Você está na página 1de 3

IPASJ International Journal of Computer Science (IIJCS)

A Publisher for Research Motivation ........

Volume 2, Issue 2, February 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm Email: editoriijcs@ipasj.org ISSN 2321-5992

Providing Multi-Authentication Using Multi-Biometric Cryptosystem For Enhancing Security


Mr.V.Manogajapathi1 , S.Avinassh2, N.Karthik3 and S.Chandrasekar4
1

Lecturer, CSE, Christ College of Engg&Tech, Pondicherry, India Student, CSE, Christ College of Engg&Tech, Pondicherry, India

2,3,4

ABSTRACT
Authentication schemes involving Multi Biometric System starts with several identification and verification based security. The proposed system provide safeguarded verification to incorporate this method with ECC that works two copies (i) Blending of fingerprint, Face, iris and signature and Preventing Elliptic Curve and key using ECC.. In the future method, particular portion of multi biometric traits are joined into a solo image and a curvature is created using ECC technique that adopts safeguard parameters created using Genomic Procedure. A one time password is also added to the model to provide more verification. So it is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature set from the acquired data, and comparing this feature set against the template set in the database. Multi biometric systems require storage of multiple biometric templates (e.g., fingerprint, iris, and face) for each user, which results in increased risk to user privacy and system security. The future procedure is extremely effective beside False Acceptance Rate [FAR] and False Rejection Rate [FRR]. Keywords: elliptical curve cryptography, one time password, genetic algorithm.

1. INTRODUCTION
Biometric is a method of establishing the recognition of a person using personal or behavioural features. Biometric traits like face, finger print, iris, ears, vein, palm, voice etc are used as features. It is used for secure identification and verification. These are used in confidential financial transactions and personal data privacy. There are three most important modalities of biometric families. Those are Biological, Behavioural and Morphological. In Biological modality, it focuses on an individual biological data analysis. E.g. DNA analysis, heart beat etc. In Behavioural, it concentrates on an individual behavioural analysis while he is carrying out a particular task. E.g. way of walking, way

of handling mouse etc and in morphological, it focuses on various different physical patterns. E.g. recognizing face, fingerprint etc...

a. Information Security

Volume 2 Issue 2 February 2014

Page 1

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 2, February 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm Email: editoriijcs@ipasj.org ISSN 2321-5992

Information Security is the practice of defending information from unauthorized access, use, revealing, alteration, perusal, scrutiny, and demolition. Authentication plays a major role in security. Security awareness is most important in todays world. People are observing for a new way to the security that should be more reliable and authentic. Information Security is basically the method of keeping information secure: protecting its availability, integrity, and privacy. To provide effective information security products such as firewalls and intrusion detection systems are not adequate. Process of defending information from illegal access, use, discovery, disruption, modification, recording or damage is called information Security. It means shielding information in potentially aggressive environments. Cryptography is a key technology for achieving information security in communications, electronic commerce, computer systems, and in the emerging information security. The main categories for the information security are Denial of Service, Hacking or Intrusion, Spoofing, Viruses and Worms, Sniffing and Trojan horse. The hackers are those individuals who cause this sort of illegal affairs. Bank websites, ecommerce websites and individual machines are the targeted systems for hackers. The platforms that make computer systems dont work in the right way are called Worms and Viruses. For all systems they are really annoying problem. Worms can sniffle in and pinch individual information to send out it to its originator and for a while making a good working system to malfunction are the definitive aim of them. It can spread easily and contributes to millions of dollars lost. Spoofing means that misleading others. Spoofing is essentially making other computers systems to imagine that the origin of their selective information is coming up from a genuine system. The program that will redirect the users to faulty location is called DNS spoofing. Sniffing means seeing all packets passed through air for wireless networks and sometimes through wires. Encryption is the one of the best way to avoid sniffing attack. The Denial of service [DOS] approach is not actually used for slipping the selective information. The main terminus of this assault is to impose the pointed network and make it to refuse the service for legalize exploiters.

