Abstract
In the recent biometric community security of biometric information has accepted basic significance. Cancelable biometrics is the one technique to do this, which manage before biometric information putting away in the database transforming the biometric information, in a manner that relative minutiae data is not defiled in the transformed template. This paper shows an investigation of few methods of generating cancelable biometric templates. The security level of current biometric framework is upgraded by the structure of fuzzy vault as far as concealing secret key and ensuring the template, by applying a binding strategy on biometric template and cryptographic key. Apply cyclic redundant code(CRC) to distinguish a real polynomial from an arrangement of competitors in light of its straightforwardness. In CRC based fuzzy vault scheme to overcome issue of blend substitution attack two new module is proposed chaff point verifier along with generator. The systems dispense with a blend substitution assault to enhance general security and, subsequently it can distinguish any alteration in vault.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ala, A.-F., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Comm. Surv. Tutorials 17(4), 2347–2376 (2015)
Karagiannis, V.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)
Luzuriaga, E.J.: A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks.In: 12th Annual IEEE Consumer Communications and Networking Conference. IEEE (2015)
Fernandes, L.J.: Performance evaluation of RESTful web services and AMQP protocol. In: Fifth International Conference on Ubiquitous and Future Networks. IEEE (2013)
Rostanski, M., Grochla, K., Seman, A.: Evaluation of highly available and fault-tolerant middleware clustered architectures using RabbitMQ. In: Federated Conference on Computer Science and Information Systems. IEEE (2014)
Xiong, X., Fu, J.: Active status certificate publish and subscribe based on AMQP. In: International Conference on Computational and Information Sciences. IEEE (2011)
Subramoni, H.: Design and evaluation of benchmarks for financial applications using advanced message queuing protocol (AMQP) over InfiniBand. In: Workshop on High Performance Computational Finance. WHPCF. IEEE (2008)
Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87 (2006)
AMQP: Advanced Message Queuing, version 0.8, AMQP working group protocol specification (2006). http://www.iona.com/opensource
Programming WireAPI. http://www.openamq.org/
Pivotal Software Inc., Messaging that just works. https://www.rabbitmq.com (2014)
Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: “Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm”. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)
Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing, Bangalore, India, pp. 248–251 (2010)
Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)
Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)
Panchal, G., Panchal, D.: Solving np hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)
Panchal, G., Panchal, D.: 11 Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)
Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. 4(4), 1503–1506 (2015)
Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. 4(4), 1507–1511 (2015)
Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, pp. 1–6 (2016)
Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer, New York (2016)
Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer, New York (2017)
Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)
Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems, p. 6 (2017)
Patel, J., Panchal, G.: An iot based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development, pp. 1–6 (2017)
Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems, pp. 1–6 (2017)
Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems, pp. 1–6 (2017)
Bhimani, P., Panchal, G.: Message delivery guarantee and status up- date of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development, pp. 1–6 (2017)
Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems, p. 6 (2017)
Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Patel, G., Panchal, G. (2018). A Chaff-Point Based Approach for Cancelable Template Generation of Fingerprint Data. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-63673-3_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63672-6
Online ISBN: 978-3-319-63673-3
eBook Packages: EngineeringEngineering (R0)