Call For Paper

Volume 10 Issue 4

April 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

BIOMETRIC TEMPLATE SECURITY FOR FACE SPOOFING

Author(s):

Sheeba Ann Thomas

Keywords:

Identity management, biometric system security, template protection, biometric template

Abstract

Biometric systems are commonly used in our day-to-day life. Now a days, criminals are developing technique to accurately simulate the physical, physiological and behavioral characteristics of valid user known as spoofing attack. Face being a promising trait due to convenience and acceptability. So, it can be easily fooled with printed photographs and by attacking the templates stored in the database. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the number of shares which independently disclose no information about the original image. There are various biometric templates like fingerprints, face, voice, signature and iris. In particular we focus on biometric template security which is an important issue. we are assigning a unique number to every template which is encrypted using Visual Cryptography. Visual cryptography provides an extra layer of authentication. The combination of biometrics and visual cryptography is a promising information security technique which offers an efficient way to protect the biometric template. In this work, we are providing two-fold security to the face template Biometric authentication is used for identification and access control. Biometric recognition offers a reliable solution to the problem of user authentication in identity management system. With the widespread deployment of biometric system, there is an increasing concern about the security and privacy in the biometric technology.

Other Details

Paper ID: IJSARTV
Published in: Volume : 4, Issue : 11
Publication Date: 11/6/2018

Article Preview




Download Article