Abstract
Paper elucidates the process of reckoning minutiae points with reduced number of angles fingerprint algorithm. A GUI is framed to generate an evidence of improved trust and privacy of legitimate user in the public network by reckoning the bifurcations and terminations on the fingerprint of the legitimate user. After validating the authenticated user the minutiae points of the legitimate user could be exported to the database for ensuring the security of the user in the public network. Future applications for RAN-FINNT are also focused in the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Kaur, G. Geetha, Fortification of transport layer security protocol by using password and fingerprint as identity authentication parameters. Int. J. Comput. Appl. 42(6), 36–42 (2012). Published by FCS, NY, USA
V. Goyal, V. Kumar, M. Singh, A. Abraham, S. Sanyal, CompChall: addressing password guessing attacks (2003), http://eprint.iacr.org/2004/136.pdf
S. Kapoor, Session hijacking exploiting TCP, UDP and HTTP sessions infosecwriters.com/text_resources/…/SKapoor_SessionHijacking.pdf
Hanjae Jeong, Dongho Won, Seungjoo Kim, Weaknesses and improvement of secure hash-based strong-password authentication protocol. Info. Secur. Group J. Info. Sci. Eng. 26, 1845–1858 (2010)
K. Kaur, G. Geetha, Fortification of transport layer security protocol with hashed fingerprint identity parameter. Int. J. Comput. Sci. Issues 9(2), No.2, 188–193 (2012)
A. Farina, Z.M. Kovács-Vajna, A. Leone, Fingerprint minutiae extraction from skeletonized binary images. Pattern Recognit. 32, 877–889 (1999). Published by Elsevier Science Ltd
R. Bansal, P. Sehgal, P. Bedi, Minutiae extraction from fingerprint images – a review. Int. J. Comput. Sci. Issues, 8(5), No 3, 74–85, (2011)
L. Wieclaw, A minutiae based matching algorithms in fingerprint recognition systems. J. Med. Inform. Technol. 13, (2009). Published by Institute of Informatics, University of Silesia, Będzińska
S.D. Patil, S.A. Patil, Fingerprint recognition using minutia matching. World J. Sci. Technol. 2(4), 178–181 (2012)
D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of fingerprint recognition (Springer, New York, 2003)
A. K. Jain, A. Ross, S. Prabahkar, Fingerprint matching using minutiae and texture features, in Proceedings of International Conference on Image Processing (ICIP), Thessaloniki, 7–10 Oct 2001, pp. 282–285
A. Ross, A.K. Jain, J. Reisman, A hybrid fingerprint matcher. Pattern Recognit. 36(7), 1661–1673 (2003)
A.K. Jain, L. Hong, R. Bolle, On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 302–314 (1997)
R. Snelick, M. Indovina, J. Yen, A. Mink, Multimodal biometrics: issues in design and testing, in Proceedings of Fifth International Conference on Multimodal Interfaces, Vancouver, 2003, pp. 68–72, 1859–1867
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Kaur, K., Geetha, G. (2014). Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network. In: Meghanathan, N., Nagamalai, D., Rajasekaran, S. (eds) Networks and Communications (NetCom2013). Lecture Notes in Electrical Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-319-03692-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-03692-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03691-5
Online ISBN: 978-3-319-03692-2
eBook Packages: EngineeringEngineering (R0)