Skip to main content

Implementation of Fingerprint-Based Authentication System Using Blockchain

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 900))

Abstract

Authentication is the most crucial part of security concerns. From last few years, biometric authentication is considered as the most reliable authentication method. With the advent of technology, security threats related to biometric data theft are also increased. But recently, blockchain technology has emerged as a robust system which is immutable and almost completely immune to the security threats. So in this paper, we have designed the system exploring the advantages of blockchain technology for secure and immutable storage of biometric data. The system is implemented and the results are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Sakhapara, D. Pawade, P. Sharma, R. Dalia, S. Khandelwal, Animation based hybrid shoulder surfing attack proof approach for user authentication, in Third International Conference on Computing, Communication, Control and Automation, Pune (2017)

    Google Scholar 

  2. P. Joo-Sang, K. Young-I, L. Yong-Joon, Security considerations for RFID technology adoption, in 7th International Conference on Advanced Communication Technology, ICACT 2005, (Phoenix Park, South Korea, 2005), pp. 797–803

    Google Scholar 

  3. S. David, L. Harvey, G. Vimi, S. Alexander, M. Stephen, W. Tyler, What is blockchain? blockchain enigma. Paradox. Opportunity—Deloitte (2016)

    Google Scholar 

  4. A.L.H. Jin, A. Chekima, J.A. Dargham, L.C. Fan, Fingerprint identification and recognition using backpropagation neural network, in Student Conference on Research and Development proceedings, Malaysia (2012), pp. 98–101

    Google Scholar 

  5. J. Yang, S. Xie, S. Yoon, D. Park, Z. Fang, S. Yang, Fingerprint matching based on extreme learning machine. Neural computing and application (Springer-Verlag, London, 2013)

    Google Scholar 

  6. S. Chavan, P. Mundada, D. Pal, Fingerprint authentication using gabor filter based matching algorithm, in International Conference on Technologies for Sustainable Development (ICTSD2015), Mumbai, India (2015)

    Google Scholar 

  7. P.J. Ochieng, H. Harsa, Fingerprint authentication system using back-propagation with downsampling technique, in: Second International Conference on Science and Technology-Computer (ICST), Yogyakarta, Indonesia (2016), pp. 182–187

    Google Scholar 

  8. S.T. Umesh, V. Abhinav, S. Pankaj, Fingerprint recognition by hybrid optimization based on minutaies distance and pattern matching, in International Conference on Signal Processing, Communication, Power and Embedded System. India (2016), pp. 2047–2051

    Google Scholar 

  9. B. Sloane, P. Bhargav, Blockchain basics: introduction to distributed ledgers (2016). Online available at: https://www.ibm.com/developerworks/cloud/library/cl-blockchain-basics-intro-bluemix-trs/index.html

  10. https://www.e-spincorp.com/2017/11/24/pros-and-cons-of-blockchain-technology/

  11. N. Alex, Designing a smart-contract application layer for transacting decentralized autonomous organizations, in International Conference on Advances in Computing and Data Sciences (2016)

    Google Scholar 

  12. P. Shiny, Gladis: analogizing the thinning algorithm on minutiae extraction, in International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Davangere, India (2015), pp. 867–870

    Google Scholar 

  13. P. Dipti, C. Pranchal, S. Harshada, Comparative study of different paper currency and coin currency recognition method. Int. J. Comput. Appl. 66(23) (2013)

    Google Scholar 

  14. https://github.com/yoga1290/Fingerprint-Recognition

  15. https://www.ethereum.org/

  16. https://metamask.io/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipti Pawade .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pawade, D., Sakhapara, A., Andrade, M., Badgujar, A., Adepu, D. (2019). Implementation of Fingerprint-Based Authentication System Using Blockchain. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_22

Download citation

Publish with us

Policies and ethics