28 results on '"N. Lalithamani"'
Search Results
2. Efficient storage and retrieval of medical records using fusion-based multimodal biometrics.
- Author
-
N. Lalithamani and C. Amrutha
- Published
- 2018
- Full Text
- View/download PDF
3. Machine Learning Methods for Predictive Customer Churn Analysis in the Telecom Industry
- Author
-
R, Navienkumar, primary and N, Lalithamani, additional
- Published
- 2023
- Full Text
- View/download PDF
4. An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics.
- Author
-
N. Lalithamani and K. P. Soman
- Published
- 2009
- Full Text
- View/download PDF
5. Preventing COVID-19 Using Edge Intelligence in Internet of Medical Things
- Author
-
R. Mahalakshmi and N. Lalithamani
- Published
- 2022
- Full Text
- View/download PDF
6. Stability Results of Thermal Control System with Time-Dependent Delays and Perturbations of Nonlinearity
- Author
-
Gemechu, Dagne Asefa, primary, Prabakaran, K., additional, N, Lalithamani, additional, Nagarajan, S., additional, Umamaheswaran, S., additional, S, Umamageshwari., additional, and Feyisa, Meseret Leta, additional
- Published
- 2022
- Full Text
- View/download PDF
7. English to Tamil Multi-Modal Image Captioning Translation
- Author
-
V H Vishnu Kumar and N Lalithamani
- Published
- 2022
- Full Text
- View/download PDF
8. INTUITIONISTIC FUZZY IDEALS AND INTUITIONISTIC FUZZY FILTERS OF TERNARY SEMIGROUPS
- Author
-
N. Lalithamani, R. Ramesh, and K. Prabakaran
- Subjects
Pure mathematics ,Computer Science::Graphics ,Mathematics::Commutative Algebra ,Mathematics::General Mathematics ,General Mathematics ,Intuitionistic fuzzy ,Mathematics - Abstract
In this paper, we consider the intuitionistic fuzzification of ternary sub semigroups (left ideals, right ideals, lateral ideals, ideals) and intuitionistic fuzzification of left filters (right filters, lateral filters, filters) of ternary semigroups and investigate some of their basic properties.
- Published
- 2020
- Full Text
- View/download PDF
9. INTUITIONISTIC FUZZY INNER UNITARY SUBSEMIGROUPS AND INTUITIONISTIC FUZZY GROUP CONGRUENCES ON A REGULAR SEMIGROUP
- Author
-
N Lalithamani and N. Uthirasamy
- Subjects
Organizational Behavior and Human Resource Management ,Pure mathematics ,Social Psychology ,Group (mathematics) ,Strategy and Management ,Intuitionistic fuzzy ,Congruence relation ,Regular semigroup ,Unitary state ,Mathematics - Published
- 2020
- Full Text
- View/download PDF
10. Intuitionistic Fuzzy Ideals and Fuzzy Filters Of Ternary Semigroups
- Author
-
K. Prabakaran, S. Jagatheswari, and N Lalithamani
- Subjects
Algebra ,Organizational Behavior and Human Resource Management ,Social Psychology ,Strategy and Management ,Intuitionistic fuzzy ,Fuzzy logic ,Mathematics - Published
- 2020
- Full Text
- View/download PDF
11. Gesture Control Using Single Camera for PC
- Author
-
N. Lalithamani
- Subjects
Computer science ,business.industry ,020206 networking & telecommunications ,Input device ,02 engineering and technology ,Facial recognition system ,Gesture recognition ,Identification (information) ,Personal computer ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,PC ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Face recognition ,User interface ,business ,General Environmental Science ,Gesture - Abstract
In the past decade, more stress has been given to user interface since technology is made available to every human being. This includes advancement of touch technology over buttons and many more gesture control mechanisms. These technologies enable even a laymen to better use the day-to-day technologies like cell phone and personal computer easily with navigation. This work focuses on one such technology that can be implemented on a PC (Personal Computer). We use single web camera as input device to recognize gestures of hand. Some of these gestures include controlling the mouse cursor, the clicking actions, and few shortcuts for opening specific applications. This work includes Face Recognition model as an replacement for default lock screen. The Face Recognition model uses Viola and Jones method for detection of face and PCA (Principal Component Analysis) for recognition and identification of algorithms.
