You are on page 1of 14

Presented by

N.V.S. Chiranjeevi Nunna
Under the internal supervisor of
D.Srinivas (Ass. Prof.)

GROUP SIGNATURE AND DYNAMIC
BROADCAST ENCRYPTION TECHNIQUES
Presented by
N.V.S. Chiranjeevi Nunna
Under the internal supervisor of
D.Srinivas (Ass. Prof.)


FINGERPRINT COMBINATION
FOR PRIVACY PROTECTION
Table of contents
 INTRODUCTION
 EXISTING SYSTEM
 DRAWBACKS
 ALGORITHM
 PROPOSED SYSTEM
 PROPOSED ALGORITHM
 ENVIRONMENT
 CONCLUSION

INTRODUCTION
 In the enrollment, two fingerprints are
captured from two different fingers.
 Based on this extracted information and our
proposed coding strategies, a combined
minutiae template is generated and stored in
a database.
 In the authentication, the system requires two
query fingerprints from the same two fingers
which are used in the enrollment
EXISTING SYSTEM
 Combining multiple biometrics to protect privacy.

 Mixing fingerprints for generating virtual identities.

 Generating cancelable fingerprint templates
DRAWBACKS OF EXISTING SYSTEM
 It requires two separate databases to work
together, which is not practical in some
applications.

 It is easy for the attacker to identify a new identity.

 Lead to a reduction in matching accuracy.

EXISTING SYSTEM ALGORITHM
 Fingerprint Decomposition

PROPOSED SYSTEM
 We propose a novel system for protecting
fingerprint privacy by combining two different
fingerprints into a new identity.
 We propose a combined minutiae template
generation algorithm to create a combined
minutiae template from the two fingerprints.
 The template will be stored in a database for the
authentication which requires two query
fingerprints.


 By using the combined minutiae template, the
complete minutiae feature of a single fingerprint
will not be compromised when the database is
stolen.

 The combined fingerprint issues a new virtual
identity for two different fingerprints, which can be
matched using minutiae based fingerprint
matching algorithms.

PROPOSED ALGORITHM
 Combined Minutiae Template Generation
Algorithm.

ENVIRONMENT
HARDWARE
 PROCESSOR : PENTIUM IV 2.6 GHz,
Intel Core 2Duo.
 RAM : 512 MB DD RAM
 MONITOR : 15” COLOR
 HARD DISK : 40 GB

SOFTWARE
 Front End : Core JAVA
 Operating System : Windows 07
 Back End Tool : MATLAB 7.14 Version
R2012

CONCLUSION
 The proposed combination of finger-minutiae
used to the biometrics based personal
identification.
 We measure the image quality performance.
 The combined minutiae template share a similar
topology to the original minutiae templates, it can
be converted into a real-look alike combined
fingerprint by using an existing fingerprint
reconstruction approach.