Project Report On An Efficient and Privacy Preserving Biometric Identification Scheme in Cloud Computing
Project Report On An Efficient and Privacy Preserving Biometric Identification Scheme in Cloud Computing
On
AN EFFICIENT AND PRIVACY PRESERVING BIOMETRIC
IDENTIFICATION SCHEME IN CLOUD COMPUTING
Mini Project Report Submitted for partial fulfillment for the award of
Bachelor of Technology
In
Computer Science & Engineering
Submitted by
B. Srivani 16UQ1A0558
CERTIFICATE
We here by declare that the work being presented in this report entitled
And it work carried out under the supervision of B.PHIJIK.The matter embodied in this
Report has not been submitted to any other university/Institute by us for the award of any
Other degree.
Department: This is to certify that the above statement made by the candidates is
MR.B.PHIJIK MR.B.PHIJIK
Head of the Department AssistantProfessor
Computer Science& Engineering Computer Science &Engineering
(External examiner)
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of the people who made it possible and whose constant
encouragement and guidance has been a source of inspiration throughout the course of this
project. We take this opportunity to express our gratitude to all those who have helped us in this
project.
Our deep sense of gratitude and sincere thanks to Dr. C. Srinivasa Kumar Principal,
for having provided the facilities to undertake and complete this project.
We are deeply indebted B.Phijik, Head of the Department CSE for his ineffable encouragement
he provided.
Our sincere thanks to our internal guide B.Phijik, Asst.Prof Department of CSE, for his
guidance and constant supervision as well as for providing necessary information regarding the
project & also for his support in completing the project.
Last but not least I wish to avail myself of this opportunity, express a sense of gratitude
and thanks to my friends and my beloved parents for their manual support, strength and help.
B. Srivani 16UQ1A0558
Abstract
Biometric identification has become increasingly popular in recent years. With the development
of cloud computing, database owners are motivated to outsource the large size of biometric data
and identification tasks to the cloud to get rid of the expensive storage and computation costs,
which however brings potential threats to users’ privacy. In this paper, we propose an efficient
and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric
data is encrypted and outsourced to the cloud server. To execute a biometric identification, the
database owner encrypts the query data and submits it to the cloud. The cloud performs
identification operations over the encrypted database and returns the result to the database
owner. A thorough security analysis indicates the proposed scheme is secure even if attackers
can forge identification requests and collude with the cloud. Compared with previous protocols,
experimental results show the proposed scheme achieves a better performance in both
preparation and identification procedures.
Index
Topic page no
1.Introduction
1.1About Project 1
1.2 Objective 1
1.3 Scope 3
2.Literature Survey Report 4
2.1 Existing system 5
2.2 Proposed system 6
3. Requirement Specifications 7
3.1 Functional Requirements 8
3.2 Hardware and Software Requirements 9
4. Technologies Used 10
4.1description of the primary technology 11
4.2description about the secondary technology 13
4.3description about the environment 14
4.4description about the IDE 23
4.5description about the database 24
5. System Architectural Design 25
5.1system architecturediagram 26
5.2class diagram 26
5.3 usecase diagram 28
5.4sequence diagram 30
5.5dataflow diagram 31
5.6flowchart 32
5.7collaboration diagram 33
6. Detailed Description of Components 34
6.1 javascript 35
6.2jdbc 36
6.3java server page 37
Topic page no
7. Testing 40
8. Screen Shots 44
8.1home page 45
8.2 cloud server login page 46
8.3 cloud main page 48
8.4view all owners page 49
8.5View all users page 50
8.6 view all image files page 51
8.7 view all attackers page 52
8.8owner login page 53
8.9owner biometric identification page 54
8.10data owner main page 55
8.11 owner profile page 56
8.12upload image page 57
8.13upload image 58
8.14owner image files page 61
8.15image verification page 62
8.16user main page 63
8.17Search biometric images page 64
8.18view all consumer search history 66
9. Conclusion
9.1. Conclusion 67
10. Bibliography
References 68
FIGURES
1.system Architecture 26
2.class diagram 27
1.1About project
Biometricidentificationhas raised increasingly attention since it provides a promising way
to identify users. Compared with traditional authentication methods based on passwords
and identification cards, biometric identification is consideredto bemore reliable and
convenient . Additionally, biometric identification has been widely applied in many fields
by using biometric traits such as fingerprint , iris , and facial patterns , which can be
collected from various sensors . In a biometric identification system, the database owner
such as the FBI who is responsible to manage the national fingerprints database, may
desire to outsource the enormous biometric data to the cloud server (e.g., Amazon) to get
rid of the expensive storage and computation costs. However, to preserve the privacy of
biometric data, the biometric data has to be encrypted before outsourcing. Whenever a
FBI’s partner (e.g., the police station) wants to authenticate an individual’s identity, he
turns to the FBI and generates an identification query by using the individual’s biometric
traits (e.g., fingerprints, irises, voice patterns, facial patterns etc.). Then, the FBI encrypts
the query and submits it to the cloud to find the close match.Thus,the challenging
problemis how todesigna protocol whichenablesefficientandprivacypreserving biometric
identification in the cloud computing.
