Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/816
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | kumari, Vasantha | - |
dc.contributor.author | peerzade, Umar | - |
dc.contributor.author | Nayak, Subhralina | - |
dc.contributor.author | V, Bhagya | - |
dc.contributor.author | Senbagavalli, M | - |
dc.date.accessioned | 2023-06-05T08:58:08Z | - |
dc.date.available | 2023-06-05T08:58:08Z | - |
dc.date.issued | 2021-02-02 | - |
dc.identifier.issn | 2395-0072 | - |
dc.identifier.issn | 2395-0056 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/816 | - |
dc.description.abstract | , - in today’s era with immense usage of internet and development in the innovation has made development transmission of advanced substance is confronting a significant part in test of security. thus reliably secure component is required to ensure the touchy information and furthermore its confidentiality ought to be guaranteed. The proposed system the utilization of visual cryptography helps in secure transmission of information from sender to recipient in a dependable manner. the fundamental idea behind visual cryptography is to partition mystery pictures into arbitrary offers or random shares and afterward apply them to biometric information, for example, unique mark and iris with the end goal of client validation. in conventional the key that is created can be lost, forgotten or hard to recall in occasions however this paper acquaints a profitable route with manage key age from numerous element extraction from preprocessed finger impression and iris biometric pictures which are intertwined at feature level. Normalized values got from both the vectors are consolidated to frame cryptographic key age. utilizing key produced irregular lattice is shaped and shares are created which is encoded and further confirmed utilizing biometric authorization process at the unscrambling or decryption end henceforth this paper secured application using cryptographic key generation from different biometric modalities of human beings, and iris. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJERT | en_US |
dc.subject | Key generation | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Decryption | en_US |
dc.subject | Encryption | en_US |
dc.title | Biometric authentication system using visual cryptography | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IRJET-V8I2117.pdf Restricted Access | 1.34 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.