Skip to main content

Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network

  • Conference paper
  • First Online:
Networks and Communications (NetCom2013)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 284))

  • 687 Accesses

Abstract

Paper elucidates the process of reckoning minutiae points with reduced number of angles fingerprint algorithm. A GUI is framed to generate an evidence of improved trust and privacy of legitimate user in the public network by reckoning the bifurcations and terminations on the fingerprint of the legitimate user. After validating the authenticated user the minutiae points of the legitimate user could be exported to the database for ensuring the security of the user in the public network. Future applications for RAN-FINNT are also focused in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Kaur, G. Geetha, Fortification of transport layer security protocol by using password and fingerprint as identity authentication parameters. Int. J. Comput. Appl. 42(6), 36–42 (2012). Published by FCS, NY, USA

    Google Scholar 

  2. V. Goyal, V. Kumar, M. Singh, A. Abraham, S. Sanyal, CompChall: addressing password guessing attacks (2003), http://eprint.iacr.org/2004/136.pdf

  3. S. Kapoor, Session hijacking exploiting TCP, UDP and HTTP sessions infosecwriters.com/text_resources/…/SKapoor_SessionHijacking.pdf

    Google Scholar 

  4. Hanjae Jeong, Dongho Won, Seungjoo Kim, Weaknesses and improvement of secure hash-based strong-password authentication protocol. Info. Secur. Group J. Info. Sci. Eng. 26, 1845–1858 (2010)

    Google Scholar 

  5. K. Kaur, G. Geetha, Fortification of transport layer security protocol with hashed fingerprint identity parameter. Int. J. Comput. Sci. Issues 9(2), No.2, 188–193 (2012)

    Google Scholar 

  6. A. Farina, Z.M. Kovács-Vajna, A. Leone, Fingerprint minutiae extraction from skeletonized binary images. Pattern Recognit. 32, 877–889 (1999). Published by Elsevier Science Ltd

    Google Scholar 

  7. R. Bansal, P. Sehgal, P. Bedi, Minutiae extraction from fingerprint images – a review. Int. J. Comput. Sci. Issues, 8(5), No 3, 74–85, (2011)

    Google Scholar 

  8. L. Wieclaw, A minutiae based matching algorithms in fingerprint recognition systems. J. Med. Inform. Technol. 13, (2009). Published by Institute of Informatics, University of Silesia, Będzińska

    Google Scholar 

  9. S.D. Patil, S.A. Patil, Fingerprint recognition using minutia matching. World J. Sci. Technol. 2(4), 178–181 (2012)

    Google Scholar 

  10. D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of fingerprint recognition (Springer, New York, 2003)

    MATH  Google Scholar 

  11. A. K. Jain, A. Ross, S. Prabahkar, Fingerprint matching using minutiae and texture features, in Proceedings of International Conference on Image Processing (ICIP), Thessaloniki, 7–10 Oct 2001, pp. 282–285

    Google Scholar 

  12. A. Ross, A.K. Jain, J. Reisman, A hybrid fingerprint matcher. Pattern Recognit. 36(7), 1661–1673 (2003)

    Article  Google Scholar 

  13. A.K. Jain, L. Hong, R. Bolle, On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 302–314 (1997)

    Article  Google Scholar 

  14. R. Snelick, M. Indovina, J. Yen, A. Mink, Multimodal biometrics: issues in design and testing, in Proceedings of Fifth International Conference on Multimodal Interfaces, Vancouver, 2003, pp. 68–72, 1859–1867

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuljeet Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kaur, K., Geetha, G. (2014). Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network. In: Meghanathan, N., Nagamalai, D., Rajasekaran, S. (eds) Networks and Communications (NetCom2013). Lecture Notes in Electrical Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-319-03692-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03692-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03691-5

  • Online ISBN: 978-3-319-03692-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics