Free Essay

Biometric Uid Authentication Using Visual Cryptography

In: Computers and Technology

Submitted By madhulikabiodata
Words 715
Pages 3
[1] A.K. Jain and A. Ross, “Biometrics: a tool for information security”, IEEE Transaction on Information Forensics and Security, vol. 1, no. 2, Jun. 2006.
[2] C. Blundo, A. De Santis, and D.R. Stinson. On the contrast in visual cryptography schemes. J. Cryptogr., 12:261-289, 1999.
[3] J. B. Feng, H. C. Wu, C. S. Tsai, Y. F. Chang, and Y. P. Chu. Visual secret sharing for multiple secrets. Pattern Recognition, 41:3572-3581, 2008.
[4] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011.
[5] M. Naor and B A. Shamir. Visual cryptography. in: A. De San tis (Ed.), Advances in Cryptology: Eurpocrypt'94, Lecture Notes in Computer Science, 950: 1-12, 1995.
[6] C.C. Wu and L.H. Chen. A study on visual cryptography, Master Thesis. PhD thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, R.O.C., 1998.
[7] M. Naor and A. Shamir “Visual cryptography:Improving the contrast via the cover base” IACR Eprint archive, 1996.
[8] C. Blundo and A. De Santis and D.R. Stinson, “On the contrast in visual cryptography schemes”, Jurnal pf cryptography, vol. 12, pp. 261-289, 1996.
[9] G. Ateniese and C. Blundo and A. De Santis and D.R. Stinson,“Extended Schemes for Visual Cryptography”, Theoretical Computer Science, 1996.
[10] Z. Zhouand and G. R. Arce and G. Di Crescenzo, “Halftone visual cryptography” IEEE Trans. Image Process, vol. 15, no. 8, pp. 2441-2453, Aug. 2006.
[11] C. Blundo and A. De Santis and M. Naor, “Visual cryptography for grey level image”, Information Processing Letters, vol. 75, pp. 255-259, 2000.
[12] Y. Rao and Y. Sukonkina and C. Bhagwati and U. Singh, “Fingerprint based authentication application using visual cryptography methods (Improved ID Card)”, in Proc.IEEERegion 10 Conf, pp.1-5, Nov 2008.
[13] T. Monoth and B.A. P “Tamperproof transmission of fingerprints using visual cryptography schemes”, Procedia Computer Science,vol. 2, pp. 143-148, 2010.
[14] http://education.vetmed.vt.edu/Curriculum/VM8054/Labs/Lab14/NOTES
[15] h ttp://caro.officialpsds.com/Fingerprint-PSD16620.html
[16] http://www.hermantownmn.com/services/hpd/fingerprints.htm
[17] S. J. Shyu. Efficient visual secret sharing scheme for color images. Pattern recognition, 39:866-880, 2006.
[18] D.R. Stinson. An introduction to visual cryptography. Public Key Solution '97, pages 28-30, April 1997.
[19] J. Daugman. “Biometric personal identification system based on iris analysis.” United States Patent, Patent Number: 5,291,560, 1994.
[20] R. Wildes,” Iris recognition: an emerging biometric technology”. In Proceedings of the IEEE 85 (9) 1348–1363, 1997.
[21] L. Masek, P Kovesi, “Recognition of human iris patterns for biometric identification”. Tech. Rep., The School of Computer Science and Software Engineering, The University of Western Australia, http://www.csse.uwa.edu.au/˜pk/studentprojects/libor/index.html, 2003.
[22] L. Masek, P Kovesi. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The University of Western Australia. 2003. Available http://www.csse.uwa.edu.au/~pk/studentprojects/libor/sourcecode.html .
[23] Masood, K., D.M.Y. Javed and A. Basit, “Iris recognition using wavelet”. In Proceedings of the International Conference on Emerging Technologies- ICET, IEEE Xplore Press, Islamabad, Pakistan, 253-256 , Nov. 12-13 2007.
[24] Sandipan P. Narote, Abhilasha S. Narote and Laxman M. Waghmare , “Iris based recognition system using wavelet transform”. IJCSNS International Journal of Computer Science and Network Security, 9(11) 101-104 , November 2009.
[25] J. Daugman, “High confidence recognition of persons by test of statistical independence” . IEEE Trans. on PAMI, vol. 15,1148-1160, 1993.
[26] S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric recognition: security and privacy concerns". In Proceedings of the IEEE Security & Privacy, 33-42, March/April 2003.
[27] Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle, “An Analysis of Minutiae Matching Strength”. In Proceedings of the 3rd AVBPA, Halmstad, Sweden,223-228 ,June 2001.
[28] Y.V. Subba Rao, Yulia Sukonkina, Chakravarthy Bhagwati, Umesh Kumar Singh , “Fingerprint based authentication application using visual cryptography methods (Improved ID card)”. Tencon 2008, IEEE Region 10 conference, 2008.
[29] Chinese Academy of Sciences Institute of Automation. Page, http://www.cbsr.ia.ac.cn/english/IrisDatabase.asp. 221

Similar Documents

Premium Essay

Computer Tricks

...Tampering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8 Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9 Directory Traversal/Forceful Browsing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10 Cryptographic Interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11 Authentication Hijacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11 Log Tampering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11 Error Message Interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12 Attack Obfuscation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .......

Words: 61838 - Pages: 248

Premium Essay

Impotent Music

........................................26 2.2.4.6 Malicious Code ................................................................................................................................................................27 2.2.4.7 Malicious Software: Terms.............................................................................................................................................27 2.2.4.8 Foreign Government Espionage ...................................................................................................................................27 2.3 SECURITY SERVICES AND MECHANISMS INTRODUCTION.......................................................................................... 27 2.3.0 Identification and Authentication ..................................................................................................................... 28 2.3.1 Access Control ................................................................................................................................................... 30 2.3.2 Data and Message Confidentiality .................................................................................................................. 31 2.3.3 Data and Message Integrity ............................................................................................................................. 33 2.3.4 Non-repudiation ...............................................................................................................

Words: 134858 - Pages: 540

Free Essay

A Hands on Intro to Hacking

...Francisco, CA 94103 phone: 415.863.9900; fax: 415.863.9950; info@nostarch.com; www.nostarch.com Library of Congress Cataloging-in-Publication Data Weidman, Georgia. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. pages cm Includes index. ISBN 978-1-59327-564-8 (paperback) -- ISBN 1-59327-564-1 (paperback) 1. Penetration testing (Computer security) 2. Kali Linux. 3. Computer hackers. QA76.9.A25W4258 2014 005.8'092--dc23 2014001066 I. Title. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.SOGOO In memory of Jess Hilden About the Author Georgia Weidman is a penetration tester and researcher, as well as the founder of Bulb Security, a security consulting firm. She pre­ sents at conferences around the world......

Words: 117203 - Pages: 469