FORMATION OF ELLIPTIC CURVE USING BIOMETRIC TEMPLATE
PHASE-1 SECOND REVIEW
Project by
Thiruvaimalar nathan.B 09AER022 ME(Applied Electronics)
Guided by
Prof.R.Meenakumari H.O.D,Dept. of EEE
3/12/2013
Objective
To develop a secured documentation using biometric template(finger and facial print) for secured documentation. From the coordinate points of biometric template, elliptic curve is created using elliptic curve algorithm which ensures security.
2
3/12/2013
Existing method
Presently biometric templates (face, iris, and fingerprint) in chips are exposed to clandestine scanning which does not assure security. Data confidentiality is also compromised since existing system uses RSA(Rivest, Shamir,Adleman) algorithm.
3
3/12/2013
Proposed Method
3/12/2013
The drawback in the present system is addressed in this project. Minute coordinate points are derived from biometric template. From that coordinate points elliptic curve is generated using elliptic curve algorithm.
4
Literature Review
TITLE
Dual RSA and Its security Analysis A Fuzzy Biometric Remote User Authentication Scheme
YEAR
METHOD,MERITS AND DEMERITS
RSA Algorithm Key size is large(large memory) Diffie-Hellman Algorithm No need to store biometric information in chip Grip-type hand vein authentication and Region of Interesting(ROI) method. Fast verification method
5
2007
2008
Biometric Verification Using Hand Veinpatterns
2008
3/12/2013
Contd
TITLE A fuzzy biometric remote user authentication scheme YEAR METHOD,MERITS AND DEMERITS
2008
No need to store biometric information in user side
securing the biometric model
2002
Biometric Architecture and system Security method is proposed
A study on secure protocol using the public key approach In an e-passport
3/12/2013
2009
public key approach, safe key distribution
BLOCK DIAGRAM
I/P
Extractor
Coordinate points
Elliptic curve algorithm
Elliptic curve
O/P
3/12/2013
Flow chart for convert image in to matrix and set threshold value
Image
Extractor(matlab)
Intensity matrix value(a) Threshold value(b) If a>=b
YES
Set C=1 (x,y)coordinate points Set C=0
8
NO
3/12/2013
Convert the thumb print in to
matrix.
Work done
Obtain the intensity from the
matrix.
Then set the threshold value and
3/12/2013
set one for intensity value whose value greater then threshold value and set zero for intensity value whose value less than threshold value.
Program for convert image in to matrix & set the threshold value
3/12/2013
10
Image size
3/12/2013
11
Output:thumb print
3/12/2013
12
Intensity value of the input image
3/12/2013
13
Intensity value of the image after setting threshold value
3/12/2013
14
Gray scale colour and intensity value of each pixel
3/12/2013
15
Original image and threshold image
3/12/2013
16
3/12/2013
References
Mohamed Abid and Hossam Afifi, Towards a secure ePassport protocol based on biometrics Journal of Information Assurance and security IEEE 4 (2009) 338345. Albert B.Jecg, Lo-Yi chen How to enhance the security of e-Passport, Proceedings of the Eight International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009. Ari Juels, David Molnar and David Wagner, Security and Privacy Issues in e-Passports, Proceedings of the first International conference on Security and Privacy for Emerging Areas in Communication Networks, IEEE, 2005. Marci Meingast, Jennifer King and Deirdre K.Mulligan Embedded RFID and Everyday Things : A case study of the security and privacy risks of the U.S. e-Passport IEEE international conference on RFID-2007.
17
Contd
V.Pasupathinathan,J.Pieprzyk, H.Wang,Formal analysis of icaos e-passport specification In:Brankovic,L., Miller, M.(eds.) Australasian Information Security Conference (AISC2008). Conferences in Research and Practice in Information Technology (CRPIT), vol. 81,Australian Computer Society (2008)
A.K.Jain, H.Lin,S. Pankanti, R. Bolle,An identityauthentication system using fingerprints, Journal: Proceedings of the IEEE, Volume: 85, Issue: 9, Sep 1997. A. Ahmed and I. Traore. A new biometric technology based on mouse dynamics. Dependable and Secure Computing, IEEE Transactions on,4(3):165.179, July 2007.
18
3/12/2013
THANK YOU
3/12/2013
19
Program for obtaining (x,y)coordinates of the thumb image after set the threshold value