N. Lalithamani
Amrita Vishwa Vidyapeetham
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by N. Lalithamani.
ieee international conference on computer science and information technology | 2009
N. Lalithamani; K. P. Soman
The increasing immensity of identity theft in our society has resulted in the prioritization of dependable information security mechanisms. Despite the fact that it is possible to bring about information security with the aid of a prevailing such as like cryptography, protecting the confidentiality of the cryptographic keys is one of the major issues to be handled. It is possible to effectively solve the issue by combining biometrics and cryptography. Recently, the improved performance of cryptographic key produced from biometrics in terms of protection has acquired massive reputation amid the researchers and experimenters. Nevertheless, there is an enduring association amid the biometric and the user where in alteration is impracticable. Therefore, the biometric is vanished eternally and probably for all the applications that apply it, when a compromise of the biometric identifier is present. This might be resolved by building revocable biometric templates through cancelable biometrics. Here, we have projected an approach to produce irrevocable cryptographic key from cancelable fingerprint templates, a process which proposed algorithm carries out in an efficient manner. To begin with, the fingerprints are utilized to extract the minutiae points that are altered, in an efficient manner so as to acquire transformed points. Consequently, the transformed points are used to produce the cancelable templates which are in turn utilized for the extraction of irrevocable keys. It is extremely unfeasible to obtain cancelable fingerprint templates and original fingerprints from the generated key since the cryptographic key produced is irrevocable. The fingerprints accessible from open sources have been employed to assess the efficacy of our approach.
advances in recent technologies in communication and computing | 2009
N. Lalithamani; K. P. Soman
The principal drawback of the existing cryptographic algorithms is the maintenance of their key’s secrecy. Added with, human users have a difficult time remembering strong but lengthy cryptographic keys. As a result, utilizing individual’s biometric features in the generation of strong and repeatable cryptographic keys has gained enormous popularity among researchers. The unpredictability of the users biometric features, incorporated into the generated cryptographic key, makes the key unguessable to an attacker lacking noteworthy knowledge of the users biometrics. Nevertheless, if a person’s biometric is lost once, it will be compromised forever as it is inherently associated with the user. To overcome the above, cancelable biometrics has been proposed as an effective solution for canceling and re-issuing biometric templates. Here, we propose an innovative and efficient approach to generate a non-invertible cryptographic key from cancelable fingerprint templates. Initially, a one-way transformation is applied on the minutiae points extracted from the fingerprints, to attain a set of transformed points. Subsequently, the transformed points are made use of to form cancelable templates. The cancelable fingerprint templates are then utilized to generate a unique non-invertible key. As the cryptographic key generated is non-invertible, it is highly infeasible to acquire the cancelable fingerprint templates or the original fingerprint from the generated key. The effectiveness of the proposed approach is demonstrated by making use of fingerprints accessible from public sources.
The Imaging Science Journal | 2015
N. Lalithamani; M. Sabrigiriraj
Abstract Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed hand and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and hand vein image is constructed and is combined with the stored fuzzy vault to generate the final key. Finally, the experimentation is conducted using the palm vein and hand vein database. The evaluation metrics employed are FMR (False Match Ratio) and GMR (Genuine Match Ratio). From the metric values obtained for the proposed system, we can infer that the system has performed well. The results are also compared to our earlier technique and the results shows that the proposed technique has achieved better results having GAR of 94% without noise and 88% with noise.
ieee international conference on electrical computer and communication technologies | 2015
N. Lalithamani; M. Sabrigiriraj
Biometric recognition is noteworthy method for recognition of person in recent years. Here, a common concern is biometric security which is the privacy issues derived from storage and misuses of the template data. In order to handle this issue, researches have proposed different algorithms to be confronted by security of biometric systems. Two major ways are, (1) Encryption, and (2) watermarking by securing biometric images and templates. In this paper, we utilise a watermarking technology to improve the template security in biometric authentication. According to, two modalities such as, iris and hand vein is taken to preserve the characteristics of liveliness and permanency. Our proposed technique for embedding of iris data to hand vein images using watermarking technology to improve template protection in biometric recognition is done based on the following steps, i) pre-processing of iris and hand vein images, ii) iris template extraction, iii) Vein extraction, iv) Embedding of iris pattern to vein images based on region of interest, v) Storing embedded images. In the recognition phase, iris pattern is extracted from the embedded image and then, matching is done with query images. The final decision of authentication is done based on the product rule-based score level fusion. The implementation is done using MATLAB and the performance of the technique is analysed with FAR, FRR and accuracy.
international conference on advanced computing | 2017
N. Lalithamani; D Raam Balaji; Svpkh Satya Dev
The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper deals with the methods that have been proposed till now and the challenges that are yet to be overcome in this field.
international conference on advanced computing | 2017
Vasanth Subramanian; B Sunil Dev Choudhary; N. Lalithamani
Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments. Although current systems are remarkable, they are far from impeccable and are limited by several conditions. In short, there is still vast scope for major improvements in our extant systems. In this survey, we strive to provide a comprehensive review of the present literature and to propose a better model that would aim to solve the present limitations.
Advances in intelligent systems and computing | 2017
J. Ajay Siddharth; A. P. Hari Prabha; T. J. Srinivasan; N. Lalithamani
The modern computing technology has a huge dependence on biometrics to ensure strong personal authentication. The mode of this work is to increase accuracy with less data storage and providing high security authentication system using multimodal biometrics. The proposed biometric system uses two modalities, palm print and palm vein. The preprocessing steps begin with image acquisition of palm print and palm vein images using visible and infrared radiations, respectively. From the acquired image, region of interest (ROI) is extracted. The extracted information is encrypted using encryption algorithms. By this method of encryption, after ROI extraction, the storage of data consumes less memory and also provides faster access to the information. The encrypted data of both modalities are fused using advanced biohashing algorithm. At the verification stage, the image acquired is subjected to ROI extraction, encryption and biohashing procedures. The biohash code is matched with the information in database using matching algorithms, providing fast and accurate output. This approach will be feasible and very effective in biometric field.
Advances in intelligent systems and computing | 2017
M. Hari Priya; N. Lalithamani
In emerging lifestyle, people prefer online shopping as the most convenient way for purchasing their products. In order to provide secure transaction in e-commerce site, biometric features are incorporated in authentication. Biometric features are considered to be easier and secure because it solves the exasperation by the customer to recall the long account number and their password and it also has unique feature all over the globe. The use of biometrics authentication in online site provides more secure way of transaction than any other means [1, 2, 3]. In this work, we summarize the study of the various kinds of biometric traits that are used for online payment compared with one another.
European journal of scientific research | 2009
N. Lalithamani; K. P. Soman
Procedia Computer Science | 2016
N. Lalithamani