FINAL YEAR IEEE PROJECTS,
EMBEDDED SYSTEMS PROJECTS,
ENGINEERING PROJECTS,
MCA PROJECTS,
ROBOTICS PROJECTS,
ARM PIC BASED PROJECTS, MICRO CONTROLLER PROJECTS Z Technologies, Chennai
a famework for analyzing template security and privacy in biometric authentication system
1. A FRAMEWORK FOR ANALYZING TEMPLATE SECURITY
ANDPRIVACY IN BIOMETRIC AUTHENTICATION SYSTEMS
OBJECTIVE:
The main objective of this system is to prevent an attacker to compromise
privacy of users or biometric data and not necessarily to thwart bypassing of the
biometric authentication itself.
PROBLEM DIFINITION:
The main problem statement of our existing system is security. The security
level is relatively very low. So that, The hackers easily hack the secured
information. To avoid this problem, we use the biometric authentication in our
proposed system.
ABSTRACT:
Biometric authentication schemes have great potentials in building secure
systems since biometric data of the users are bound tightly with their identities, and
cannot be forgotten. Typically, a biometric authentication scheme consists of two
phases. Such as,
Enrollment Phase
Authentication Phase
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
2. During the enrollment phase, a user, Alice, registers her biometric data with
a trusted server. A biometric template is created for Alice, and is stored on some
central server or a device carried by Alice (e.g., smartcard).
During the authentication phase, Alice would provide another biometric
sample, which is then compared with the template in the server or device, and
Alice is authenticated if the new sample matches the template according to some
matching function.In this scenario, the biometric template of Alice would contain
crucial information for successful authentication.
EXISTING SYSTEM:
In Existing system, contain only PASSWORD authentication. So the
hackers easily hack out password and communication to authentication server. So
this system didn’t provide fully supported security to users.
DISADVANTAGES:
Low Performance
Less Security
High attacks from hackers
Server cannot assume authenticated user
It didn’t contain Matcher application for matching the user needed
things.
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
3. PROPOSED SYSTEM:
In proposed system model contain password authentication as well as
biometric authentication. The process of this system as, first user login this system
than the user give their biometric sample. The user id & biometric sample sent to
server.
The authentication server communicates to database and identify whether
the user authorized person or not. If the user is unauthorized mean, the server gives
the error message to that user. If the user authorized mean, the server give the
acknowledgment to user for further actions. Then the user search the key, the
server communicates to Matcher for whether the key is in our system or not. It’s a
secure way for communicate secret information over the online.
ADVANTAGES:
Secure Communication
High security
High Performance
Without hackers attacks
ALGORITHM USED:
1. AES (Advanced Encryption Standard)
2. PCA (Principle Component Analysis)
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
4. ARCHITECTURE DIAGRAM:
USER
SECTION
DATABASE
USER ID
PASSWORD AUTHENTICAT
ION
SERVER
BIOMETRIC MATCHER
SENSOR
SYSTEM REQUIREMENTS:
Hardware Requirements:
Intel Pentium IV
256/512 MB RAM
1 GB Free disk space or greater
1 GB on Boot Drive
17” XVGA display monitor
1 Network Interface Card (NIC)
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765
5. Software Requirements:
MS Windows XP/2000
MS IE Browser 6.0/later
MS .Net Framework 4.0
MS Visual Studio.Net 2005
Internet Information Server (IIS)
MS SQL Server 2000
Windows Installer 3.1
APPLICATIONS:
1. Deductive Agencies
2. Military Sector
3. Banks
Z Technologies
www.ztech.ininfo@ztech.incall : 91760 91765