Presentation is loading. Please wait.

Presentation is loading. Please wait.

ATM using fingerprint www.123arena.com www.123codeguru.blogspot.com.

Similar presentations


Presentation on theme: "ATM using fingerprint www.123arena.com www.123codeguru.blogspot.com."— Presentation transcript:

1 ATM using fingerprint www.123arena.com

2 Current Authentication Systems
Online Authentication Name and Password Bank Authentication Token based ID Card Signature

3 ABSTRACT Crypto-Biometric authentication scheme for ATM banking systems The fingerprint image is enhanced and then encrypted using 128 bit private key algorithm The proposed scheme is fast and more secure Computer simulations and statistical analysis are presented

4 INTRODUCTION Biometrics based authentication is a potential candidate to replace password-based authentication Cryptography provides the necessary tools for accomplishing secure and authenticated transactions It not only protects the data from theft or alteration, but also can be used for user authentication The current system can only identify the maker’s belongings (cards) or what he remembers (passwords, PINs etc.) Automatic biometric authentication is an emerging field to address this problem

5 EMBEDDED CRYPTO-BIOMETRIC AUTHENTICATION PROTOCOL
Two basic fingerprint authentication schemes namely the local and the centralized matching There are three stages in the protocol namely registration, login and authentication The encrypted image is transmitted to the central server via secured channel Encryption Decryption

6 Block schematic of embedded crypto biometric authentication system

7 AES Algorithm AES is also known as Rijndael algorithm
It is a replacement to DES as the federal standard It has standard definition, high security and freedom patent entanglements It is an iterated block cipher which supports variable block length and key length

8 ENCRYPTION

9 DECRYPTION

10 Fingerprints Most commonly used biometric in the banking industry
Used in all areas of the banking industry Transaction security Network security Access control Background checks Advantages Equipment is cheap Highly accurate Disadvantages Criminal stigma Universality

11 SIMULATION The first 3D permutation is performed with the key {32, 21, 0, 18, 35, 5, 15, 14, 9, 16, 12, 4, 18, 21, 6, 30} (a) Original image; The second round permutation is performed with the key {7, 16, 20, 12, 4, 8, 13, 8, 9, 39, 28, 27, 1, 16, 50, 42} (b) One round of iteration

12 The third round permutation
is finished with a key {1, 23, 8, 19, 32, 3, 25, 12, 75, 31, 4, 10, 14, 5, 25, 13} (c) Two rounds of iterations This is random looking. (d)Three rounds of iterations.

13 Statistical analysis (a) Original fingerprint image; (b) One round of 3D iteration; (c)Three rounds of 3D iterations

14 STRENGTH ANALYSIS This technique is secure with respect to a known plaintext type of attack. With the diffusion methodology, the encryption technique is safe to cipher text type of attack. This use different keys in different rounds of iterations. The length is not constrained. It can be chosen according to the developer’s need.

15 CONCLUSION An embedded Crypto-Biometric authentication scheme for ATM
The claimed user’s fingerprint is required during a transaction. The fingerprint image is encrypted via 3D chaotic map. It is transmitted to the central server using symmetric key algorithm . The encryption keys are extracted from the random pixel distribution in a raw image of fingerprint.

16 REFERENCES F.Han, J.Hu, X.Yu, Feng, Zhou: A novel hybrid cryptobiometric authentication scheme for ATM based banking applications, Springer-Verlag Berlin Heidelberg, (2005) F.Han, J.Hu, X.Yu, Feng, Zhou: A New Way of Generating Grid-Scroll Chaos and its Application to Biometric Authentication, IEEE, (2005) U.Uludag, S.Pankanti, S.Prabhakar andA. K.Jain,―Biometric cryptosystems: Issue and challenges,‖Proceedings of the IEEE, vol.92, no.6, 2004, pp S. Hoque, M. Fairhurst, G. Howells and F. Deravi,―Feasibility of generating biometric encryption keys, Electronics Letters, vol. 41, no.6, 2005, pp

17 Thank You


Download ppt "ATM using fingerprint www.123arena.com www.123codeguru.blogspot.com."

Similar presentations


Ads by Google