Skip to main content
Top
Published in: Soft Computing 24/2019

13-03-2019 | Methodologies and Application

An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing

Authors: R. Ramya, T. Sasikala

Published in: Soft Computing | Issue 24/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some sort of similarity distance methods. In this paper, Minkowski distance-based matching with Merkle hash tree authentication approach is proposed to overcome the above-mentioned challenges. Merkle hash tree-based encryption algorithm is introduced to improve the privacy concerns, usability and memory durability of the proposed system. This strategy handles security concerns via feature extracted data hashing with the private key. Minutiae feature extraction procedure adequately removes edge-detected features from the sensed data. Notwithstanding the security improvement, the proposed methodology stores just the produced keys for lessening memory stockpiling of cloud framework. Thus, authentication enhancement improves the entire security considerations through the proposed Minkowski distance-based authentication methodology. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the MATLAB simulator. A fingerprint dataset named as NIST Special Database 4 (NIST-4) is used for experimental evaluation. The proposed recognition system has achieved superior accuracy of 100% compared to the existing approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19 Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19
go back to reference Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795CrossRef Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795CrossRef
go back to reference Abualigah LM, Khader AT, Al-Betar MA (2016) Unsupervised feature selection technique based on genetic algorithm for improving the text clustering. In: 2016 7th international conference on computer science and information technology (CSIT). IEEE, pp 1–6 Abualigah LM, Khader AT, Al-Betar MA (2016) Unsupervised feature selection technique based on genetic algorithm for improving the text clustering. In: 2016 7th international conference on computer science and information technology (CSIT). IEEE, pp 1–6
go back to reference Abualigah LM, Khader AT, Al-Betar MA, Alomari OA (2017b) Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering. Expert Syst Appl 84:24–36CrossRef Abualigah LM, Khader AT, Al-Betar MA, Alomari OA (2017b) Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering. Expert Syst Appl 84:24–36CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2017c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466CrossRef Abualigah LM, Khader AT, Hanandeh ES (2017c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017d) A novel hybridization strategy for Krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435CrossRef Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017d) A novel hybridization strategy for Krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018b) A novel weighting scheme applied to improve the text document clustering techniques. In: Abualigah LM, Khader AT, Hanandeh ES (eds) Innovative computing, optimization and its applications. Springer, Cham, pp 305–320CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018b) A novel weighting scheme applied to improve the text document clustering techniques. In: Abualigah LM, Khader AT, Hanandeh ES (eds) Innovative computing, optimization and its applications. Springer, Cham, pp 305–320CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018c) A hybrid strategy for krill herd algorithm with harmony search algorithm to improve the data clustering. Intell Decis Technol 12:1–12CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018c) A hybrid strategy for krill herd algorithm with harmony search algorithm to improve the data clustering. Intell Decis Technol 12:1–12CrossRef
go back to reference Abualigah LM, Khader AT, Hanandeh ES (2018d) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071CrossRef Abualigah LM, Khader AT, Hanandeh ES (2018d) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071CrossRef
go back to reference Al-Riyami A, Zhang N, Keane J (2016) Impact of hash value truncation on ID anonymity in wireless sensor networks. Ad Hoc Netw 45(1):80–103CrossRef Al-Riyami A, Zhang N, Keane J (2016) Impact of hash value truncation on ID anonymity in wireless sensor networks. Ad Hoc Netw 45(1):80–103CrossRef
