Importance of AADHAR-Based Smartcard System’s Implementation in Developing Countries

Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 730)

Abstract

A smartcard includes fingerprints, iris, face, and palatal patterns where DNA sequence and palatal patterns of the smartcard will be used for identifying a dead person but fingerprints, iris, and face will be used identity verification of a living person. The smartcards are now widely being used as one of the most useful and reliable form of electronic identity verification system. By embedding biometrics in the host, we can formulate a reliable individual identification system as the biometrics possesses. Hence, the conflicts and problems related to the intellectual property rights protection can be potentially prevented. Consequently, it has been decided by governmental institutions in Europe and the U.S. to include digital biometric data in future ID documents. In India, biometric-based unique identification (UID) scheme called AADHAR is being implemented with the objective to issue a unique identification number to all the citizens of the country. This AADHAR number can be used in executing all the money transactions-related activities including all types of purchases, sales, money transfer, hotel bills, hospital expenses, and air tickets, etc. Therefore, the AADHAR-based smartcard system will help the South Asian countries for removing corruption and improving their economies.

Keywords

Advanced security system Biometric information Human identification Smartcard and UID 

References

  1. 1.
    Gillberg, J., Ljung, L.: Frequency-domain identification of continuous-time ARMA models from sampled data. Automatic 45, 1371–1378 (2009)MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Pillai, J., Shreeramamurthy, T.G.: A public key water making scheme for image authentication. Int. J. Ind. Electron. Electr. Eng. 2(5), 46–48 (2014)Google Scholar
  3. 3.
    Waleed, J., Jun, H.D., Hameed, S.: Int. J. Secur. Appl. 8(5), 349–360 (2014)Google Scholar
  4. 4.
    Kandar, S., Maiti, A., Dhara, C.: Visual cryptography scheme for color image using random number with enveloping by digital watermarking. Int. J. Comput. Sci. Issues 2011(8), 543–549 (2011)Google Scholar
  5. 5.
    Anitha, V., Velusamy, R.L.: Authentication of digital documents using secret key biometric watermarking. In: International Conference on Electrical Engineering and Computer Science, Trivandrum, pp. 243–249 (2012)Google Scholar
  6. 6.
    Nyeem, H., Boles, W., Boyd, C.: Developing a digital image watermarking model. In: Proceedings of IEEE International Conference on Digital Image Computing: Techniques and Applications, pp. 468–473 (2011)Google Scholar
  7. 7.
    Phillips, P.C.B.: The problem of identification in finite parameter continuous time models. J. Econometric 1(4), 351–362 (1973). http://EconPapers.repec.org/. Accessed 10 March 2015
  8. 8.
    Patel, B.C., Sinha, G.R.: An adaptive K-means clustering algorithm for breast image segmentation. Int. J. Comput. Appl. 10(4), 35–38 (2010)Google Scholar
  9. 9.
    Ali, M.O., Rameshwar, R.: Digital image watermarking basics and hardware implementation. Int. J. Model. Optim. 2(1), 19–24 (2012)Google Scholar
  10. 10.
    Karthikeyan, V., Divya, M., Chithra, C.K., PriyaManju, K.: Face verification systems based on integral normalized for. Int. J. Comput. Appl. 66(9), 39–43 (2013)Google Scholar
  11. 11.
    Hagai, K.: On the unique identification of continuous time autoregressive models from sampled data. IEEE Trans. Signal Proces. 62(6), 1361–1376 (2014)Google Scholar
  12. 12.
    Hemangi, K., Aniket, Y., Darpan, S., Bhandari, P., Samuya, M., Yadav, A.: Unique id management. Int. J. Comput. Technol. Appl. 3(2), 520–524 (2012)Google Scholar
  13. 13.
    Inamdar, V., Rege, P., Arya, M.: Offline handwritten signature based blind biometric watermarking and authentication technique using bi-orthogonal wavelet transform. Int. J. Comput. Appl. (0975–8887) 11, 19–27 (2010)Google Scholar
  14. 14.
    Hemant, K., Nadhamuni, S., Sarma, S.: A UID numbering scheme. White Paper, May 2010Google Scholar
  15. 15.
