Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Yuvaraj S, John Clement Sunder A, Sikamanirathan V M

Volume 01 Issue 10  Year 2014  

ISSN no:  2348-3121

Page no: 5-10

Abstract— This paper describes and implements an authentication solution using biometrics, digital certificates and smart cards to solve the Security problem in the authentication process. The first part is a general introduction to the topic, the second is a brief overview about using biometrics, more exactly hand vein pattern. The third part presents a method of extracting the pattern vein of the back of the hand also how to match two templates. The fourth part presents the two necessary phases in any authentication system: the enrollment and the authentication. A proposed authentication protocol is described too. The fifth part generalize the possible attacks and vulnerabilities in a biometric authentication system and it also shows how the proposed system is able to avoid them .The sixth part talks about the implementation of the application. Finally, in the conclusion, summary of the proposed work proves the benefits of that.

Keywords— Biometrics, vein recognition, filtering infrared light.


[1]  A.M. Nadort. ‘The hand vein pattern used as a biometric feature”. Free University, Amsterdam: Master’s thesis, (2007)..1.Clerk Maxwell, A Treatise on Electricity and Magnetism,3rded.,Vol. 2.Oxford: Clarendon,1892,pp. 68-73.
[2] S.K.1m,S.W.Kimand H.S.Choi.”A directionbased vascular pattern extraction algorithm for hand vascular pattern verification”.s.l.:ETRI journal, Vol.5,No.2, pp. 101-108,(2003).
[3]  Y. Zhaoand M.Y. Sheng. “Acquisition and Pre processing of Hand Vein Image”.s.1.:IEEE978-1- 61284-774-0,pp. 5727-5729,(2011).
[4] NSAR223.TokenLock/Unlockfor TOKENEER. s.l.·G. Peterso Working Notes,(1997).
[5] EmguCV.http://www.emgu.com.[Online] (2012).
[6] AForge.http://www.aforgenet.comi.[Online](2012).
[7] BouncyCastle.http://www.bouncycastle.orglindex.html.[Online](2012).
[8] DotNetZip.http://dotnetzip.codeplex.com/.[Online].
[9] N.KRatha,lH Connell.and R.M Bolle.”An Analysis of Minutiae Matching Strength” .NewYork10532:IBM Thomas J.Watson Research Center 30 Saw Mill River Road Hawthorne,(2007).
[10] lL Wayman.”Technical Testing and Evaluation of Biometric Devices”. [book auth.]A. Jainetal. Biometrics Personal Identification In a Networked Society.s.1 .:Kluwer Academic Publisher,(2002).
[11] C.Roberts. Biometric attack vectors and defences.(2006).

Full Paper: Click Here

Scroll Up