You are on page 1of 22

FORMATION OF ELLIPTIC CURVE USING BIOMETRIC TEMPLATE

PHASE-1 SECOND REVIEW

Project by
Thiruvaimalar nathan.B 09AER022 ME(Applied Electronics)

Guided by
Prof.R.Meenakumari H.O.D,Dept. of EEE

3/12/2013

Objective

To develop a secured documentation using biometric template(finger and facial print) for secured documentation. From the coordinate points of biometric template, elliptic curve is created using elliptic curve algorithm which ensures security.
2

3/12/2013

Existing method

Presently biometric templates (face, iris, and fingerprint) in chips are exposed to clandestine scanning which does not assure security. Data confidentiality is also compromised since existing system uses RSA(Rivest, Shamir,Adleman) algorithm.
3

3/12/2013

Proposed Method


3/12/2013

The drawback in the present system is addressed in this project. Minute coordinate points are derived from biometric template. From that coordinate points elliptic curve is generated using elliptic curve algorithm.
4

Literature Review
TITLE
Dual RSA and Its security Analysis A Fuzzy Biometric Remote User Authentication Scheme

YEAR

METHOD,MERITS AND DEMERITS


RSA Algorithm Key size is large(large memory) Diffie-Hellman Algorithm No need to store biometric information in chip Grip-type hand vein authentication and Region of Interesting(ROI) method. Fast verification method
5

2007

2008

Biometric Verification Using Hand Veinpatterns

2008

3/12/2013

Contd
TITLE A fuzzy biometric remote user authentication scheme YEAR METHOD,MERITS AND DEMERITS

2008

No need to store biometric information in user side

securing the biometric model

2002

Biometric Architecture and system Security method is proposed

A study on secure protocol using the public key approach In an e-passport


3/12/2013

2009

public key approach, safe key distribution

BLOCK DIAGRAM

I/P

Extractor

Coordinate points

Elliptic curve algorithm

Elliptic curve

O/P

3/12/2013

Flow chart for convert image in to matrix and set threshold value

Image
Extractor(matlab)

Intensity matrix value(a) Threshold value(b) If a>=b


YES
Set C=1 (x,y)coordinate points Set C=0
8

NO

3/12/2013

Convert the thumb print in to


matrix.

Work done

Obtain the intensity from the


matrix.

Then set the threshold value and

3/12/2013

set one for intensity value whose value greater then threshold value and set zero for intensity value whose value less than threshold value.

Program for convert image in to matrix & set the threshold value

3/12/2013

10

Image size

3/12/2013

11

Output:thumb print

3/12/2013

12

Intensity value of the input image

3/12/2013

13

Intensity value of the image after setting threshold value

3/12/2013

14

Gray scale colour and intensity value of each pixel

3/12/2013

15

Original image and threshold image

3/12/2013

16


3/12/2013

References
Mohamed Abid and Hossam Afifi, Towards a secure ePassport protocol based on biometrics Journal of Information Assurance and security IEEE 4 (2009) 338345. Albert B.Jecg, Lo-Yi chen How to enhance the security of e-Passport, Proceedings of the Eight International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009. Ari Juels, David Molnar and David Wagner, Security and Privacy Issues in e-Passports, Proceedings of the first International conference on Security and Privacy for Emerging Areas in Communication Networks, IEEE, 2005. Marci Meingast, Jennifer King and Deirdre K.Mulligan Embedded RFID and Everyday Things : A case study of the security and privacy risks of the U.S. e-Passport IEEE international conference on RFID-2007.
17

Contd

V.Pasupathinathan,J.Pieprzyk, H.Wang,Formal analysis of icaos e-passport specification In:Brankovic,L., Miller, M.(eds.) Australasian Information Security Conference (AISC2008). Conferences in Research and Practice in Information Technology (CRPIT), vol. 81,Australian Computer Society (2008)

A.K.Jain, H.Lin,S. Pankanti, R. Bolle,An identityauthentication system using fingerprints, Journal: Proceedings of the IEEE, Volume: 85, Issue: 9, Sep 1997. A. Ahmed and I. Traore. A new biometric technology based on mouse dynamics. Dependable and Secure Computing, IEEE Transactions on,4(3):165.179, July 2007.
18

3/12/2013

THANK YOU

3/12/2013

19

Program for obtaining (x,y)coordinates of the thumb image after set the threshold value

You might also like