Sie sind auf Seite 1von 5

VISUAL CRYPTOGRAPHY USING TWO FACTOR AUTHENTICATED BIOMETRIC SYSTEM FOR TRUST WORTHY AUTHENTICATION

INTRODUCTION BIOMETRICS is the science of establishing the identity of an individual based on physical or behavioral traits such as face, fingerprints, iris, gait, and voice. A biometric authentication system operates by acquiring raw biometric data from a subject (e.g., thumb impression), extracting a feature set from the data, and comparing the feature set against the templates stored in a database in order to identify the subject or to verify a claimed identity. In our project a biometric keypad is used to obtain the thumb impression of all the users during enrollment. Now we combine the concept of Steganography and visual cryptography. The obtained thumb impression is Steganographed with PIN NUMBER of the user and the Steganographed thumb impression is splitted into two shares namely using Visual Cryptography schemes. One of the splitted shares is converted into hash code and stored along with other share and thumb impression. The share which is converted into hash code is given to the user for further logging process. One time password is used every time to ensure the trusted submission of shares. The system not only ensures the secured transaction of process but also verifies the true identity of the person through one time password. Our project mainly reduces the possibility of illegal transactions and increases the efficiency and security of the system.

SYSTEM ANALYSIS EXISTING SYSTEM In the existing system the original image is divided into 2 shares by applying (2,2)- VCS. The share creation and the reconstruction of original image use OR operation or XOR operations. To increase the security of VCSXOR here we add additional matrix in the generation of shares. Since there is no pixel expansion in the OR operation by looking into the single share may reveal the secret image in low contrast. So here, the additional matrix is used to share white and black pixels in the shares to increase the security level. Since the user can use any additional matrix for share generation it is impossible for anyone to get the secret message from the shares. PROPOSED SYSTEM In the proposed model, the finger print image which is obtained from the user is Steganographed with PIN NUMBER of the user and the Steganographed thumb impression is splitted into two halves namely share 1 & share 2. Share 1 is kept by the bank server. Share 2 is provided to the user. The share which is given to the user is converted into hash code and stored in bank server. During user login, user will be giving the share 2 image which would be converted into hash codes. One time password is generated to the users mobile number before user gives the share 2 image. User is permitted to give the share 2 image only after OTP authentication. Hash code of user given share 2 and hash code of share 2 which is stored in bank server are compared. When both the hash codes are same, the originality of share 2 is verified and reconstruction of original thumb impression is carried on. The user is allowed to access the bank server only after this authentication. This process ensures proper security scheme.

LITERATURE SURVEY Paper 1: Enhancing security and privacy in biometrics based authentication systems. N. K. Ratha, J. H. Connell, R. M. Bolle Reliable user authentication is becoming an increasingly important task in the Webenabled world. The consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic, and may include loss of condential information, denial of service, and compromised data integrity. The value of reliable user authentication is not limited to just computer or network access. Many other applications in everyday life also require user authentication, such as banking, e-commerce, and physical access control to computer resources, and could benet from enhanced security.The prevailing techniques of user authentication, which involve the use of either passwords and user IDs (identiers), or identication cards and PINs (personal identication numbers), suffer from several limitations. Passwords and PINs can be illicitly acquired by direct covert observation. Once an intruder acquires the user ID and the password, the intruder has total access to the users resources. In addition, there is no way to positively link the usage of the system or service to the actual user, that is, there is no protection against repudiation by the user ID owner. Fortunately, automated biometrics in general, and ngerprint technology in particular, can provide a much more accurate and reliable user authentication method. Biometrics is a rapidly advancing eld that is concerned with identifying a person based on his or her physiological or behavioral characteristics. Paper 2: Visual Cryptography for Biometric Privacy Arun Ross, Senior Member, IEEE, and Asem Othman , Student Member, IEEE. The use of visual cryptography is explored to preserve the privacy of biometric data (viz., raw images) by de-composing the original image into two images in such a way that the original image can be revealed only when both images are simultaneously available; further, the individual component images do not reveal any information about the original image. For ngerprints, the biometric image is decomposed by the visual cryptography scheme and two noise-like images known as shares are produced.

Paper 3: Multilayer information hiding A blend of steganography and Visual Cryptography. Jithesh, Dr. A. V. Senthil Kumar. This study combines the notion of both steganography [1] and visual cryptography [2]. Recently, a number of innovative algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency; because there will be always new kinds of threats in the field of information hiding. Actually Steganography and Visual Cryptography are two sides of a coin. Visual cryptography has the problem of revealing the existence of the hidden data where as Steganography hides the existence of hidden data. Here this study is to suggest multiple layers of encryption by hiding the hidden data. Hiding the hidden data means, first encrypting the information using visual cryptography and then hide the share/s[3] into images or audio files using Steganography. The Proposed system can be less of draw backs and can resist towards attacks. Paper 4: Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKunWu A (2; n)-Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme, where n participants share a secret image, and any two of them can recover the secret image visually without any cryptographic knowledge and computation devices, but any one of them cannot get any information about the secret image other than the size of the secret image. This paper studies the (2; n)VCSXOR, and shows the smallest (optimal) pixel expansion of such schemes, and the largest possible contrast for the (2; n) V CSXOR given its optimal pixel expansion. It also shows the largest (optimal) contrast of the (2; n) V CSXOR, and the smallest possible pixel expansion of such schemes given their optimal contrast. The results of this paper show that the (2; n) VCSXOR can achieve smaller pixel expansion and larger contrast than that of (2; n) VCSOR. Paper 5: Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching Agrawal, N. Savvides, M.Carnegie Mellon.

Digital Steganography exploits the use of host data to hide a piece of information in such a way that it is imperceptible to a human observer. Its main objectives are imperceptibility, robustness and high payload. DCT Domain message embedding in Spread Spectrum Steganography describes a novel method of using redundancy in DCT coefficients. We improved upon the method of DCT embedding by using the sign of the DCT coefficients to get better accuracy of retrieved data and more robustness under channel attacks like channel noise and JPEG compression artifacts while maintaining the visual imperceptibility of cover image, and even extending the method further to obtain higher payloads. We also apply this method for secure biometric data hiding, transmission and recovery. We hide iris code templates and fingerprints in the host image which can be any arbitrary image, such as face biometric modality and transmit the so formed imperceptible Stego-Image securely and robustly for authentication, and yet obtain perfect reconstruction and classification of iris codes and retrieval of fingerprints at the receiving end without any knowledge of the cover image i.e. a blind method of steganography, which in this case is used to hide biometric template in another biometric modality. SYSTEM SPECIFICATION HARDWARE CONFIGURATION Hard disk RAM Processor Kit Mobile : 20 GB(Min) : 512 MB : Pentium 3 : Biometric Keypad. : Normal Mobile.

SOFTWARE CONFIGURATION Java 1.5 Or more. Tomcat 6.0 Windows 98 and above MS-SQL Server Finger print STK

Das könnte Ihnen auch gefallen