Loading

Secured Biometric Authentication of Iris Image using Visual Cryptography
Shafiqua Noorain1, Mala L Muddannavar2

1Shafiqua Noorain*, M.Tech student, Department of Electronics and communication Engineering at SDM College of Engineering and Technology, Dharwad, Karnataka, India.
2Mala L Muddannavar, Assistant Professor, Department of Electronics and communication Engineering at SDM College of Engineering and Technology, Dharwad, Karnataka, India.
Manuscript received on July 02, 2020. | Revised Manuscript received on July 10, 2020. | Manuscript published on August 30, 2020. | PP: 281-284 | Volume-9 Issue-6, August 2020. | Retrieval Number: F1393089620/2020©BEIESP | DOI: 10.35940/ijeat.F1393.089620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the modern era of information technology security violation and attacks are increasing day by day . So, in order to manage this issues the number of ways of providing security to the systems are introduced .In which the most promising one is to improve the security by identifying or verifying the person using some technique. So, the basic idea is to use the identity of a person which can improve the security. Thus, the proposed work focuses on the security architecture for protecting integrity of iris images using watermarking and visual cryptography (VC). First, for protecting the iris image, a watermark text image which carries personal information is embedded in the middle frequency band region of the iris image which randomly interchanges multiple middle band pairs of discrete cosine transform(DCT). Second, for iris template protection, the watermarked image is further processed to generate a template using Gabor filter, the template is gone through another security protection scheme VC. Here the template is divided into two shares this is enrollment module. For the authentication module both shares are overlapped and template is generated. This generated template and the template from Gabor filter are matched using canny edge detection authentication is provided. Otherwise, the person is unauthenticated. This paper is implemented using Matlab. 
Keywords: Biometrics, Watermarking, Discrete Cosine Transform, Template Matching, Visual Cryptography.