Loading

A Secure Boot Loader System for Loading an Operating System with Fingerprint Authentication
Alycia Sebastian1, K.Siva Sankar2

1Alycia Sebastian*, Research Scholar, Department of Computer Science & Engineering, Noorul Islam Centre for Higher Education, Thuckalay, Tamil Nadu, India,
2Dr. Siva Sankar, Associate Professor, Department of Information Technology, Noorul Islam Centre for Higher Education, Thuckalay, TamilNadu, India, 

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2368-2374 | Volume-8 Issue-10, August 2019 | Retrieval Number: E7649068519/2019©BEIESP | DOI: 10.35940/ijitee.E7649.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s world, people are constantly on move and portable systems are in demand. With technology advancement, people exploit different types of memory devices for a portable system. For any external boot medium, the BIOS boot order setting change is required. The dynamic boot loader successfully eliminated this dependency and allowed the user to directly boot from any portable USB. The usage of USB has grown exponentially in recent years and securing it has become a major concern. In this paper, the USB is devised as a highly secured portable boot medium with fingerprint authentication to ensure data security. It performs feature extraction by combining both Local Directional Pattern (LDP) and Histograms of Oriented Gradients (HOG) which improves the accuracy rate. The classification is performed by random forest classifier, such that the intended users alone are granted access to the private storage area of the USB drive.
Keywords: Flash Memories, Fingerprint Recognition, Operating Systems, Portable computers
Scope of the Article: Secure Mobile and Multi-Agent Systems