- Published
- 2016
- Full Text
- View/download PDF
12. Dual Encryption Algorithm to Improve Security in Hand Vein and Palm Vein-Based Biometric Recognition
- Author
-
N. Lalithamani and M. Sabrigiriraj
- Subjects
Palm vein ,Biometrics ,business.industry ,Computer science ,Health Informatics ,Radiology, Nuclear Medicine and imaging ,Computer vision ,Hand vein ,Artificial intelligence ,DUAL (cognitive architecture) ,business ,Encryption - Published
- 2015
- Full Text
- View/download PDF
13. Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem
- Author
-
N. Lalithamani and M. Sabrigiriraj
- Subjects
Password ,Biometrics ,Computer science ,business.industry ,Feature vector ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Computer security ,computer.software_genre ,Image (mathematics) ,Face (geometry) ,Media Technology ,Key (cryptography) ,Cryptosystem ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer ,Decoding methods - Abstract
Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed hand and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and hand vein image...
- Published
- 2014
- Full Text
- View/download PDF
14. SUMMARIZATION USING NTC APPROACH BASED ON KEYWORD EXTRACTION FOR DISCUSSION FORUMS
- Author
-
S. Shanmugapriya, K. Alagammai, N. Lalithamani, Raga SupriyaDarisi, L. Radhika, and Kolluru Kamala Sowmya
- Subjects
Information retrieval ,Computer science ,business.industry ,media_common.quotation_subject ,GRASP ,Keyword extraction ,Automatic summarization ,World Wide Web ,Semantic similarity ,Conversation ,The Internet ,Cluster analysis ,business ,Sentence ,media_common - Abstract
Internet has become a ubiquitous medium of communication, be it through any social networking websites like Facebook, Twitter or any discussion forums like Yahoo Answers, Quora, Stack Overflow. One can participate in any kind of discussion ranging from politics, education, spirituality, philosophy, science and geography to medicine and many more. Often, most of the discussion forums are loaded up with data. Hence, when a new user wants to know the public opinion, it is impossible for him/her to go through all the tens or hundreds of threads or comments under a particular thematic discussion. The problem here is - we are buried in data but we starve for information. So, to solve this problem, we are proposing a novel approach called Discussion Summarization which is aimed at presenting the user with the most relevant summary containing all the important points of the discussion. This allows the user to easily and quickly grasp and catch up on the on-going conversation in a discussion thread. The summary generated follows CRS approach (Clustering and Ranking and Score calculation for each sentence).The Cluster based Summarization technique is coupled with Nested Thematic Clustering (NTC) and Corpus Based Semantic Similarity (CBSS) approaches. The summary produced is the set of top-ranked sentences (of high scores). Results have shown that a completely unbiased summary with the multidimensionality of comments is generated.
- Published
- 2014
- Full Text
- View/download PDF
15. Survey on nonobstructive and continuous user authentication on mobile devices
- Author
-
N. Lalithamani, D Raam Balaji, and Svpkh Satya Dev
- Subjects
021110 strategic, defence & security studies ,User authentication ,Authentication ,Computer science ,0211 other engineering and technologies ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Field (computer science) ,Constant (computer programming) ,Order (business) ,0202 electrical engineering, electronic engineering, information engineering ,Mobile device ,computer ,Personally identifiable information - Abstract
The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper deals with the methods that have been proposed till now and the challenges that are yet to be overcome in this field.
- Published
- 2017
- Full Text
- View/download PDF
16. A survey of extant surveillance systems using biometrie tracking
- Author
-
N. Lalithamani, B Sunil Dev Choudhary, and Vasanth Subramanian
- Subjects
Extant taxon ,Biometrics ,Scope (project management) ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,020207 software engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Computer security ,computer.software_genre ,computer ,Data science - Abstract
Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.
- Published
- 2017
- Full Text
- View/download PDF
17. Palm Print and Palm Vein Biometric Authentication System
- Author
-
N. Lalithamani, J. Ajay Siddharth, A. P. Hari Prabha, and T. J. Srinivasan
- Subjects
020301 aerospace & aeronautics ,Authentication ,Palm print ,Biometrics ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Encryption ,0203 mechanical engineering ,Region of interest ,Computer data storage ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Preprocessor ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business - Abstract
The modern computing technology has a huge dependence on biometrics to ensure strong personal authentication. The mode of this work is to increase accuracy with less data storage and providing high security authentication system using multimodal biometrics. The proposed biometric system uses two modalities, palm print and palm vein. The preprocessing steps begin with image acquisition of palm print and palm vein images using visible and infrared radiations, respectively. From the acquired image, region of interest (ROI) is extracted. The extracted information is encrypted using encryption algorithms. By this method of encryption, after ROI extraction, the storage of data consumes less memory and also provides faster access to the information. The encrypted data of both modalities are fused using advanced biohashing algorithm. At the verification stage, the image acquired is subjected to ROI extraction, encryption and biohashing procedures. The biohash code is matched with the information in database using matching algorithms, providing fast and accurate output. This approach will be feasible and very effective in biometric field.
