03-09-2014, 12:58 PM
ATM using fingerprint
ATM using fingerprint.pptx (Size: 491.51 KB / Downloads: 17)
ABSTRACT
Crypto-ATM banking systemsBiometric authentication scheme for
The fingerprint image is enhanced and then encrypted using 128 bit private key algorithm
The proposed scheme is fast and more secure
Computer simulations and statistical analysis are presented
INTRODUCTION
Biometrics based authentication is a potential candidate to replace password-based authentication
Cryptography provides the necessary tools for accomplishing secure and authenticated transactions
It not only protects the data from theft or alteration, but also can be used for user authentication
The current system can only identify the maker’s belongings (cards) or what he remembers (passwords, PINs etc.) Automatic biometric authentication is an emerging field to address this problem
EMBEDDED CRYPTO-BIOMETRICAUTHENTICATION PROTOCOL
Two basic fingerprint authentication schemes namely the local and the centralized matching
There are three stages in the protocol namely registration, login and authentication
The encrypted image is transmitted to the central server via secured channel
Encryption
Decryption
AES Algorithm
AES is also known as Rijndael algorithm
It is a replacement to DES as the federal standard
It has standard definition, high security and freedom patent entanglements
It is an iterated block cipher which supports variable block length and key length
STRENGTH ANALYSIS
This technique is secure with respect to a known plaintext type of attack.
With the diffusion methodology, the encryption technique is safe to cipher text type of attack.
This use different keys in different rounds of iterations.
The length is not constrained.
It can be chosen according to the developer’s need.
CONCLUSION
An embedded Crypto-Biometric authentication scheme for ATM
The claimed user’s fingerprint is required during a transaction.
The fingerprint image is encrypted via 3D chaotic map.
It is transmitted to the central server using symmetric key algorithm .
The encryption keys are extracted from the random pixel distribution in a raw image of fingerprint.