Visual Cryptography in Biometrics Passport
Visual Cryptography in Biometrics Passport
Visual Cryptography in Biometrics Passport
Volume: 2 Issue: 3
ISSN: 2321-8169
483 487
______________________________________________________________________________________________
Dhara Trivedi 1
1
Computer Science
Pacific Academy of Higher Education and Research
University
Udaipur, Rajasthan, India
[email protected]
Computer Science
Kalol Institute of Management
Kalol, Gujarat, India
[email protected]
Abstract Every human being is unique in their nature such as traits and physical symptoms so computer science is using the biometric for
perfect identification within large database. Visual cryptography scheme is a cryptographic technique, which allows visual information e.g.
printed text, handwritten notes, and picture to be encrypted in such a way that the decryption can be performed by the human visual system,
without the aid of computers. Biometric passport is a smart card technology product created by use of biometric data and computer chip for
authenticate identification of citizen of particular country. Current passport has certain shortcoming. In this method it is proposed to convert scan
images of retina, fingerprint and face in secret image and meaningful shares by use of visual cryptography. In this method with use of Visual
Cryptography three biometrics i.e. retina image, fingerprint image and face image encrypted in two meaningful shares when these two share
stacking on one another fingerprint image revealed and that can be verified with on the spot live fingerprint image for perfect identification
accuracy.
Keywords- Biometric, Biometric-passport, Visual Cryptography
______________________________________________________*****___________________________________________________
I.
INTRODUCTION
RELATED WORK
_______________________________________________________________________________________________
ISSN: 2321-8169
483 487
______________________________________________________________________________________________
to generate Share1 and Share2. Similarly If pixel is black one
of the below two rows of Table 1 is chosen to generate Share1
and Share2. Here each share pixel p is encoded into two white
and two black pixels each share alone gives no clue about the
pixel p whether it is white or black. Secret image is shown
only when both shares are superimposed.
The transparencies consist of randomly located white and
black pixels. When stacking these transparencies together the
secret message, e.g. an image or a text, is revealed. The
decryption is executed by the human visual system and only
the ownership of all transparencies can reveal the secret.
Above figure illustrates the abstract work flow of encrypting
and decrypting information by means of visual cryptography.
Table1. Naor and Shamirs scheme for encoding a binary pixel into two shares
_______________________________________________________________________________________________
ISSN: 2321-8169
483 487
______________________________________________________________________________________________
that carry original image across the color channel so pixel
value as same before and after encryption. And error diffusion
is used to construct the share such that noise introduced by
preset pixel are diffused away neighbors when encrypt.
Other proposed method generated meaningless shares so
attacker can easily reveal secret image.
In [15] method they generated meaningful shares. First
authors did color halftone transfer use of color decomposition
and then extract pixel from color halftone image in fig 2. For
they use two cover image and a secret image. They apply
coding table on those images and create shares see in fig 3. For
encoding procedure two coding table applied as a CCT for
cover image coding table and SCT for
Visual
Cryptograph
y
With
meaningful
share
Share
1
Share
2
Store share
1 Passport
Share 2 in
Governmen
t Database
Cipher image
2
Eye retina
Fig.5: Encryption Process
Store share 1
in Passport
Share 2 in
Government
Database
Stack
share 1
and
share 2
Secret image
reveal as
fingerprint
III
METHODOLOGY
_______________________________________________________________________________________________
ISSN: 2321-8169
483 487
______________________________________________________________________________________________
clicks on Request List he will get all the request application
with complete user details information with compile serially
indicating time and date of registration. After authority clears
the application one by one on merit, the short listed applicants
will be allotted the date, time and venue for next round of
passport process. On the schedule time when the applicant
approaches authority verify identification documents with
original. After verification of user documents admin go to
Verification link and enter user Registration No. On base of
Registration No admin get user all details. Admin take user
Retina scan and compare with government RETINA table.
Human retina is unique. If applicant retina differs with the
database of all other retina then application will be clear and in
other case its becomes clear that particular applicant had
already obtain passport in the past and in that case legal
remedy will take its on course of action. After process of user
verification admin will go to next step of passport creation.
For that admin click on Passport Process link with use of
sophisticated hardware face image and fingerprint will taken
under supervision of compliant authority and saved for further
use when admin click on Create Share. When click on Create
Share button that time Visual Cryptography applied on three
biometric and it create two meaningful shares. From those two
shares share 1 as face image will stamp on hard copy of
passport when its generate and share 2 as retina image store in
RETINA table for future use.
In the end passport is created in the system and applicant
hard copy also prepared for delivery to user. Now user view in
Passport Status of his passport is ready for collection. At this
stage all the relevant information of this passport will be
available for on ward verification at database and passport
verification center of various airports and countries embassy.