- Published
- 2017
- Full Text
- View/download PDF
18. A Survey for Securing Online Payment Transaction Using Biometrics Authentication
- Author
-
M. Hari Priya and N. Lalithamani
- Subjects
Password ,Authentication ,Biometrics ,business.industry ,Computer science ,010401 analytical chemistry ,Internet privacy ,Payment system ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,Purchasing ,020202 computer hardware & architecture ,0104 chemical sciences ,Order (business) ,0202 electrical engineering, electronic engineering, information engineering ,Payment service provider ,business ,computer ,Database transaction - Abstract
In emerging lifestyle, people prefer online shopping as the most convenient way for purchasing their products. In order to provide secure transaction in e-commerce site, biometric features are incorporated in authentication. Biometric features are considered to be easier and secure because it solves the exasperation by the customer to recall the long account number and their password and it also has unique feature all over the globe. The use of biometrics authentication in online site provides more secure way of transaction than any other means [1, 2, 3]. In this work, we summarize the study of the various kinds of biometric traits that are used for online payment compared with one another.
- Published
- 2017
- Full Text
- View/download PDF
19. Ranking Uncertain Distributed Database at Tuple Level
- Author
-
N. Lalithamani
- Subjects
Information retrieval ,Distributed database ,Computer science ,Minimum time ,Process (computing) ,Data mining ,Tuple ,computer.software_genre ,User input ,computer ,Ranking (information retrieval) ,Attribute level - Abstract
In distributed database system, the data are located at different locations. As the data are at multiple locations, it may not be accurate. It may contain uncertain values or even some data may be missing. Due to impreciseness and uncertainty in the data, occurrence of error becomes high. This makes the processing of the data difficult. There are many ways to handle uncertain databases. To obtain required data, ranking technique is used. One such technique is the top-k query method where the data are retrieved according to user input. This paper proposes an algorithm that ranks and retrieves the data in minimum time at tuple level. In addition, the number of records traversed during this ranking and retrieval process is minimized. The time taken for retrieval of the records is also analyzed.
- Published
- 2016
- Full Text
- View/download PDF
20. Counter Measures for Indirect Attack for Iris based Biometric Authentication
- Author
-
R. Sujitha and N. Lalithamani
- Subjects
Multidisciplinary ,Biometrics ,Computer science ,business.industry ,Iris recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,02 engineering and technology ,urologic and male genital diseases ,ComputingMethodologies_PATTERNRECOGNITION ,Bag-of-words model ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,IRIS (biosensor) ,Computer vision ,Artificial intelligence ,business ,Vulnerability (computing) - Abstract
Background/Objectives: One of the most robust biometric based recognitions in existence is iris recognition, which has many practical applications in many fields including live passwords and forensics etc. Governments use iris codes as unique code to identify an individual (used in AADHAR). Even if iris recognition system is considered as impossible to break and it is highly secured, it is prone to some vulnerability. Attacks like indirect and direct attacks can be performed in iris based recognition for penetrating in to the system and fraudulently accessing it. In this paper, a method is proposed, which will determine a user as genuine or an imposter. Methods/Statistical Analysis: For detecting whether an imposter wearing a textured lens, BoW (Bag of Words) method is used. Findings: In this paper the biometric template created from the iris which does not have contact lens is matched against the previously stored biometric templates. Confusion matrix for lens detection is calculated. Images from two databases are used for experimental purposes, IIIT-D contact lens database and CASIA-Iris-interval database. Application/Improvement: BoW method improves the performance of the existing method for contact lens detection.
- Published
- 2016
- Full Text
- View/download PDF
21. Embedding of iris data to hand vein images using watermarking technology to improve template protection in biometric recognition
- Author
-
M. Sabrigiriraj and N. Lalithamani
- Subjects
Authentication ,Biometrics ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Iris recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Encryption ,Iris flower data set ,Region of interest ,Computer vision ,Artificial intelligence ,Eye vein verification ,business ,Digital watermarking - Abstract
Biometric recognition is noteworthy method for recognition of person in recent years. Here, a common concern is biometric security which is the privacy issues derived from storage and misuses of the template data. In order to handle this issue, researches have proposed different algorithms to be confronted by security of biometric systems. Two major ways are, (1) Encryption, and (2) watermarking by securing biometric images and templates. In this paper, we utilise a watermarking technology to improve the template security in biometric authentication. According to, two modalities such as, iris and hand vein is taken to preserve the characteristics of liveliness and permanency. Our proposed technique for embedding of iris data to hand vein images using watermarking technology to improve template protection in biometric recognition is done based on the following steps, i) pre-processing of iris and hand vein images, ii) iris template extraction, iii) Vein extraction, iv) Embedding of iris pattern to vein images based on region of interest, v) Storing embedded images. In the recognition phase, iris pattern is extracted from the embedded image and then, matching is done with query images. The final decision of authentication is done based on the product rule-based score level fusion. The implementation is done using MATLAB and the performance of the technique is analysed with FAR, FRR and accuracy.
