Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: ATM using fingerprint Seminar Report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
ATM using fingerprint


[attachment=67574]


ABSTRACT

Crypto-ATM banking systemsBiometric authentication scheme for
The fingerprint image is enhanced and then encrypted using 128 bit private key algorithm
The proposed scheme is fast and more secure
Computer simulations and statistical analysis are presented


INTRODUCTION

Biometrics based authentication is a potential candidate to replace password-based authentication
Cryptography provides the necessary tools for accomplishing secure and authenticated transactions
It not only protects the data from theft or alteration, but also can be used for user authentication
The current system can only identify the maker’s belongings (cards) or what he remembers (passwords, PINs etc.) Automatic biometric authentication is an emerging field to address this problem


EMBEDDED CRYPTO-BIOMETRIC AUTHENTICATION PROTOCOL

Two basic fingerprint authentication schemes namely the local and the centralized matching
There are three stages in the protocol namely registration, login and authentication
The encrypted image is transmitted to the central server via secured channel
Encryption
Decryption


AES Algorithm

AES is also known as Rijndael algorithm
It is a replacement to DES as the federal standard
It has standard definition, high security and freedom patent entanglements
It is an iterated block cipher which supports variable block length and key length


STRENGTH ANALYSIS

This technique is secure with respect to a known plaintext type of attack.
With the diffusion methodology, the encryption technique is safe to cipher text type of attack.
This use different keys in different rounds of iterations.
The length is not constrained.
It can be chosen according to the developer’s need.


CONCLUSION

An embedded Crypto-Biometric authentication scheme for ATM
The claimed user’s fingerprint is required during a transaction.
The fingerprint image is encrypted via 3D chaotic map.
It is transmitted to the central server using symmetric key algorithm .
The encryption keys are extracted from the random pixel distribution in a raw image of fingerprint.