    Liu, F., Wu, K.: Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf. Secur. 5(2), 121–128 (2011)CrossRefGoogle Scholar
  16. 16.
    Velusamy, V., Leela, R.L.: Authentication of digital documents using secret key biometric watermarking. Int. J. Commun. Netw. Secur. 1(4), 5–11 (2012)Google Scholar
  17. 17.
    Corduneanu, C.: Almost Periodic Oscillations and Waves. Springer, New York (2009). doi:  10.1007/978-0-387-09819-7. Accessed 15 Jan 2015
  18. 18.
    Hassanien, E.: Hiding iris data for authentication of digital images using wavelet theory. In: GVIP 05 Conference, Egypt, December 2005Google Scholar
  19. 19.
    Jafri, R., Arabnia, H.R.: A survey of face recognition technique. J. Inf. Proces. Syst. 5(2), 41–68 (2009)Google Scholar
  20. 20.
    Patel, H., Sharma, V.: Fingerprint recognition by minutiae matching method for evaluating accuracy. Int. J. Eng. Trends Technol. 4(5) (2013)Google Scholar
  21. 21.
    Prashar, D., Kaur, M.: Human eye iris recognition using discrete 2D reverse bi-orthogonal wavelet. Int. J. Sci. Technol. Res. 3(8), 266–270 (2014)Google Scholar
  22. 22.
    Johansson, R.: Identification of continuous-time models. IEEE Trans. Signal Proces. 42(4), 887–897 (1994)CrossRefGoogle Scholar
  23. 23.
    Ramya, K.P., Revathi, M.K., Devi, C.R.: PINCODE: protection in provenance conduction over data stream for sensor data. Int. J. Res. Eng. Adv. Technol. 1(5), 1–7 (2013)Google Scholar
  24. 24.
    Wikipedia: The free encyclopedia, Unique identification authority of India. http://en.wikipedia.org/wiki/Unique_Identification_Authority. 10 Jan 2016
  25. 25.
    Rashid, A.F., Lateef, M., Kaur, B., Aggarwal, O.P., Hamid, S., Gupta, N.: Biometric fingerprint identification is reliable tool are not. J. Indian Acad. Forensic Med. 35(2), 109–112 (2013)Google Scholar
  26. 26.
    Pham, D.-T.: Estimation of continuous-time autoregressive model from finely sampled data. IEEE Trans. Signal Process. 48(9), 2576–2584 (2000)MathSciNetCrossRefMATHGoogle Scholar
  27. 27.
    Decker, W., Greuel, G.-M., Pfister, G., Schönemann, H.: Singular 3-1-6—a computer algebra system for polynomial computations (2012). http://www.singular.uni-kl.de. Accessed 15 Jan 2015
  28. 28.
    Cox, D.A., Little, J., O’Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, vol. 10. New York (2007)Google Scholar
  29. 29.
    Ramaswamy, G., Vuda, S., Ramesh, P., Ravi, K.: A novel approach for human identification through fingerprints. Int. J. Comput. Appl. 4(3), 43–50 (2010)Google Scholar
  30. 30.
    Wong, W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Proces. 10(10) (2001)Google Scholar
  31. 31.
    Kekre, H.B., Thepade S.D., Jain, J., Naman, A.: Iris recognition using texture feature extracted from haalet pyramid. Int. J. Comput. Appl. 11(12), 1–5 (2010)Google Scholar
  32. 32.
    Jain, A.K., Kumar, A.: Biometric of next generation. Book on Second Generation Biometrics, pp. 1–36 (2010)Google Scholar
  33. 33.
    Lokhande, S., Dhongde, V.S.: Fingerprint identification based on neural network. Int. J. Innovative Res. Sci. Eng. Technol. 3(4), 350–355 (2014)Google Scholar
  34. 34.
    Shakya Kumar, M.: Catching of stolen vehicles with unique identification code using embedded system. Int. J. Electron. Commun. Comput. Technol. 2(6), 262–266 (2012)Google Scholar
  35. 35.
    Tiwari, S., Singh, A.K., Shukla, V.P.: Statically moments based noise classification using feed forward back propagation neural network. Int. J. Comput. Appl. 18(2), 36–40 (2011)Google Scholar
  36. 36.
    Venkateswara Rao, M.: Fingerprint analyze. J. Nurs. Health Sci. 3(1), 14–16 (2014)Google Scholar
  37. 37.
    Marelli, D., Fu, M.: A continuous-time linear system identification method for slowly sampled data. IEEE Trans. Signal Proces. 58(5), 2521–2533 (2010)MathSciNetCrossRefGoogle Scholar
  38. 38.
    Mishra, K.N.: AAdhar based smartcard system for security management in South Asia. Int. Conf. Cont. Comput. Commun. Mater., 1–6 (2016)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Department of CS&EBirla Institute of Technology (Alld. Campus)Mesra, RanchiIndia

Personalised recommendations