IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Effective Combination of Pattern Recognition and Encryption Scheme for Biometric Authentication Systems

An Effective Combination of Pattern Recognition and Encryption Scheme for Biometric Authentication Systems
View Sample PDF
Author(s): Vijayalakshmi G. V. Mahesh (BMS Institute of Technology and Management, India)
Copyright: 2024
Pages: 21
Source title: Innovative Machine Learning Applications for Cryptography
Source Author(s)/Editor(s): J. Anitha Ruth (SRM Institute of Science and Technology, Vadapalani, India), G.V. Mahesh Vijayalakshmi (BMS Institute of Technology and Management, India), P. Visalakshi (Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Katankulathur, India), R. Uma (Sri Sairam Engineering College, Chennai, India)and A. Meenakshi (SRM Institute of Science and Technology, Vadapalani, India)
DOI: 10.4018/979-8-3693-1642-9.ch011

Purchase

View An Effective Combination of Pattern Recognition and Encryption Scheme for Biometric Authentication Systems on the publisher's website for pricing and purchasing information.

Abstract

Authentication based on biometric technology is largely preferred in providing access control to the systems. This technology has gained wider attention due to the rise in data generation and the need of data security. The authentication depends upon the physiological traits of human such as face, fingerprint, hand geometry, iris scan, retinal scan, and voice. Depending upon the level of security required, a single trait or multiple traits could be utilized. The key features or patterns extracted from the biometric data play a significant role during authentication process that involves pattern recognition. That is, the patterns that exist in the database are matched with the patterns provided during log on. The access is provided based on complete match. Though biometry-based authentication systems provide an effective way of accessing the system, still it is affected by attacks that try to get unauthorized entry into the system. Thus, this chapter focuses on working with the methodologies that provide additional security to the biometric authentication system by utilizing encryption algorithm.

Related Content

Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda. © 2024. 26 pages.
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha. © 2024. 20 pages.
K. Sriprasadh. © 2024. 24 pages.
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh. © 2024. 20 pages.
R. Jayashree, J. Venkata Subramanian. © 2024. 14 pages.
M. Indira, K. S. Mohanasundaram, M. Saranya. © 2024. 14 pages.
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith. © 2024. 26 pages.
Body Bottom