Whenever identification of passport holder is required at
admin level Identification option is selected for process. In
that Enter Passport No, Current Fingerprint image, Passport
Photo scan image which is share 1 and get Retina image from
RETINA table which is share 2 and then after click on Identify
button. When admin click on Identify button that time share 1
and share 2 stack and Fingerprint image will revealed that
compare with Current Fingerprint image. If both fingerprint
images matches then its revealed that user passport
identification perfect otherwise it is rejected.
Send Registration No
Set status of user passport
Else if VERIFICATION clicked then
Enter registration no
Enter user retina scan
Click on verify button
If Compare user retina with Retina database then
User had already obtain
Else if
Applicant clear
End if
Add Retina in table
Else if PASSPORT PROCESS clicked then
Enter registration no
Enter Face image
Enter Fingerprint
Add user biometrics
Click on Create Share button
Create two shares share 1 face image and share 2 retina scan
Store Share 1 and share 2 in database
Share 1 for hard copy of passport
Share 2 for Identification in future
Else if IDENTIFICATION clicked then
Enter Passport no
Enter current fingerprint scan
Scan share 1 from passport
Get share 2 from Database
Stack share 1 and share 2 revealed secret image fingerprints
Compare click button
If compare current fingerprint and revealed fingerprint then
Passport identification perfect
Else if
User Rejected
End if
End if
Above IDENTIFICATION procedure will apply in all Embassies and airport.
IV CONCLUSION
Today in information edge, when world is becoming
global village and security aspect is more important to isolate
anti social elements, it is required to find out innovative
methods for foolproof E-Passport. As retina is sustainable
unique biometric, it is very useful for perfect identification of
a particular passport holder with use of Visual Cryptography.
We can explore methods with more research in other card also.
References
A. Algorithms
If USER LOGIN link clicked then
Enter user name and password
Else if Sign up user clicked
Enter email id as username, password and confirm password
Else if REGISTRATION link clicked then
Enter User details
Else if APPLICATION STATUS
Passport progress
End if
If ADMIN LOGIN link clicked then
Enter user name and password
Else if REQUEST DETAIL clicked then
View Requested User list
Edit user details
Delete user details
486
IJRITCC | March 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________
ISSN: 2321-8169
483 487
______________________________________________________________________________________________
[6] S. Droste, New results on visual cryptography, Crypto '96, SpringerVerlag LNCS Vol. 1109, 1996, 401-415.
[7] CHING-NUNG YANG, CHI-SUNG LAIH, New Colored Visual
Secret Sharing Schemes, Designs, Codes and Cryptography, 20, 325
335, 2000
[8] S. Cimatoa, R. De Priscob, A. De Santisb, Colored visual
cryptography without color darkning, Theoretical Computer Science 374
(2007) 261276, www.elsevier.com/locate/tcs
[9] Matsumoto T., Human-computer cryptography: an attempt , in A
CM Conf. on Computer and Communication Security , ACM Press,
Marc h 1996, 68-75.
[10] InKoo Kang, Heung-Kyu Lee, Gonzalo R. Arce, Color Extended
Visual Cryptography Using Error Diffusion, IEEE TRANSACTIONS
ON IMAGE PROCESSING, VOL. 20, NO. 1, JANUARY 2011
[11] D. Naccache, Colorful Cryptography - a purely physical secretsharing scheme based on chromatic fillters , in Coding and Information
Integrity , French-Israeli workshop, December 1994.
[12] Naor M. and A. Shamir, Visual Cryptography II: improving the
contrast via the cover base , Cam bridge Workshop on Cryptographic
Proto
cols,
1996.
A
full
version
is
available
at
ftp://theory.lcs.mit.edu/pub/tcrypto/96-07.ps
[13] Rijmen V. and B. Preneel, Efficient colour visual encryption or
`shared colors Presented at the rump session of Euro crypt '96. Also
available at http://www.esat.kuleuven.ac.be/~rijmen/vc/
[14] Rubin A. D., Independent one-time passwords, Computing
Systems, The USENIX Association, Vol. 9, No. 1996, 15-27.
[15] Hsien-Chu Wu, Hao-Cheng Wang, and Rui-Wen Yu, Color Visual
Cryptography Scheme Using Meaningful Shares, 2008 IEEE Computer
Society.
[16] E. Myodo, S. Sakazawa and Y. Takishima, VISUAL
CRYPTOGRAPHY
BASED
ON
VOID-AND-CLUSTER
HALFTONING TECHNIQUE, 2006 IEEE.
487
IJRITCC | March 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________________