Skip to main content

A Novel Highly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 132))

Abstract

Fingerprint based authentication does not give a foolproof security because fingerprint image can be scanned and can be used later on for the purpose of authentication. In this paper we proposed another level of security by using Session based password in addition to the features of the fingerprint for authentication. The proposed approach shows significant promise and potential for improvement, compared with the other conventional authentication techniques with regard to efficiency of the process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jayaraman, B., Puttamadappa, C., Anbalagan, E., Mohan, E., Madane, S.: Fingerprint Authentication using Back-propagation Algorithm. International Journal of Soft Computing 3(4), 282–287 (2008) ISSN:1816-9503

    Google Scholar 

  2. Mohamad-Saleh, J., Hoyle, B.S.: Improved Neural Network Performance Using Principal Component Analysis on Matlab. International Journal of The Computer, the Internet and Management 16(2), 1–8 (2008)

    Google Scholar 

  3. Gil, Y., Ahn, D., Pan, S., Chung, Y.: Access Control System with High Level Security Using Fingerprints. In: Proceedings of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR 2003). IEEE, Los Alamitos (2003), 0-7695-2029-4/03 $ 17.00 © 2003

    Google Scholar 

  4. Tanghui, Z., Jie, T., Yuliang, H., Xin, Y.: A Combined Fingerprint Matching Algorithm Based on Similarity Histogram. Chinese Journal of Computers 28(10), 1728–1733 (2005)

    Google Scholar 

  5. Jain, A., Ross, A.: Fingerprint Matching Using Minutiae and Texture Features. In: ICIP, pp. 282–285 (2001)

    Google Scholar 

  6. Kovocs-Vajna, Z.M.: A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping. IEEE Tran’s. on PAMI 22(11), 1266–1276 (2000)

    Article  Google Scholar 

  7. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbankbased Fingerprint Matching. IEEE Trans. on Image Precessing 9(5), 846–859 (2000)

    Article  Google Scholar 

  8. Jain, A.K., Prabhakar, S., Chen, S.: Combining Multiple Matchers for A High Security Fingerprint Verification System. Pattern Recognition Letters 20(11-13), 1371–1379 (1999)

    Article  Google Scholar 

  9. Jain, A.K., Hong, L., Pantanki, S., Bolle, R.: An Identity Authentication System Using Fingerprints. Proc. of the IEEE 85(9), 1365–1388 (1997)

    Article  Google Scholar 

  10. Hong, L., Wan, Y., Jain, A.K.: Fingerprint Image Enhancement: Algorithm and performance Evaluation. IEEE Trans. PAMI 20(8), 777–789 (1998)

    Article  Google Scholar 

  11. Jain, A., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Trans. on Pattern Analysis and Machine Intelligence 19(4), 302–313 (1997)

    Article  Google Scholar 

  12. Jain, A.K., Prabhakar, S., Hong, L.: A Multichannel Approach to Fingerprint Classification. IEEE Trans. on PAMI 21(4), 348–359 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharya, T., Hore, S., Mukherjee, A., Bhadra Chaudhuri, S.R. (2011). A Novel Highly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Networks and Communications. CCSIT 2011. Communications in Computer and Information Science, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17878-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17878-8_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17877-1

  • Online ISBN: 978-3-642-17878-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics