Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/563655
Title: | A Novel Scheme for Secure Key Generation through Finger Vein Pattern |
Researcher: | Wagh, Dnyaneshwari Pandurang |
Guide(s): | Shinde, G. N. and Fadewar, H.S. |
Keywords: | Computer Science Computer Science Artificial Intelligence Engineering and Technology |
University: | Swami Ramanand Teerth Marathwada University |
Completed Date: | 2024 |
Abstract: | Biometric identification technology has advantages over above traditional method, since each person s biological characteristic is unique and difficult to counterfeit. At present finger vein recognition is an ideal identification technology. The finger vein pattern is extracted from the input database images. The extracted vein patter in treated as the Region of Interest (ROI) image. This image is given as input to the Convolution Neural Network (CNN) for training. The CNN model extracts featured form the input image and trained the model. The trained model can then be used from recognition of new images. Three fingers per person have been used in the experiments and the proposed method produced good results in recognizing the person. The proposed model produced an accuracy of 99 percent during the testing phase. newlineThe personal information security in cyberspace has gradually become an important topic nowadays, and biometric identification technology has emerged as the times require. Finger vein authenticated person information security is another prominent problem in the research area. So, by combining the information security and finger vein image security will improve the security of the whole system. We proposed a finger vein image security system using DNA encryption, image scrambling with LSB steganography technique. The secret data of the user is first encrypted using DNA encryption. LSB data hiding is used to hide this encrypted secret data in the finger vein image. This method consists of replacing the least significant bit, the last bit of each byte, of the pixels of an image with the bits of the information to be hidden. The security of the user is given importance by encrypting the details and then hiding the information. The stego image is then encrypted using image scrambling technique. To match a user s vein, the image is descrambled and then compared to the finger vein based on the data extracted from the image. The implemented algorithms provide security to the user information as well as the finge |
Pagination: | 148p |
URI: | http://hdl.handle.net/10603/563655 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 214.16 kB | Adobe PDF | View/Open |
02_certificate.pdf | 548.93 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 440.33 kB | Adobe PDF | View/Open | |
04_declaration.pdf | 432.84 kB | Adobe PDF | View/Open | |
05_acknowledgement.pdf | 338.4 kB | Adobe PDF | View/Open | |
06_contents.pdf | 614.49 kB | Adobe PDF | View/Open | |
07_list-of-tables.pdf | 442.69 kB | Adobe PDF | View/Open | |
08_list-of-figures.pdf | 465.1 kB | Adobe PDF | View/Open | |
09_abbreviations.pdf | 371.5 kB | Adobe PDF | View/Open | |
10_chapter 1.pdf | 1 MB | Adobe PDF | View/Open | |
11_chapter 2.pdf | 527.99 kB | Adobe PDF | View/Open | |
12_chapter 3.pdf | 1.6 MB | Adobe PDF | View/Open | |
13_chapter4.pdf | 1.08 MB | Adobe PDF | View/Open | |
14_chapter 5.pdf | 594.25 kB | Adobe PDF | View/Open | |
15_conclusion.pdf | 273.6 kB | Adobe PDF | View/Open | |
16_summery.pdf | 258.83 kB | Adobe PDF | View/Open | |
17_bibliography.pdf | 373.83 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 265.88 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: