{"title":"多模态生物识别安全认证系统","authors":"A. Maheshwari, M. A. Dorairangaswamy","doi":"10.1109/ICONSTEM.2016.7560940","DOIUrl":null,"url":null,"abstract":"Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Multimodal biometrics security system for authentication\",\"authors\":\"A. Maheshwari, M. A. Dorairangaswamy\",\"doi\":\"10.1109/ICONSTEM.2016.7560940\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.\",\"PeriodicalId\":256750,\"journal\":{\"name\":\"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICONSTEM.2016.7560940\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONSTEM.2016.7560940","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multimodal biometrics security system for authentication
Recently biometrics based authentication system provides security from attacks. This paper presents to implement the biometric system based on the combination of graphical image and palm print with steganographic technique for authentication purpose. Here before the concealing of the voice data, the palm print is processed using Weber Local Descriptor. Here the voice data hiding approach involves concealing of individual voice data within their biometric to enhance the privacy protection. The voice data is being converted into text data using voice to text convertor. Before the data is hidden it is being encrypted using Chaos encryption. The data is being hidden inside the palm print using bits wrap algorithm. The features of the Graphical Image are extracted using Lifting Wavelet Transform.