Advertisement

Reckoning Minutiae Points with RNA-FINNT Augments Trust and Privacy of Legitimate User and Ensures Network Security in the Public Network

  • Kuljeet Kaur
  • G. Geetha
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)

Abstract

Paper elucidates the process of reckoning minutiae points with reduced number of angles fingerprint algorithm. A GUI is framed to generate an evidence of improved trust and privacy of legitimate user in the public network by reckoning the bifurcations and terminations on the fingerprint of the legitimate user. After validating the authenticated user the minutiae points of the legitimate user could be exported to the database for ensuring the security of the user in the public network. Future applications for RAN-FINNT are also focused in the paper.

References

  1. 1.
    K. Kaur, G. Geetha, Fortification of transport layer security protocol by using password and fingerprint as identity authentication parameters. Int. J. Comput. Appl. 42(6), 36–42 (2012). Published by FCS, NY, USAGoogle Scholar
  2. 2.
    V. Goyal, V. Kumar, M. Singh, A. Abraham, S. Sanyal, CompChall: addressing password guessing attacks (2003), http://eprint.iacr.org/2004/136.pdf
  3. 3.
    S. Kapoor, Session hijacking exploiting TCP, UDP and HTTP sessions infosecwriters.com/text_resources/…/SKapoor_SessionHijacking.pdfGoogle Scholar
  4. 4.
    Hanjae Jeong, Dongho Won, Seungjoo Kim, Weaknesses and improvement of secure hash-based strong-password authentication protocol. Info. Secur. Group J. Info. Sci. Eng. 26, 1845–1858 (2010)Google Scholar
  5. 5.
    K. Kaur, G. Geetha, Fortification of transport layer security protocol with hashed fingerprint identity parameter. Int. J. Comput. Sci. Issues 9(2), No.2, 188–193 (2012)Google Scholar
  6. 6.
    A. Farina, Z.M. Kovács-Vajna, A. Leone, Fingerprint minutiae extraction from skeletonized binary images. Pattern Recognit. 32, 877–889 (1999). Published by Elsevier Science LtdGoogle Scholar
  7. 7.
    R. Bansal, P. Sehgal, P. Bedi, Minutiae extraction from fingerprint images – a review. Int. J. Comput. Sci. Issues, 8(5), No 3, 74–85, (2011)Google Scholar
  8. 8.
    L. Wieclaw, A minutiae based matching algorithms in fingerprint recognition systems. J. Med. Inform. Technol. 13, (2009). Published by Institute of Informatics, University of Silesia, BędzińskaGoogle Scholar
  9. 9.
    S.D. Patil, S.A. Patil, Fingerprint recognition using minutia matching. World J. Sci. Technol. 2(4), 178–181 (2012)Google Scholar
  10. 10.
    D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Handbook of fingerprint recognition (Springer, New York, 2003)MATHGoogle Scholar
  11. 11.
    A. K. Jain, A. Ross, S. Prabahkar, Fingerprint matching using minutiae and texture features, in Proceedings of International Conference on Image Processing (ICIP), Thessaloniki, 7–10 Oct 2001, pp. 282–285Google Scholar
  12. 12.
    A. Ross, A.K. Jain, J. Reisman, A hybrid fingerprint matcher. Pattern Recognit. 36(7), 1661–1673 (2003)CrossRefGoogle Scholar
  13. 13.
    A.K. Jain, L. Hong, R. Bolle, On-line fingerprint verification. IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 302–314 (1997)CrossRefGoogle Scholar
  14. 14.
    R. Snelick, M. Indovina, J. Yen, A. Mink, Multimodal biometrics: issues in design and testing, in Proceedings of Fifth International Conference on Multimodal Interfaces, Vancouver, 2003, pp. 68–72, 1859–1867Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.School of Computer ApplicationsLovely Professional UniversityPhagwaraIndia

Personalised recommendations