Free Essay

Biometric Uid Authentication Using Visual Cryptography

In:

Submitted By madhulikabiodata
Words 715
Pages 3
[1] A.K. Jain and A. Ross, “Biometrics: a tool for information security”, IEEE Transaction on Information Forensics and Security, vol. 1, no. 2, Jun. 2006.
[2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual cryptography schemes. J. Cryptogr., 12:261-289, 1999.
[3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572-3581, 2008.
[4] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011.
[5] M. Naor and B A. Shamir. Visual cryptography. in: A. De San tis (Ed.), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, 950: 1-12, 1995.
[6] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[7] M. Naor and A. Shamir “Visual cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996.
[8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996.
[9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996.
[10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453, Aug. 2006.
[11] C. Blundo and A. De Santis and M. Naor, “Visual cryptography for grey level image”, Information Processing Letters, vol. 75, pp. 255-259, 2000.
[12] Y. Rao and Y. Sukonkina and C. Bhagwati and U. Singh, “Fingerprint based authentication application using visual cryptography methods (Improved ID Card)”, in Proc.IEEERegion 10 Conf, pp.1-5, Nov 2008.
[13] T. Monoth and B.A. P “Tamperproof transmission of fingerprints using visual cryptography schemes”, Procedia Computer Science,vol. 2, pp. 143-148, 2010.
[14] http://education.vetmed.vt.edu/Curriculum/VM8054/Labs/Lab14/NOTES
[15] h ttp://caro.officialpsds.com/Fingerprint-PSD16620.html
[16] http://www.hermantownmn.com/services/hpd/fingerprints.htm
[17] S. J. Shyu. Efficient visual secret sharing scheme for color images. Pattern recognition, 39:866-880, 2006.
[18] D.R. Stinson. An introduction to visual cryptography. Public Key Solution '97, pages 28-30, April 1997.
[19] J. Daugman. “Biometric personal identification system based on iris analysis.” United States Patent, Patent Number: 5,291,560, 1994.
[20] R. Wildes,” Iris recognition: an emerging biometric technology”. In Proceedings of the IEEE 85 (9) 1348–1363, 1997.
[21] L. Masek, P Kovesi, “Recognition of human iris patterns for biometric identification”. Tech. Rep., The School of Computer Science and Software Engineering, The University of Western Australia, http://www.csse.uwa.edu.au/˜pk/studentprojects/libor/index.html, 2003.
[22] L. Masek, P Kovesi. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The University of Western Australia. 2003. Available http://www.csse.uwa.edu.au/~pk/studentprojects/libor/sourcecode.html .
[23] Masood, K., D.M.Y. Javed and A. Basit, “Iris recognition using wavelet”. In Proceedings of the International Conference on Emerging Technologies- ICET, IEEE Xplore Press, Islamabad, Pakistan, 253-256 , Nov. 12-13 2007.
[24] Sandipan P. Narote, Abhilasha S. Narote and Laxman M. Waghmare , “Iris based recognition system using wavelet transform”. IJCSNS International Journal of Computer Science and Network Security, 9(11) 101-104 , November 2009.
[25] J. Daugman, “High confidence recognition of persons by test of statistical independence” . IEEE Trans. on PAMI, vol. 15,1148-1160, 1993.
[26] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric recognition: security and privacy concerns". In Proceedings of the IEEE Security & Privacy, 33-42, March/April 2003.
[27] Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle, “An Analysis of Minutiae Matching Strength”. In Proceedings of the 3rd AVBPA, Halmstad, Sweden,223-228 ,June 2001.
[28] Y.V. Subba Rao, Yulia Sukonkina, Chakravarthy Bhagwati, Umesh Kumar Singh , “Fingerprint based authentication application using visual cryptography methods (Improved ID card)”. Tencon 2008, IEEE Region 10 conference, 2008.
[29] Chinese Academy of Sciences Institute of Automation. Page, http://www.cbsr.ia.ac.cn/english/IrisDatabase.asp. 221

Similar Documents

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Free Essay

A Hands on Intro to Hacking

...Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066 I. Title. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no...

Words: 117203 - Pages: 469