Skip to main content
Top
Published in: Cluster Computing 1/2019

03-02-2018

Multi-biometric authentication system using finger vein and iris in cloud computing

Authors: S. Ilankumaran, C. Deisy

Published in: Cluster Computing | Special Issue 1/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multi biometric system can be used in cloud computing to achieve higher data security. Biometric authentication refers to automated methods used to identify a person by the features such as face, iris, vein, finger print, palm print etc. In this paper we proposed a novel \(C^{2}\) code derived using orientation and magnitude information extracted from finger vein and iris images to improve the authenticating system. The \(C^{2}\) code eliminates feature selection operator reducing the process complexity as it combines the orientation and magnitude information from finger vein and iris image inputs. This methodology can be implemented in a cloud computing environment based biometric authentication system due to its reduced data handling complexity. This reduced data makes the cloud database more secured and authentication possible anytime anywhere using the cloud environment. This \(C^{2}\) code can produce genuine accept rate more than 98.9 %, while false acceptance rate is about 1 \(\times \) 10\(^{-5}\) % and equal error rate is 0.4 %.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yang, W., Huang, X.: Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. Inf. Sci. 268, 20–32 (2014)CrossRef Yang, W., Huang, X.: Comparative competitive coding for personal identification by using finger vein and finger dorsal texture fusion. Inf. Sci. 268, 20–32 (2014)CrossRef
2.
go back to reference Kumar, A., Prathyusha, K.V.: Personal authentication using hand vein triangulation and knuckle shape. IEEE Trans. Image Process. 18(9), 2127–2136 (2009)MathSciNetCrossRefMATH Kumar, A., Prathyusha, K.V.: Personal authentication using hand vein triangulation and knuckle shape. IEEE Trans. Image Process. 18(9), 2127–2136 (2009)MathSciNetCrossRefMATH
3.
go back to reference Zhang, L., Zhang, L., Zhang, D., Zhu, H.: Online finger-knuckle-print verification for personal authentication. Pattern Recognit. 43(7), 2560–2571 (2010)CrossRefMATH Zhang, L., Zhang, L., Zhang, D., Zhu, H.: Online finger-knuckle-print verification for personal authentication. Pattern Recognit. 43(7), 2560–2571 (2010)CrossRefMATH
4.
go back to reference Zhi, L., Song, S.: An embedded real-time finger-vein recognition system for mobile devices. IEEE Trans. Consum. Electron. 58(2)2 (2012) Zhi, L., Song, S.: An embedded real-time finger-vein recognition system for mobile devices. IEEE Trans. Consum. Electron. 58(2)2 (2012)
5.
go back to reference Proenca, H.: Iris recognition: on the segmentation of degraded images acquired in the visible length. IEEE Trans. Pattern Anal. Mach. Intell. 32(8), 1502–1516 (2010)CrossRef Proenca, H.: Iris recognition: on the segmentation of degraded images acquired in the visible length. IEEE Trans. Pattern Anal. Mach. Intell. 32(8), 1502–1516 (2010)CrossRef
6.
go back to reference Ramya, V., Vijaya Kumar, P., Palaniappan, B.: A Novel Design of Finger Vein Recognition for Personal Authentication and Vehicle Security. J. Theor. Appl. Inf. Technol. 6(5) (2014) Ramya, V., Vijaya Kumar, P., Palaniappan, B.: A Novel Design of Finger Vein Recognition for Personal Authentication and Vehicle Security. J. Theor. Appl. Inf. Technol. 6(5) (2014)
7.
go back to reference Yang, J., Zhang, X.: Feature-level fusion of fingerprint and finger-vein for personal identification. Pattern Recognit. Lett. 33(5), 623–628 (2012)CrossRef Yang, J., Zhang, X.: Feature-level fusion of fingerprint and finger-vein for personal identification. Pattern Recognit. Lett. 33(5), 623–628 (2012)CrossRef
8.
go back to reference Miura, N., Nagasaka, A., Miyatake, T.: Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach. Vis. Appl. 15(4), 194–203 (2004)CrossRef Miura, N., Nagasaka, A., Miyatake, T.: Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach. Vis. Appl. 15(4), 194–203 (2004)CrossRef
9.
go back to reference Yang, J., Zhang, X.: Feature-level fusion of finger print and finger-vein for personal identification. Pattern Recognit. Lett. 33(5), 623–628 (2012)CrossRef Yang, J., Zhang, X.: Feature-level fusion of finger print and finger-vein for personal identification. Pattern Recognit. Lett. 33(5), 623–628 (2012)CrossRef
10.
go back to reference Tisse, C.L., Martin, L., Torres, L., Robert, M.: Person identification technique using human iris recognition. In: Proc. Vision Interface, pp. 294–299 (2002) Tisse, C.L., Martin, L., Torres, L., Robert, M.: Person identification technique using human iris recognition. In: Proc. Vision Interface, pp. 294–299 (2002)
11.