2. EXISTING SYSTEM
In the existing system, Multi biometric traits such as fingerprint, face, iris was used. Those three biometric templates were used and it uses the embedding algorithm to change the template into a new feature representation. For converting these any of the methods like point set, binary strings methods were used. Then fusion is done on the multi biometric templates, and biometric cryptosystem is used. Fuzzy Vault and Fuzzy commitment are used for the cryptosystem. Methods can be improved to accurately measure the security analysis. 2.1 Genetic Algorithm A Genetic Algorithm it is the normal way of searching process for the all development process. Most commonly this algorithm is used to solve the problem by using the any other natural development. This algorithm is independent to the larger of developementory algorithm (DA). In this algorithm the searching methods which were developed by John Holland and are based on the principles of natural selection used for producing acceptable solutions to the problem. 2.2 Drawbacks in Existing System Cost is more. Problem in the generating prime number value. Security provided is less. Images are fused separately, so lack of security. False acceptance rate and False rejection rate is high.

3. PROPOSED SYSTEM
In the proposed system multi biometric features of individuals are used. Multi biometric traits like fingerprint, iris, face, and signature are used. These images are first resized and fused into a single image. For authentication purposes, elliptic curve cryptography is used. It is a public key cryptography method. One time password is also included for high secured authentication. This one time password is sent to the user mobile and the user types the password to this system, if it is a valid password the user is authenticated. Performance is measured in terms of false acceptance rate and false rejection rate.Compared to the existing system, the proposed system efficiency and accuracy is increased.

Volume 2 Issue 2 February 2014

Page 2

IPASJ International Journal of Computer Science (IIJCS)


A Publisher for Research Motivation ........

Volume 2, Issue 2, February 2014

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm Email: editoriijcs@ipasj.org ISSN 2321-5992

3.1 Architecture

Figure: 3.1. Secure Sketch[Multi-biometric Cryptosystem] 3.2 Advantages of Proposed System Security will be high because four multi biometric traits like fingerprint, iris, face and signature are used. Elliptic curve cryptography is used, so the key size will be smaller. One Time Password is used, so the authentication is highly secured. Accuracy and Efficiency is improved.

4. CONCLUSION AND FUTURE WORK


This Project has provided overview of multi biometric systems. In this proposed system a novel approach has been used in multiple traits of the user, are fused together into a single image and stored in database. This system also implements the elliptic curve cryptosystem and by using elliptic curve, one time password is generated. These methodologies are used to maintain a high level authentication. As compared to the existing system, the proposed system improves the accuracy and efficiency rate in authentication. In the proposed work, the security and authentication is obtained by employing morphological attributes like face, finger, iris of the user. Further for improving the accuracy and efficiency of the system, biological attributes like heart beat rate, DNA analysis can be used and thus provides the secured authentication to the system.

References
[1] Romain Giot ,Christophe Rosenberger Genetic programming for multi biometrics Expert Systems with Applications 39 pp. 18371847 (2012) [2] Arun Ross An Introduction to Multi biometrics, Proc. Of the 15th European signal processing conference (Poznam) September 2007 [3] Abhishek Nagar, Karthick Nandhakumar, Anil k.Jain, Multi biometric cryptosystem based on feature level fusion IEEE Transaction on Information Forensics and Security , Vol.. 7, NO. 1, Feb. 2012 pp 255-268. [4] A. Juels and M. Wattenberg, A fuzzy commitment scheme, in Proc. Sixth ACM Conf. Computer and Communications Security, Singapore,Nov. 1999, pp. 2836. [5] Yau, Wei-Yun Combination of hyperbolic functions for multimodal biometrics data fusion IEEE Transaction on System, Man, Cybernetics Vol no.34 pp.1196 - 1209 April 2004 [6] Mr. B. Fu, Mr. S. X. Yang, J. Li, and D. Hu, Multi biometric cryptosystem: Model structure and performance analysis, IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 867882, Dec. 2009. [7] Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi Multi biometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor International Journal of Network Security, Vol.12, No.1, PP.5057, Jan. 2011 [8] Anil Jain, Karthik Nandakumar, Arun Ross Score normalization in multimodal biometric systems The Journal of pattern recognition society pp. 2270-2285 jan. 2005 [9] S.Sumathi, Rani hema malini Multi biometric Authentication using DWT and Score Level Fusion European Journal of Scientific Research ISSN 1450-216X Vol.80 No.2 (2012), pp.213-223

Volume 2 Issue 2 February 2014

Page 3

Você também pode gostar