A number of privacy-preserving biometric identification solutions have been
proposed. However, most of them mainly concentrate on privacy preservation but ignore
the efficiency, such as the schemes based on homomorphic encryption and oblivious
transfer in for fingerprintandface image identification respectively. Suffering from
performance problems of local devices, these schemes are not efficient once the size of
the database is larger than 10 MB. Later, Evans et al presented abiometric identification
scheme by utilizing circuit design and ciphertext packing techniques to achieve efficient
identification for aVOLUME 4, 2016 1IEEE Access and Transaction on Cloud
Computing,Volume:6,Issue Date:26.March.2018larger data base of upto
1GB.Additionally,Yuan and Yu proposed an efficient privacy preserving biometric
identification scheme.
Specifically ,they constructed three modules and designed a concrete protocol to achieve
the security of fingerprint trait. To improve the efficiency, in their scheme, the database
Figure:system model
1.3Scope
Biometric identification has raised increasingly attention since it provides a promising
way to identify users. Compared with traditional authentication methods based on
passwords and identification cards, biometric identification is consideredto be more
reliable and convenient . Additionally, biometric identification has been widely applied in
many fields by using biometric traits such as fingerprint , iris , and facial patterns , which
can be collected from various sensors.
2.1Existing system
Disadvantages
The proposed system examines the biometric identification scheme and shows its
insufficiencies and security weakness under the proposed level-3 attack. Specifically,
we demonstrate that the attacker can recover their secret keys by colluding with the
cloud, and then decrypt the biometric traits of all users.
The system presents a novel efficient and privacy-preserving biometric identification
scheme. The detailed security analysis shows that the proposed scheme can achieve a
required level of privacy protection. Specifically, our scheme is secure under the
biometric identification outsourcing model and can also resist the attack proposed by
the proposed system.
Compared with the existing biometric identification schemes, the performance
analysis shows that the proposed scheme provides a lower computational cost in both
preparation and identification procedures.
Advantages
An efficient and privacy preserving biometric identification scheme which can resist
the collusion attack launched by the users.
Attackers can only observe the encrypted data stored in the cloud. In order to avoid,
the well-known cipher text-only attack model has been implement.
Data Owner
In this module, the data owner uploads their Biometric images with their
contents data to the Cloud server. For the security purpose the data owner assigns the digital
sign and then store in the Cloud and also performs the following operations such as Upload
Biometric image with its digital sign based on title, desc, List all uploaded Biometric images,
Verify Biometric image details, and Delete Biometric image details.
Cloud Server
The Cloud service provider manages a Cloud to provide data storage service.
And performs the following operations such as Store all Biometric image files with their
signature, View all Biometric image Files with its details, View all Biometric image
comments, View all Data owners and Users, and View all attackers.
User
The Cloud User who has a large amount of data to be stored in Cloud Servers and
have the permissions to access and manipulate stored Biometric image and its data. The
consumer will search the data and accessing the Biometric image data if he is authorized and
performs the following operations such as Search Biometric image , Access Biometric image
and its details, Download Biometric image & make comments.