- Published
- 2015
- Full Text
- View/download PDF
22. Efficient storage and retrieval of medical records using fusion-based multimodal biometrics
- Author
-
C. Amrutha and N. Lalithamani
- Subjects
Information retrieval ,Biometrics ,Computer science ,business.industry ,Process (engineering) ,Medical record ,Fingerprint (computing) ,General Engineering ,Cryptography ,Computer Science Applications ,Feature (computer vision) ,Server ,Confidentiality ,business ,Software - Abstract
Biometrics helps to uniquely identify a person using their biological features and hence is used to develop systems with a high level of security. Multimodal biometrics further increases the level of security and provides controlled access, using the combination of multiple traits to identify a person. This paper presents an application of multimodal biometrics to efficiently store, access and retrieve medical records of a patient, which is independent of the hospital servers across the country. In case of emergencies, where it is important to know the medical history of a patient, the record can securely be accessed from a cloud server by using their biometric traits. Here we use two traits, face print and fingerprint to simulate the process of uniquely identifying a patient's record which is stored on a cloud server. The records can only be accessed by authorised representatives of the hospitals, which preserve its confidentiality. Feature level fusion technique is used to determine if a record, corresponding to a patient is available in the database. Cryptographic methods like shuffling algorithms are applied for further security of the records.
- Published
- 2018
- Full Text
- View/download PDF
23. A Mixed-Initiative Approach for Summarizing Discussions Coupled with Sentimental Analysis
- Author
-
S. Shanmugapriya, Kolluru Kamala Sowmya, Rajeev Sukumaran, V. Divyalakshmi, K. Alagammai, and N. Lalithamani
- Subjects
Entertainment ,Politics ,Information retrieval ,Computer science ,business.industry ,Sentiment analysis ,Keyword extraction ,The Internet ,business ,Cluster analysis ,Automatic summarization ,Juncture - Abstract
In this fast moving world, everybody has the urge to get updated to what's happening around the world. There is a heavy demand for knowing information which is crisp and to the point without getting reading the may be ten articles on it, but to get what the ten articles mean. So, to solve this issue, here we present a novel approach for 'Summarizing the Discussion' which is aimed at presenting the user with the most relevant summary containing all the important points of the discussion. At this juncture, we need to consider the polarity of comments and the whole discussion and present the user with a short, unbiased, comprehensive and non-redundant summary. Our proposal consists of a Nested Thematic Clustering approach coupled with Keyword or Key phrase extraction and sentiment analysis or rather polarity calculation. Be it political, social, geographical, philosophical, superstitious, educational, and environmental or entertainment domain, all the news is generally shared through forms or posts of internet. Now, it gets a little obvious that different people have different views. Hence, we make it a point to include and ensure the multi-dimensionality of every thread under the post. We have used an extractive method of summarization with the help of Natural Language Processing where we incorporate the techniques of repeated clustering and ranking. The proposed model is able to generate a desirably relevant summary.
- Published
- 2014
- Full Text
- View/download PDF
24. Towards generating irrevocable key for cryptography from cancelable fingerprints
- Author
-
K. P. Soman and N. Lalithamani
- Subjects
Minutiae ,Biometrics ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Cryptography ,Information security ,Computer security ,computer.software_genre ,Identifier ,Public key fingerprint ,Identity theft ,Key (cryptography) ,business ,computer - Abstract
The increasing immensity of identity theft in our society has resulted in the prioritization of dependable information security mechanisms. Despite the fact that it is possible to bring about information security with the aid of a prevailing such as like cryptography, protecting the confidentiality of the cryptographic keys is one of the major issues to be handled. It is possible to effectively solve the issue by combining biometrics and cryptography. Recently, the improved performance of cryptographic key produced from biometrics in terms of protection has acquired massive reputation amid the researchers and experimenters. Nevertheless, there is an enduring association amid the biometric and the user where in alteration is impracticable. Therefore, the biometric is vanished eternally and probably for all the applications that apply it, when a compromise of the biometric identifier is present. This might be resolved by building revocable biometric templates through cancelable biometrics. Here, we have projected an approach to produce irrevocable cryptographic key from cancelable fingerprint templates, a process which proposed algorithm carries out in an efficient manner. To begin with, the fingerprints are utilized to extract the minutiae points that are altered, in an efficient manner so as to acquire transformed points. Consequently, the transformed points are used to produce the cancelable templates which are in turn utilized for the extraction of irrevocable keys. It is extremely unfeasible to obtain cancelable fingerprint templates and original fingerprints from the generated key since the cryptographic key produced is irrevocable. The fingerprints accessible from open sources have been employed to assess the efficacy of our approach.