go back to reference Alyasseri ZAA, Khader AT, Al-Betar MA, Abualigah LM (2017) ECG signal denoising using β-hill climbing algorithm and wavelet transform. In: 2017 8th international conference on IEEE information technology (ICIT), pp 96–101 Alyasseri ZAA, Khader AT, Al-Betar MA, Abualigah LM (2017) ECG signal denoising using β-hill climbing algorithm and wavelet transform. In: 2017 8th international conference on IEEE information technology (ICIT), pp 96–101
go back to reference Doroz R, Porwik P, Orczyk T (2016) Dynamic sig-nature verification method based on association of features with similarity measures. Neurocomputing 171:921–931CrossRef Doroz R, Porwik P, Orczyk T (2016) Dynamic sig-nature verification method based on association of features with similarity measures. Neurocomputing 171:921–931CrossRef
go back to reference Jain A, Prasad MV (2016) A novel fingerprint in-dexing scheme using dynamic clustering. J Reliab Intell Environ 2(3):59–171CrossRef Jain A, Prasad MV (2016) A novel fingerprint in-dexing scheme using dynamic clustering. J Reliab Intell Environ 2(3):59–171CrossRef
go back to reference Jiao L, Tang X, Hou B, Wang S (2015) SAR images retrieval based on semantic classification and region-based similarity measure for earth observation. IEEE J Sel Top Appl Earth Obs Remote Sens 8(8):3876–3891CrossRef Jiao L, Tang X, Hou B, Wang S (2015) SAR images retrieval based on semantic classification and region-based similarity measure for earth observation. IEEE J Sel Top Appl Earth Obs Remote Sens 8(8):3876–3891CrossRef
go back to reference Kavsaoğlu AR, Polat K, Bozkurt MR (2014) A novel feature ranking algorithm for biometric recognition with PPG signals. Comput Biol Med 49:1–14CrossRef Kavsaoğlu AR, Polat K, Bozkurt MR (2014) A novel feature ranking algorithm for biometric recognition with PPG signals. Comput Biol Med 49:1–14CrossRef
go back to reference Li H (2016) Research on target information fusion identification algorithm in multi-sky-screen measurement system. IEEE Sens J 16(21):7653–7658CrossRef Li H (2016) Research on target information fusion identification algorithm in multi-sky-screen measurement system. IEEE Sens J 16(21):7653–7658CrossRef
go back to reference Li C, Zhang Y, Tu W, Jun C, Liang H, Yu H (2017) Soft measurement of wood defects based on LDA feature fusion and compressed sensor images. J For Res 28(6):1285–1292CrossRef Li C, Zhang Y, Tu W, Jun C, Liang H, Yu H (2017) Soft measurement of wood defects based on LDA feature fusion and compressed sensor images. J For Res 28(6):1285–1292CrossRef
go back to reference Nair SAH, Aruna P (2015) Comparison of DCT, SVD and BFOA based multimodal biometric wa-termarking systems. Alex Eng J 54(4):1161–1174CrossRef Nair SAH, Aruna P (2015) Comparison of DCT, SVD and BFOA based multimodal biometric wa-termarking systems. Alex Eng J 54(4):1161–1174CrossRef
go back to reference Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion pro-cess. Multimed Syst 20(1):45–64CrossRef Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion pro-cess. Multimed Syst 20(1):45–64CrossRef
go back to reference Ozturk C, Hancer E, Karaboga D (2005) Dynamic clustering with improved binary artificial bee col-ony algorithm. Appl Soft Comput 28(1):69–80 Ozturk C, Hancer E, Karaboga D (2005) Dynamic clustering with improved binary artificial bee col-ony algorithm. Appl Soft Comput 28(1):69–80
go back to reference Petrou ZI, Tian Y (2016) High-resolution sea ice motion estimation with optical flow using satellite spectroradiometer data. IEEE Trans Geosci Remote Sens 55(3):1339–1350CrossRef Petrou ZI, Tian Y (2016) High-resolution sea ice motion estimation with optical flow using satellite spectroradiometer data. IEEE Trans Geosci Remote Sens 55(3):1339–1350CrossRef
go back to reference Sasirekha K, Thangavel K (2016) A novel feature extraction algorithm from fingerprint image in wavelet domain. Comput Intell Cyber Secur Comput Models 1:135–143 Sasirekha K, Thangavel K (2016) A novel feature extraction algorithm from fingerprint image in wavelet domain. Comput Intell Cyber Secur Comput Models 1:135–143