Hardware:
Software :
System requirements:
Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows
users to produces Web pages that include text, graphics and pointer to other Web pages
(Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard 8879, SGML
(Standard Generalized Markup Language), but specialized to hypertext and adapted to the
Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can
easily jump from one point to another point. We can navigate through the information based on
our interest and preference. A markup language is simply a series of elements, each delimited
with special characters that define how text or other items enclosed within the elements should
be displayed. Hyperlinks are underlined or emphasized works that load to other documents or
some portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any
platform or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML tags are not
case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation
of the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags :
<!-- --> Specifies comments
<A>……….</A>Creates hypertext links
<B>……….</B>Formats text as bold
<BIG>……….</BIG>Formats text in large font.
<BODY>…</BODY>Contains all tags and text in the HTML document
<CENTER>...</CENTER>Creates text
<DD>…</DD>Definition of a term
<DL>...</DL>Creates definition list
<FONT>…</FONT>Formats text with a particular font
<FORM>...</FORM>Encloses a fill-out form
ADVANTAGES:
A HTML document is small and hence easy to send over the net. It is small because it
does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
Tomcat is the servlet container that is used in the official Reference Implementation for the
Java Servlet and Java Server Pages technologies. The Java Servlet and Java Server Pages
specifications are developed by Sun under the Java Community Process. Web Servers like
Apache Tomcat support only web components while an application server supports web
application server).To develop a web application with jsp/servlet install any web server like
Java Technology
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
With most programming languages, you either compile or interpret a program so that
you can run it on your computer. The Java programming language is unusual in that a program
is both compiled and interpreted. With the compiler, first you translate a program into an
intermediate language calledJava byte codes —the platform-independent codes interpreted by
the interpreter on the Java platform. The interpreter parses and runs each Java byte code
instruction on the computer. Compilation happens just once; interpretation occurs each time
the program is executed. The following figure illustrates how this works.
Native code is code that after you compile it, the compiled code runs on a specific
hardware platform. As a platform-independent environment, the Java platform can be a bit
slower than native code. However, smart compilers, well-tuned interpreters, and just-in-time
byte code compilers can bring performance close to that of native code without threatening
portability.
We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than other
languages. We believe that Java technology will help you do the following:
Get started quickly: Although the Java programming language is a powerful object-oriented
language, it’s easy to learn, especially for programmers already familiar with C or C++.
Write less code: Comparisons of program metrics (class counts, method counts, and so on)
suggest that a program written in the Java programming language can be four times smaller
than the same program in C++.
Write better code: The Java programming language encourages good coding practices, and its
garbage collection helps you avoid memory leaks. Its object orientation, its JavaBeans
component architecture, and its wide-ranging, easily extendible API let you reuse other
people’s tested code and introduce fewer bugs.
Develop programs more quickly: Your development time may be as much as twice as fast
versus writing the same program in C++. Why? You write fewer lines of code and it is a
simpler programming language than C++.
Avoid platform dependencies with 100% Pure Java: You can keep your program portable
by avoiding the use of libraries written in other languages. The 100% Pure JavaTM Product
Certification Program has a repository of historical process manuals, white papers, brochures,
and similar materials online.
Write once, run anywhere: Because 100% Pure Java programs are compiled into machine-
independent byte codes, they run consistently on any Java platform.
Distribute software more easily: You can upgrade applets easily from a central server.
Applets take advantage of the feature of allowing new classes to be loaded “on the fly,”
without recompiling the entire program.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface
for application developers and database systems providers. Before ODBC became a de facto
standard for Windows programs to interface with database systems, programmers had to use
proprietary languages for each database they wanted to connect to. Now, ODBC has made the
choice of the database system almost irrelevant from a coding perspective, which is as it should
be. Application developers have much more important things to worry about than the syntax
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If
a database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to
market much faster than developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.
The remainder of this section will cover enough information about JDBC for you to know what
it is about and how to use it effectively. This is by no means a complete overview of JDBC.
