Open Access Open Access  Restricted Access Subscription Access

Performance Analysis of Cancelable Unimodal and Multiple Biometric Using Distortion Transformation Algorithm


Affiliations
1 Department of computer science, PSGR Krishnammal College of arts and science, Coimbatore, India
 

Objectives: Cancelable unimodal and Multiple Biometric Using Distortion Transformation Algorithm solve the problem of raucous data, non-universality and unacceptable error rate during authentication.

Methods: Distortion Transformation algorithm used for generate key from multiple biometrics.

Results: The cryptographic key generation of multiple finger print and palm print of the same person. It gives more authentications.

Conclusion: The features are extracted from the palm print and multiple finger print of same person. The extracted features are used to generate the key using distortion algorithms which are used for further authentication. This cryptographic key is stored in the database and used for verification process.


Keywords

Security Analysis, Palm Print, Biometric System, Multiple Fingerprints, Fusion.
User
Notifications

Abstract Views: 229

PDF Views: 0




  • Performance Analysis of Cancelable Unimodal and Multiple Biometric Using Distortion Transformation Algorithm

Abstract Views: 229  |  PDF Views: 0

Authors

N. Gomathy
Department of computer science, PSGR Krishnammal College of arts and science, Coimbatore, India
N. Radha
Department of computer science, PSGR Krishnammal College of arts and science, Coimbatore, India

Abstract


Objectives: Cancelable unimodal and Multiple Biometric Using Distortion Transformation Algorithm solve the problem of raucous data, non-universality and unacceptable error rate during authentication.

Methods: Distortion Transformation algorithm used for generate key from multiple biometrics.

Results: The cryptographic key generation of multiple finger print and palm print of the same person. It gives more authentications.

Conclusion: The features are extracted from the palm print and multiple finger print of same person. The extracted features are used to generate the key using distortion algorithms which are used for further authentication. This cryptographic key is stored in the database and used for verification process.


Keywords


Security Analysis, Palm Print, Biometric System, Multiple Fingerprints, Fusion.