- Published
- 2009
- Full Text
- View/download PDF
25. An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics
- Author
-
K. P. Soman and N. Lalithamani
- Subjects
Minutiae ,Key generation ,Theoretical computer science ,Public key fingerprint ,Biometrics ,business.industry ,Fingerprint ,Computer science ,Data_MISCELLANEOUS ,Key (cryptography) ,Cryptography ,Fingerprint recognition ,business - Abstract
The principal drawback of the existing cryptographic algorithms is the maintenance of their key’s secrecy. Added with, human users have a difficult time remembering strong but lengthy cryptographic keys. As a result, utilizing individual’s biometric features in the generation of strong and repeatable cryptographic keys has gained enormous popularity among researchers. The unpredictability of the user's biometric features, incorporated into the generated cryptographic key, makes the key unguessable to an attacker lacking noteworthy knowledge of the user's biometrics. Nevertheless, if a person’s biometric is lost once, it will be compromised forever as it is inherently associated with the user. To overcome the above, cancelable biometrics has been proposed as an effective solution for canceling and re-issuing biometric templates. Here, we propose an innovative and efficient approach to generate a non-invertible cryptographic key from cancelable fingerprint templates. Initially, a one-way transformation is applied on the minutiae points extracted from the fingerprints, to attain a set of transformed points. Subsequently, the transformed points are made use of to form cancelable templates. The cancelable fingerprint templates are then utilized to generate a unique non-invertible key. As the cryptographic key generated is non-invertible, it is highly infeasible to acquire the cancelable fingerprint templates or the original fingerprint from the generated key. The effectiveness of the proposed approach is demonstrated by making use of fingerprints accessible from public sources.
- Published
- 2009
- Full Text
- View/download PDF
26. A New Adaptive Filter for Removal of Impulse Noise with Uncertainty
- Author
-
K. Prabakaran, N. Lalithamani, P. Kiruthika, and S. Jagatheswari
- Subjects
Noise measurement ,business.industry ,Salt-and-pepper noise ,General Medicine ,Impulse noise ,Non-local means ,Noise ,symbols.namesake ,Gaussian noise ,Computer Science::Computer Vision and Pattern Recognition ,Image noise ,Median filter ,symbols ,Computer vision ,Artificial intelligence ,business ,Simulation ,Mathematics - Abstract
Image Denoising remains a fundamental problem in the field of image processing. It is necessary to apply an efficient denoising technique to compensate for data corruption. In this paper, different filters such as AM, MMEM, BDND, FM, etc., are used to denoise an image. But the above filtering method does not produce good image quality when the noise level is higher than 60%. To represent the uncertainties better and resolve the image quality problems, a novel effective filter is presented based on Cloud Model (CM) for impulse noise removal. The CM filter has the better performance in image denoising across a wide range of noise levels. Even if the noise level is close to 95%, the CM filter can restore the images with good detail preservation. Comparisons of denoised images are done using the quality metrics measurements which includes Peak Signal to Noise Ratio (PSNR) and Mean Squared Error (MSE).
- Published
- 2016
- Full Text
- View/download PDF
27. Speckle Reduction Algorithm for Medical Ultrasound Imaging
- Author
-
K. Prabakaran, N. Lalithamani, and P. Kiruthika
- Subjects
General Medicine - Published
- 2016
- Full Text
- View/download PDF
28. Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem
- Author
-
N. Lalithamani and M. Sabrigiriraj
- Subjects
Computer Vision and Pattern Recognition ,Computer Graphics and Computer-Aided Design ,Software - Abstract
Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed face and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and face image is constructed and is combined with the stored fuzzy vault to generate the final key. Finally, the experimentation is conducted using the palm vein and face database available in the CASIA and JAFFE database. The evaluation metrics employed are FMR (False Match Ratio) and GMR (Genuine Match Ratio). From the metric values obtained for the proposed system, we can infer that the system has performed well.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.