That would fill an entire book.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to why
certain classes and functionalities behave the way they do. The eight design goals for JDBC are
as follows:
1. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an effort to
support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver.
This allows the connectivity module to handle non-standard functionality in a manner that
is suitable for its users.
2. JDBC must be implemental on top of common database interfaces
The JDBC SQL API must “sit” on top of other common SQL level APIs.This goal allows
JDBC to use existing ODBC level drivers by the use of a software interface. This interface
would translate JDBC calls to ODBC and vice versa.
3. Provide a Java interface that is consistent with the rest of the Java system
Because of Java’s acceptance in the user community thus far, the designers feel that they
should not stray from the current design of the core Java system.
4. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no exception. Sun
felt that the design of JDBC should be very simple, allowing for only one method of
completing a task per mechanism. Allowing duplicate functionality only serves to confuse the
users of the API.
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and
interpreted. With a compile you translate a Java program into an intermediate language called
Java byte codes the platform-independent code instruction is passed and run on the computer.
Compilation happens just once; interpretation occurs each time the program
is executed. The figure illustrates how this works.
You can think of Java byte codes as the machine code instructions for the Java Virtual
Machine (Java VM). Every Java interpreter, whether it’s a Java development tool or a Web
browser that can run Java applets, is an implementation of the Java VM. The Java VM can also
be implemented in hardware.
Java byte codes help make “write once, run anywhere” possible. You can compile your
Java program into byte codes on my platform that has a Java compiler. The byte codes can then
be run any implementation of the Java VM. For example, the same Java program can run
Windows NT, Solaris, and Macintosh.
Features/components
An IDE typically contains a code editor, a compiler or interpreter, and a debugger,
accessed through a single graphical user interface (GUI).
Functions
IDE basically helps you write your code and view it with a Helpful editor with features
like code highlight , code fold , hint and error / warning marker, format it easily with built in
formatter, build it easily with built in maven/ ant/ gradlesupport, compile , run and debug
easily. Some of them helps you profile it as well. IDEalso provides better search tool to
navigate / search inside your code . They also provide powerful refactoring functionalityusing
MySQL
MySQL: characteristics
• client/server systems → a system that consists of a multi-threaded SQL server that supports
different backends, several different client programs and libraries, administrative tools, and a
can be linked into an application to get a smaller, faster, easier-to-manage standalone product.
MYSQL benefits:
Keyword,biometric Attacker
members image name members name,keyword,biometric image
contents,digital contents,digital sign
sign,skey,dt
logout
methods Login(),reset(),register()
The top compartment contains the name of the class. It is printed in bold and centered, and the
first letter is capitalized.
The middle compartment contains the attributes of the class. They are left-aligned and the first
letter is lowercase.
The bottom compartment contains the operations the class can execute. They are also left-
aligned and the first letter is lowercase.
.
Usecase diagram:
Block hackers
Delete image
files User Request query
Store query
Actor
Use case
System
Package
sequential order i.e. the order in which these interactions take place. We can also use the terms
event diagrams or event scenarios to refer to a sequence diagram. Sequence diagrams describe
how and in what order the objects in a system function. These diagrams are widely used by
businessmen and software developers to document and understand requirements for new and
existing systems.
Notations:
Actors
Lifelines
Difference between lifeline and an actor
Messages
Upload response
confirmation
view data
Upload image
with comments Cloud server
Data owner
Verify image
data
Data
integrity
Upload files
metadata user
description:
A data-flow is a path for data to move from one part of the information system to another. A
data-flow may represent a single data element such the Customer ID or it can represent a set
of data element (or a data structure).
Data flow diagrams are used to graphically represent the flow of data in a business
information system. DFD describes the processes that are involved in a system to transfer
data from the input to the file storage and reports generation.
Data flow diagrams can be divided into logical and physical. The logical data flow diagram
describes flow of data through a system to perform certain functionality of a business. The
physical data flow diagram describes the implementation of the logical data flow.
