Finger print based fraud detuction cloud encryption system

      

ABSTARCT :

Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of security. Since the user who has uploaded the image has no control over the security of images, the cloud provider has to ensure maximum security in terms of authentication and prevention from attacks. The main objective of this paper is to provide a method to enhance the safety of images on cloud. This paper presents an idea of securing images on cloud platform using biometric authentication. Different steps involved in biometric authentication and secure upload and access of images are explained, and integration of all the steps is done at the end as a case study which puts light on the whole process in which methods are best-regarding results and compatibility. The proposed algorithm in this paper presents the idea of authentication of images in two basic steps of image compression using standard discrete wavelet transform method followed by image encryption using the hybrid method of SHA and blowfish. This image is then stored into the database of cloud and accessed whenever the user requests it. A structured and comprehensive view of encryption methods, types of biometrics and to secure data as well as images is provided in this paper.

EXISTING SYSTEM :

? In most cases, only bits carrying important information are taken into consideration. Some of the existing methods for image compression in cloud computing. ? In this method of compression, the image is divided by different frequencies of different parts of the image. To compress an image, the parts of the image containing the less important frequencies are discarded. ? Image compression is the first step towards the image protection, and uploading of the images needs to be accurate. ? The leftover frequencies are used to determine the image during its retrieval.

DISADVANTAGE :

Despite increased security, efficiency, and convenience, biometric authentication and its uses in modern-day tech and digital applications also has disadvantages: ? Costs – Significant investment needed in biometrics for security ? Data breaches – Biometric databases can still be hacked ? Tracking and data – Biometric devices like facial recognition systems can limit privacy for users ? Bias – Machine learning and algorithms must be very advanced to minimize biometric demographic bias ? False positives and inaccuracy – False rejects and false accepts can still occur preventing select users from accessing systems

PROPOSED SYSTEM :

• We need to select the best method that would be compatible with our proposed biometrics encryption system. • Therefore, image privacy and protection is of crucial importance currently. Similarly, in cloud-computing image, privacy is at most needed. We also know that biometric characteristics are the unique characteristics of a person. • Therefore, in this paper, we have used biometric characteristics of a person for image protection in cloud computing. • In this paper, a method of biometrics authentication coupled with image encryption to ensure that the security of images on the cloud architecture is proposed.

ADVANTAGE :

Biometric authentication and its uses in modern-day tech and digital applications has a number of advantages: ? High security and assurance – Biometric identification provides the answers to “something a person has and is” and helps verify identity ? User Experience – Convenient and fast ? Non-transferrable – Everyone has access to a unique set of biometrics ? Spoof-proof – Biometrics are hard to fake or steal

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp