SlideShare uma empresa Scribd logo
1 de 5
A FRAMEWORK FOR ANALYZING TEMPLATE SECURITY
     ANDPRIVACY IN BIOMETRIC AUTHENTICATION SYSTEMS



OBJECTIVE:

      The main objective of this system is to prevent an attacker to compromise
privacy of users or biometric data and not necessarily to thwart bypassing of the
biometric authentication itself.



PROBLEM DIFINITION:

      The main problem statement of our existing system is security. The security
level is relatively very low. So that, The hackers easily hack the secured
information. To avoid this problem, we use the biometric authentication in our
proposed system.



ABSTRACT:

      Biometric authentication schemes have great potentials in building secure
systems since biometric data of the users are bound tightly with their identities, and
cannot be forgotten. Typically, a biometric authentication scheme consists of two
phases. Such as,


                        Enrollment Phase
                        Authentication Phase




                                   Z Technologies
                       www.ztech.ininfo@ztech.incall : 91760 91765
During the enrollment phase, a user, Alice, registers her biometric data with
a trusted server. A biometric template is created for Alice, and is stored on some
central server or a device carried by Alice (e.g., smartcard).


      During the authentication phase, Alice would provide another biometric
sample, which is then compared with the template in the server or device, and
Alice is authenticated if the new sample matches the template according to some
matching function.In this scenario, the biometric template of Alice would contain
crucial information for successful authentication.


EXISTING SYSTEM:


      In Existing system, contain only PASSWORD authentication. So the
hackers easily hack out password and communication to authentication server. So
this system didn’t provide fully supported security to users.


DISADVANTAGES:


          Low Performance
          Less Security
          High attacks from hackers
          Server cannot assume authenticated user
          It didn’t contain Matcher application for matching the user needed
            things.




                                Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
PROPOSED SYSTEM:


      In proposed system model contain password authentication as well as
biometric authentication. The process of this system as, first user login this system
than the user give their biometric sample. The user id & biometric sample sent to
server.


      The authentication server communicates to database and identify whether
the user authorized person or not. If the user is unauthorized mean, the server gives
the error message to that user. If the user authorized mean, the server give the
acknowledgment to user for further actions. Then the user search the key, the
server communicates to Matcher for whether the key is in our system or not. It’s a
secure way for communicate secret information over the online.


ADVANTAGES:


           Secure Communication
           High security
           High Performance
           Without hackers attacks


ALGORITHM USED:
      1. AES (Advanced Encryption Standard)
      2. PCA (Principle Component Analysis)



                               Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
ARCHITECTURE DIAGRAM:




               USER

              SECTION
                                                           DATABASE
              USER ID

              PASSWORD            AUTHENTICAT
                                      ION

                                     SERVER



             BIOMETRIC                                     MATCHER
             SENSOR




SYSTEM REQUIREMENTS:

Hardware Requirements:

               Intel Pentium IV
               256/512 MB RAM
               1 GB Free disk space or greater
               1 GB on Boot Drive
               17” XVGA display monitor
                1 Network Interface Card (NIC)


                            Z Technologies
                   www.ztech.ininfo@ztech.incall : 91760 91765
Software Requirements:

                MS Windows XP/2000
                MS IE Browser 6.0/later
                MS .Net Framework 4.0
                MS Visual Studio.Net 2005
                Internet Information Server (IIS)
                MS SQL Server 2000
                Windows Installer 3.1



APPLICATIONS:

          1. Deductive Agencies
          2. Military Sector
          3. Banks




                           Z Technologies
                  www.ztech.ininfo@ztech.incall : 91760 91765

Mais conteúdo relacionado

Destaque

Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...ZTech Proje
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...ZTech Proje
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...ZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartZTech Proje
 

Destaque (13)

Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 

a famework for analyzing template security and privacy in biometric authentication system

  • 1. A FRAMEWORK FOR ANALYZING TEMPLATE SECURITY ANDPRIVACY IN BIOMETRIC AUTHENTICATION SYSTEMS OBJECTIVE: The main objective of this system is to prevent an attacker to compromise privacy of users or biometric data and not necessarily to thwart bypassing of the biometric authentication itself. PROBLEM DIFINITION: The main problem statement of our existing system is security. The security level is relatively very low. So that, The hackers easily hack the secured information. To avoid this problem, we use the biometric authentication in our proposed system. ABSTRACT: Biometric authentication schemes have great potentials in building secure systems since biometric data of the users are bound tightly with their identities, and cannot be forgotten. Typically, a biometric authentication scheme consists of two phases. Such as,  Enrollment Phase  Authentication Phase Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 2. During the enrollment phase, a user, Alice, registers her biometric data with a trusted server. A biometric template is created for Alice, and is stored on some central server or a device carried by Alice (e.g., smartcard). During the authentication phase, Alice would provide another biometric sample, which is then compared with the template in the server or device, and Alice is authenticated if the new sample matches the template according to some matching function.In this scenario, the biometric template of Alice would contain crucial information for successful authentication. EXISTING SYSTEM: In Existing system, contain only PASSWORD authentication. So the hackers easily hack out password and communication to authentication server. So this system didn’t provide fully supported security to users. DISADVANTAGES:  Low Performance  Less Security  High attacks from hackers  Server cannot assume authenticated user  It didn’t contain Matcher application for matching the user needed things. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 3. PROPOSED SYSTEM: In proposed system model contain password authentication as well as biometric authentication. The process of this system as, first user login this system than the user give their biometric sample. The user id & biometric sample sent to server. The authentication server communicates to database and identify whether the user authorized person or not. If the user is unauthorized mean, the server gives the error message to that user. If the user authorized mean, the server give the acknowledgment to user for further actions. Then the user search the key, the server communicates to Matcher for whether the key is in our system or not. It’s a secure way for communicate secret information over the online. ADVANTAGES:  Secure Communication  High security  High Performance  Without hackers attacks ALGORITHM USED: 1. AES (Advanced Encryption Standard) 2. PCA (Principle Component Analysis) Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 4. ARCHITECTURE DIAGRAM: USER SECTION DATABASE USER ID PASSWORD AUTHENTICAT ION SERVER BIOMETRIC MATCHER SENSOR SYSTEM REQUIREMENTS: Hardware Requirements: Intel Pentium IV 256/512 MB RAM 1 GB Free disk space or greater 1 GB on Boot Drive 17” XVGA display monitor 1 Network Interface Card (NIC) Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 5. Software Requirements: MS Windows XP/2000 MS IE Browser 6.0/later MS .Net Framework 4.0 MS Visual Studio.Net 2005 Internet Information Server (IIS) MS SQL Server 2000 Windows Installer 3.1 APPLICATIONS: 1. Deductive Agencies 2. Military Sector 3. Banks Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765