go back to reference Si X, Jianjiang F, Yuan B, Zhou J (2017) Dense registration of fingerprints. Pattern Recognit 63:87–101CrossRef Si X, Jianjiang F, Yuan B, Zhou J (2017) Dense registration of fingerprints. Pattern Recognit 63:87–101CrossRef
go back to reference Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665CrossRef Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665CrossRef
go back to reference Swaminathan M, Yadav PK, Piloto O, Sjöblom T, Cheong I (2017) A new distance measure for non-identical data with application to image classification. Pattern Recognit 63:384–396CrossRef Swaminathan M, Yadav PK, Piloto O, Sjöblom T, Cheong I (2017) A new distance measure for non-identical data with application to image classification. Pattern Recognit 63:384–396CrossRef
go back to reference Telgad RL, Deshmukh PD, Siddiqui AM (2014) Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint. In: Recent advances and innovations in engineering (ICRAIE), vol 1. IEEE, pp 1–8 Telgad RL, Deshmukh PD, Siddiqui AM (2014) Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint. In: Recent advances and innovations in engineering (ICRAIE), vol 1. IEEE, pp 1–8
go back to reference Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285–297MathSciNetMATHCrossRef Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285–297MathSciNetMATHCrossRef
go back to reference Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475CrossRef Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475CrossRef
go back to reference Topcu B, Karabat C, Azadmanesh M, Er-dogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 1:100CrossRef Topcu B, Karabat C, Azadmanesh M, Er-dogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 1:100CrossRef
go back to reference Wan J, Tang S, Zhang Y, Li J, Wu P, Hoi SC (2016) HDIdx: high-dimensional indexing for efficient approximate nearest neighbor search. Neurocomputing 1:401–404 Wan J, Tang S, Zhang Y, Li J, Wu P, Hoi SC (2016) HDIdx: high-dimensional indexing for efficient approximate nearest neighbor search. Neurocomputing 1:401–404
go back to reference Wang C, Qin S (2015) Adaptive detection method of infrared small target based on tar-get-background separation via robust principal component analysis. Infrared Phys Technol 69(1):123–135MathSciNetCrossRef Wang C, Qin S (2015) Adaptive detection method of infrared small target based on tar-get-background separation via robust principal component analysis. Infrared Phys Technol 69(1):123–135MathSciNetCrossRef
go back to reference Wang B, Zhang J, Liu Y, Zou Y (2017a) Density peaks clustering based integrate framework for multi-document summarization. CAAI Trans Intell Technol 2(1):26–30CrossRef Wang B, Zhang J, Liu Y, Zou Y (2017a) Density peaks clustering based integrate framework for multi-document summarization. CAAI Trans Intell Technol 2(1):26–30CrossRef
go back to reference Wang S, Deng G, Hu J (2017b) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit 61:447–458CrossRef Wang S, Deng G, Hu J (2017b) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit 61:447–458CrossRef
go back to reference Watson CI, Wilson CL. (1992) NIST special data-base 4, fingerprint database. U.S. National Institute of Standards and Technology Watson CI, Wilson CL. (1992) NIST special data-base 4, fingerprint database. U.S. National Institute of Standards and Technology
go back to reference Yijing S, Jianjiang F, Jie Z (2016) Fingerprint index-ing with pose constraint. Pattern Recognit 54:1–13CrossRef Yijing S, Jianjiang F, Jie Z (2016) Fingerprint index-ing with pose constraint. Pattern Recognit 54:1–13CrossRef
go back to reference Zhang K, Huang D, Zhang B, Zhang D (2016) Im-proving texture analysis performance in biometrics by adjusting image sharpness. Pattern Recognit 66(1):16–25 Zhang K, Huang D, Zhang B, Zhang D (2016) Im-proving texture analysis performance in biometrics by adjusting image sharpness. Pattern Recognit 66(1):16–25
Metadata
Title
An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
Authors
R. Ramya
T. Sasikala
Publication date
13-03-2019
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 24/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03881-z

Other articles of this Issue 24/2019

Soft Computing 24/2019 Go to the issue

Premium Partner