Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey Paper on Visual Cryptography Application to Biometric Authentication

Dr. R. Sridevi, P.R Sowmiya

Abstract


In today’s modern world communication is a basic need on daily life. In order to prevent it by the intruders a technique called visual cryptography is used. “Visual cryptography using biometric authentication” is a technique which is used for authentication to keep more secure and safe where the images are hidden by using encryption. In this paper visual cryptography method is used for protecting and securing the biometric data’s such as finger print images for the purpose of user authentication.


Full Text:

PDF

References


“A Study on Elliptic Curve Cryptography” in International Journal on Research Innovations in Engineering Science and Technology (IJRIEST), (ISSN 2455-8540), Volume 2, Issue 7, July-2017, pp: 546 – 550.

“Cryptographic Cloud Storage Techniques” in International Journal of Engineering Sciences & Research Technology(IJESRT), ISSN: 2277-9655, July 2017, pp: 602-605.(Impact Factor: 4.116)

“Checking User Authentication by Biometric One Time Password Generation using Elliptic Curve Cryptography” in International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: 2229-3345, Vol. 8 No. 06, June 2017, pp. 213-218.

“Ghost Imaging using a Novel Phase Modulation Patterns for Efficient and High Secured Optical Encryption” in International Journal of Modern Computer Science (IJMCS) ISSN: 2320-7868 (Online) Volume 4, Issue 6, December, 2016.

“An Implementation of Hybrid Cryptographic Protocol for Facial Image Security” in International Journal of current research in science and technology (ISSN: 2394-5745 “Secured Transmission of Data in cloud Environment Using

Elliptic curve Cryptography” in International Journal of Innovative Research in Computer and Communication Engineering (IJRCCE) (ISSN (online): 2320-9801), Vol. 3, Issue 8, August 2015(impact factor: 5.618).

“A Secured Asymmetric Crypto system for Multi- (IJTRD) (ISSN (online): 2394-9333), Vol. 2, Issue 5, September-October 2015(impact factor: 0.924).

“ECC Encryption and LSB Data Embedding Technique for Studies (ISSN (online): 2348-1439), Vol. 2, Issue 7, June 2015, pp.55 – 57. (Impact Factor: 0.74).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.