Owner
Req biometric
image content Upload image files
verification
Checks file
File name or skey
name or
not correct
secret key
yes
users
Objects interact to perform the behavior of a particular use case, or a part of a use case along
with sequence diagrams, collaboration are used by designers to define and clarify the roles
of theobjects that perform a particular flow of events of a use case. They are the primary
Collaboration is a collection of named objects and actors with links connecting them. They
A Collaboration defines a set of participants and relationships that are meaningful for a given
set of purposes
A Collaboration between objects working together provides emergent desirable
functionalities in Object-Oriented systems
Each object (responsibility) partially supports emergent functionalities
Objects are able to produce (usable) high-level functionalities by working together
Objects collaborate by communicating (passing messages) with one another in order to work
together
diagram:
1.getfiles() 3.process()
al
Input document preprocessing taxonomy
2. 2.Stopword
removal()
4.feature()
5.incremental cluster
6.1 JAVASCRIPT
JavaScript is a script-based programming language that was developed by Netscape
Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of both
client and server components of Web-based applications. On the client side, it can be used to
write programs that are executed by a Web browser within the context of a Web page. On the
server side, it can be used to write Web server programs that can process information submitted
by a Web browser and then updates the browser’s display accordingly.
Here are a few things we can do with JavaScript :
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser’s status line.
Animate images or rotate images that change when we move the mouse over them.
Detect the browser in use and display different content for different browsers.
Detect installed plug-ins and notify the user if a plug-in is required.
We can do much more with JavaScript, including creating entire application.
Javascript vs java:
JavaScript and Java are entirely different languages. A few of the most glaring differences are:
Java applets are generally displayed in a box within the web document; JavaScript can affect
any part of the Web document itself.
While JavaScript is best suited to simple applications and adding interactive features to Web
pages; Java can be used for incredibly complex applications.
There are many other differences but the important thing to remember is that JavaScript and
Java are separate languages. They are both useful for different things; in fact they can be used
together to combine their advantages
ADVANTAGES:
JavaScript can be used for Sever-side and Client-side scripting.
It is more flexible than VBScript.
JavaScript is the default scripting languages at Client-side since all the browsers supports it.
What Is JDBC?
JDBC is a Java API for executing SQL statements. (As a point of interest, JDBC is a
trademarked name and is not an acronym; nevertheless, JDBC is often thought of as standing
for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java
programming language. JDBC provides a standard API for tool/database developers and makes
it possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. One can
write a single program using the JDBC API, and the program will be able to send SQL
statements to the appropriate database. The combinations of Java and JDBC lets a programmer
write it once and run it anywhere.
At this point, Microsoft's ODBC (Open Database Connectivity) API is that probably the most
widely used programming interface for accessing relational databases. It offers the ability to
connect to almost all databases on almost all platforms.
So why not just use ODBC from Java? The answer is that you can use ODBC from Java, but
this is best done with the help of JDBC in the form of the JDBC-ODBC Bridge, which we will
cover shortly. The question now becomes "Why do you need JDBC?" There are several
1. ODBC is not appropriate for direct use from Java because it uses a C interface. Calls from Java
to native C code have a number of drawbacks in the security, implementation, robustness, and
automatic portability of applications.
2. A literal translation of the ODBC C API into a Java API would not be desirable. For example,
Java has no pointers, and ODBC makes copious use of them, including the notoriously error-
JDBCDriver Types
The JDBC drivers that we are aware of at this time fit into one of four categories:
Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled application server that
provides support for them. Dubbed the JSP engine, this support involves recognition,
translation, and management of the Java Server Page lifecycle and its interaction components.
Processing
A Java Server Pages file is essentially an HTML document with JSP scripting or tags. The Java
Server Pages file has a JSP extension to the server as a Java Server Pages file. Before the page
is served, the Java Server Pages syntax is parsed and processed into a Servlet on the server
side. The Servlet that is generated outputs real content in straight HTML for responding to the
client.
Access Models:
A Java Server Pages file may be accessed in at least two different ways. A client’s request
comes directly into a Java Server Page. In this scenario, suppose the page accesses reusable
Java Bean components that perform particular well-defined computations like accessing a
database. The result of the Beans computations, called result sets is stored within the Bean as
properties. The page uses such Beans to generate dynamic content and present it back to the
client.
