8, pp. 345-352, 2015. [63] Kashyap Bharti, Satao K. J,”A Review on Multi-Biometric Cryptosystem for Information Security”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 5, May 2015. [64] Mouad .M.H.Ali , Vivek H. Mahale , Pravin YannawarA. T. Gaikwad“, Overview of Fingerprint Recognition System” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016 , IEEE, Nov 2016. [65] Kumar Amioy, Kumar Ajay” A Cell-Array-Based Multibiometric Cryptosystem”, IEEE, Vol 4, 2016. [66] Goyal Hriday , Verma Gaurav , Arora Chetan , “Fingerprint Detection and Authentication Using Feature Extraction Based on Minutiae”, 8th International Conference on Computational Intelligence and Communication Networks (CICN), IEEE, Oct 2017. [67] Pal,Om, Alam,Bashir”Diffie-Hellman Key Exchange Protocol with Entities Authentication”, International Journal Of Engineering And Computer Science ISSN:2319-7242,Vol 6, Issue 4, pp 20831-20839, April 2017. [68] Galla Lavanya K. , Koganti Venkata Sree Krishna , Nuthalapati Nagarjuna ,” Implementation of RSA”, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), IEEE, July 2017. [69] S Kumar and D. Singh, Energy and exergy analysis of active solar stills using compound parabolic concentrator, International Research Journal of Engineering and Technology (IRJET), 6 (2019) 12. [70] R. Shanker, D. Singh, D. B. Singh “Performance analysis of C.I. engine using biodiesel fuel by modifying injection timing and injection pressure” International Research Journal of Engineering and Technology(IRJET) 6 (2019) 12. [71] A. K. Anup and D. Singh, FEA analysis of refrigerator compartment for optimizing thermal efficiency, International Journal of Mechanical and Production Engineering Research and Development, 10 (2020) 3, 3951-3972. [72] S Kumar and D. Singh, Optimizing thermal behavior of compact heat exchanger, International Journal of Mechanical and Production Engineering Research and Development, 10 (2020) 3, 8113-8130. [73] Dharamveer and Samsher, Comparative analyses energy matrices and enviro-economics for active and passive solar still, materialstoday: proceedings, https://doi.org/10.1016/j.matpr.2020.10.001 (2020). [74] Dharamveer, Samsher, Anil Kumar, Analytical study of Nth identical photovoltaic thermal (PVT) compound parabolic concentrator (CPC) active double slope solar distiller with helical coiled heat exchanger using CuO Nanoparticles, Desalination and water treatment, 233 (2021) 30-51, https://doi.org/10.5004/dwt.2021.27526 [75] Dharamveer,Samsher, Anil Kumar,Performance analysis of N-identical PVT-CPC collectors an active single slope solar distiller with a helically coiled heat exchanger using CuO nanoparticles, Water supply, October 2021, SCI-E Index, IWA Publication. I.F 1.275,https://doi.org/10.2166/ws.2021.348 [76] M. Kumar and Dharamveer Singh, Comparative analysis of single phase microchannel for heat flow Experimental and using CFD, International Journal of Research in Engineering and Science (IJRES), 10 (2022) 03, 44-58.
Copyright © 2022 Alka Chauhan, Dharamveer Singh, Mohd Vakil. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET44945
Publish Date : 2022-06-27
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here