Cloud computing is the most important platform and majorly it is known for its scalability, storage of data and processing the data. Biometric information is a sensitive part and due to the risks like data loss or data spill (also known as data leakage) , unauthorized access , identity fraud , securing the biometric information in cloud platforms have become a major hurdle. In traditional biometric systems , raw biometric templates were stored on cloud servers where there were many security issues , and flaws. The major biometric identifiers are fingerprints, iris patterns , facial features which are unique in every single person. Once the biometric profile they cannot be changed. As a result biometric data is treated as confidential information. Powerful protection techniques like encryption, safe storage, authentication methods which preserves privacy are important to prevent the access to unauthorized people and incorrect usage of biometric information. Here We use a secure crypto-biometric authentication which is used for preserving the biometric verification in the cloud based applications. This workflow is divided into 4 phases. The first phase is feature extraction where all the important features are extracted from the biometric pictures to recognize all the distinct characteristics of every use. The second phase is PCA (which is also known as principal component analysis) where the size of the data is reduced by removing all the unwanted information. This make the system to work fast and more efficiently. The third phase is GMM (which is also known as Gaussian mixture model) where the users are recognized and categorized based upon their biometric features. In final phase a combination of AES and ECC techniques are used. These are the encryption techniques where the biometric data is safely stored and protected during the storage and verification.
Building similarity graph...
Analyzing shared references across papers
Loading...
EJJIGANI SAI KARTHIK
GATTA TEJASREE
PASUPULETI VEDH RISHI
Building similarity graph...
Analyzing shared references across papers
Loading...
KARTHIK et al. (Wed,) studied this question.
www.synapsesocial.com/papers/69df2abce4eeef8a2a6afc10 — DOI: https://doi.org/10.56975/jaafr.v4i4.507031