go back to reference Daugman, J.: High confidence personal identification by rapid video analysis of iris texture. Security Technology, 1992. Crime Countermeasures. In: Proceedings of Institute of Electrical and Electronics Engineers 1992 International Carnahan Conference on. IEEE (1992) Daugman, J.: High confidence personal identification by rapid video analysis of iris texture. Security Technology, 1992. Crime Countermeasures. In: Proceedings of Institute of Electrical and Electronics Engineers 1992 International Carnahan Conference on. IEEE (1992)
12.
go back to reference Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)CrossRef Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)CrossRef
13.
go back to reference Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348–1363 (1997)CrossRef Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348–1363 (1997)CrossRef
14.
go back to reference Sanchez-Avila, C., Sanchez-Reillo, R.: Two different approaches for iris recognition using Gabor filters and multi scale zero-crossing representation. Pattern Recognit. 38(2), 231–240 (2005)CrossRef Sanchez-Avila, C., Sanchez-Reillo, R.: Two different approaches for iris recognition using Gabor filters and multi scale zero-crossing representation. Pattern Recognit. 38(2), 231–240 (2005)CrossRef
15.
go back to reference Ma, L.: Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef Ma, L.: Efficient iris recognition by characterizing key local variations. IEEE Trans. Image Process. 13(6), 739–750 (2004)CrossRef
16.
go back to reference Ma, L.: Personal identification based on iris texture analysis. IEEE Trans. Pattern anal. Mach. Intell. 25(12), 1519–1533 (2003)CrossRef Ma, L.: Personal identification based on iris texture analysis. IEEE Trans. Pattern anal. Mach. Intell. 25(12), 1519–1533 (2003)CrossRef
17.
go back to reference Kong, W.K. , Zhang, D.: Competitive coding scheme for palm print verification. In: 16th International Conference on Pattern Recognition (ICPR), pp. 520–523 (2004) Kong, W.K. , Zhang, D.: Competitive coding scheme for palm print verification. In: 16th International Conference on Pattern Recognition (ICPR), pp. 520–523 (2004)
18.
go back to reference Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef
19.
go back to reference Chen, J., Wang, Y., Wang, X.: On-demand security architecture for cloud computing. Computer 45(7), 73–78 (2012)CrossRef Chen, J., Wang, Y., Wang, X.: On-demand security architecture for cloud computing. Computer 45(7), 73–78 (2012)CrossRef
20.
go back to reference Yang, W.M., Rao, Q., Liao, Q.M.: Personal identification for single sample using finger vein location and direction coding. Int. Conf. Hand-based Biom. (ICHB) 2011, 1–6 (2011) Yang, W.M., Rao, Q., Liao, Q.M.: Personal identification for single sample using finger vein location and direction coding. Int. Conf. Hand-based Biom. (ICHB) 2011, 1–6 (2011)
21.
go back to reference Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRef Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)CrossRef
22.
go back to reference Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3), 805–815 (2016) Jiang, Q., Ma, J., Wei, F.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3), 805–815 (2016)
23.
go back to reference Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012) Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
24.
go back to reference Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. Comput. Secur.-ESORICS 2009, 355–370 (2009) Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. Comput. Secur.-ESORICS 2009, 355–370 (2009)
25.
go back to reference Vidyasree, P., Madhavi, G., Viswanadharaju, S., Borra, S.: A bio-application for accident victim identification using biometrics. In: Classification in Bio. Apps, Springer, Cham , pp. 407–447 (2018) Vidyasree, P., Madhavi, G., Viswanadharaju, S., Borra, S.: A bio-application for accident victim identification using biometrics. In: Classification in Bio. Apps, Springer, Cham , pp. 407–447 (2018)
26.
go back to reference Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. Cloud Comput. 157–166 (2009) Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. Cloud Comput. 157–166 (2009)
27.
go back to reference Nair, V.S., Reshmypriya, G.N., Rubeena, M.M., Fasila, K.A.: Multi-biometric cryptosystem based on decision level fusion for file uploading in cloud. In: Recent Advances in Electronics and Communication Technology (ICRAECT), 2017 International Conference on, pp. 29–32 IEEE (2017) Nair, V.S., Reshmypriya, G.N., Rubeena, M.M., Fasila, K.A.: Multi-biometric cryptosystem based on decision level fusion for file uploading in cloud. In: Recent Advances in Electronics and Communication Technology (ICRAECT), 2017 International Conference on, pp. 29–32 IEEE (2017)
Metadata
Title
Multi-biometric authentication system using finger vein and iris in cloud computing
Authors
S. Ilankumaran
C. Deisy
Publication date
03-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 1/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1824-9

Other articles of this Special Issue 1/2019

Cluster Computing 1/2019 Go to the issue

Premium Partner