In both of the above cases, the page could also contain any valid Java code. Java Server Pages
architecture encourages separation of content from presentation.
2. This request is transferred to the JavaWebServer. At the server side JavaWebServer receives
the request and if it is a request for a jsp file server gives this request to the JSP engine.
3. JSP engine is program which can understands the tags of the jsp and then it converts those tags
into a Servlet program and it is stored at the server side. This Servlet is loaded in the memory
and then it is executed and the result is given back to the JavaWebServer and then it is
JDBC connectivity
The JDBC provides database-independent connectivity between the J2EE platform and a wide
range of tabular data sources. JDBC technology allows an Application Component Provider to:
3.unit testing:
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests
perform basic tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process performs
accurately to the documented specifications and contains clearly defined inputs and expected
results.
2. Bottom-up Integration
This method begins the construction and testing with the modules at the lowest level in the
program structure. Since the modules are integrated from the bottom up, processing required
for modules subordinate to a given level is always available and the need for stubs is
eliminated. The bottom up integration strategy may be implemented with the following steps:
A driver (i.e.) the control program for testing is written to coordinate test case input and output.
The cluster is tested.
Drivers are removed and clusters are combined moving upward in the program structure
The bottom up approaches tests each module individually and then each module is module is
integrated with a main module and tested for functionality.
7.System Testing:
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
8.Acceptance Testing:
User Acceptance Testing is a critical phase of any project and requires
significant participation by the end user. It also ensures that the system meets the functional
requirements.
9. Output Testing:
After performing the validation testing, the next step is output testing of the proposed system,
since no system could be useful if it does not produce the required output in the specified
format. Asking the users about the format required by them tests the outputs generated or
displayed by the system under consideration. Hence the output format is considered in 2 ways
– one is on screen and another in printed format.
Text Field:
The text field can contain only the number of characters lesser than or equal to its
size. The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect
entry always flashes and error message.
Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error messages. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually
tested modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.
[1] A. Jain, L. Hong and S. Pankanti, “Biometric identification,” Communications of the ACM,
vol. 43, no. 2, pp. 90-98, 2000.
[2] R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric
Systems, pp. 22-61, 2005.
[3] J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on
Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181-195,
2015.
[4] Y. Xiao, V. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, “A survey of key management
schemes in wireless sensor networks,” Journal of Computer Communications, vol. 30, no. 11-
12, pp. 2314-2341, 2007.
[5] X.Du,Y.Xiao,M.Guizani,andH.H.Chen,“Aneffectivekeymanagement scheme for
heterogeneous sensor networks,” Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
[6] X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless
Communications Magazine, vol. 15, no. 4, pp. 60-66, 2008.
[7] X.Hei,andX.Du,“Biometric-basedtwo-levelsecureaccesscontrolforimplantable medical
devices during emergency,” in Proc. of IEEE INFOCOM 2011, pp. 346-350, 2011.
[8] J.YuanandS.Yu,“Efficientprivacy-preservingbiometricidentificationin
cloudcomputing,”inProc.ofIEEEINFOCOM2013,pp.2652-2660,2013.
[9] Q.Wang,S.Hu,K.Ren,etal.,“CloudBI:Practicalprivacy-preservingoutsourcing of biometric
identification in the cloud,” in European Symposium on Research in Computer Security, pp.
186-205, 2015.
[10] Y.Zhu,Z.WangandJ.Wang,“Collusion-resistingsecurenearestneighbor query over encrypted
data in cloud,” In Quality of Service (IWQoS), 2016 IEEE/ACM 24th International
Symposium on, pp. 1-6, 2016.
[11] S. Pan, S. Yan, and W. Zhu, “Security analysis on privacy-preserving cloud aided
biometric identification schemes,” in Australasian Conference on Information Security and
Privacy, pp. 446-453, 2016.
[12] C. Zhang, L. Zhu and C. Xu, “PTBI: An efficient privacy-preserving biometric
identification based on perturbed term in the cloud,” Information Sciences, vol. 409, pp. 56-67,
2017.