Skip to main content
Top

2023 | OriginalPaper | Chapter

Privacy Threat Reduction Using Modified Multi-line Code Generation Algorithm (MMLCGA) for Cancelable Biometric Technique (CBT)

Authors : Pramod D. Ganjewar, Sanjeev J. Wagh, Aarti L. Gilbile

Published in: Intelligent Cyber Physical Systems and Internet of Things

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays individual’s identity verification is required at many places for authenticity like Government Sector, Private sector, Public Sector etc. Many existing systems are based on either physical documents or on biometric parameters. Biometric system has become a more convenient way for authenticity check. In biometric system, some samples of biometric parameters are collected and stored at the server side for further use. These samples would be used for the verification of the identity of the person. The actual required biometric parameter will be compared with all the existing samples available in the system to match with the registered person. If it matches with one of the existing sample, then that will be authenticated by the system and allowed to perform further operations. But what if, the samples collected by the authority get misused? That needs security from the owner of the system. So, the identity of the samples must be hidden from the operators by some way, which has been focused in this work. A new approach called as Cancelable Biometric Technique (CBT) using Modified Multi-Line Code Generation Algorithm (MMLCGA) is used for storing biometric samples using template. The cancelable method converts the gathered samples and stores it into the system for hiding its original identity. In the verification phase, the system will convert it back to the original sample to be used for identity matching of the person or user. This technique provides more privacy, because of which privacy threats can be reduced. The time and accuracy of the proposed technique is better by 15% and 1.4% respectively, when compared to the existing technique Multi-Line Code Generation Algorithm (MLCGA).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kaur H, Khanna P (2019) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14 Kaur H, Khanna P (2019) Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans Inf Forensics Secur 14
2.
go back to reference Wu S-C, Chen P-T, Lee Swindlehurst A, Hung P-L (2019) Cancelable biometric recognition with ECGs: subspace-based approaches. IEEE Trans Inf Forensics Secur 14 Wu S-C, Chen P-T, Lee Swindlehurst A, Hung P-L (2019) Cancelable biometric recognition with ECGs: subspace-based approaches. IEEE Trans Inf Forensics Secur 14
3.
go back to reference Jin Z, Lai Y-L, Hwang JY, Kim S, Teoh ABJ (2018) Ranking based locality sensitive hashing enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13 Jin Z, Lai Y-L, Hwang JY, Kim S, Teoh ABJ (2018) Ranking based locality sensitive hashing enabled cancelable biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13
4.
go back to reference Gomez-Barrero M, Galbally J, Rathgeb C, Busc C (2018) General framework to evaluate unlinkability in biometric template protection system. IEEE Trans Inf Forensics Secur 13 Gomez-Barrero M, Galbally J, Rathgeb C, Busc C (2018) General framework to evaluate unlinkability in biometric template protection system. IEEE Trans Inf Forensics Secur 13
5.
go back to reference Jin Z et al. (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415–1428 Jin Z et al. (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415–1428
6.
go back to reference Lee C et al. (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans Syst Man Cybern Part B 37(4):980–992 Lee C et al. (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans Syst Man Cybern Part B 37(4):980–992
7.
go back to reference Kelkboom EJC, Molina GG, Breebaart J, Veldhuis RNJ, Kevenaar TAM, Jonker W. Binary biometrics: an analytic framework to estimate the performance curves under Gaussian assumption. IEEE Trans Syst Man Cybern Part A Syst Humans 40(3) Kelkboom EJC, Molina GG, Breebaart J, Veldhuis RNJ, Kevenaar TAM, Jonker W. Binary biometrics: an analytic framework to estimate the performance curves under Gaussian assumption. IEEE Trans Syst Man Cybern Part A Syst Humans 40(3)
8.
go back to reference Wong WJ, Wong MLD, Kho YH (2013) Multiline code: a low complexity revocable fingerprint template for cancellable biometrics. J Central South Univ 20(5):1292–1297CrossRef Wong WJ, Wong MLD, Kho YH (2013) Multiline code: a low complexity revocable fingerprint template for cancellable biometrics. J Central South Univ 20(5):1292–1297CrossRef
9.
go back to reference Jin Z, Bok-Min G, Teoh ABJ, Tay YH (2014) Non-invertible analysis on graph-based hamming embedding transform for protecting fingerprint minutiae. In: IEEE 2014 international conference on electronics, information and communications (ICEIC), pp 1–2 Jin Z, Bok-Min G, Teoh ABJ, Tay YH (2014) Non-invertible analysis on graph-based hamming embedding transform for protecting fingerprint minutiae. In: IEEE 2014 international conference on electronics, information and communications (ICEIC), pp 1–2
10.
go back to reference Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancellable fingerprint template. Pattern Recogn Lett 42:137–147CrossRef Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancellable fingerprint template. Pattern Recogn Lett 42:137–147CrossRef
12.
go back to reference Akdoğan D, Altop DK, Levi A (2015) Secure key agreement using pure biometrics. In: 2015 IEEE conference on communications and network security (CNS), pp 191–199 Akdoğan D, Altop DK, Levi A (2015) Secure key agreement using pure biometrics. In: 2015 IEEE conference on communications and network security (CNS), pp 191–199
13.
go back to reference Li C et al (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans Inf Forensics Secur 10(6):1193–1206 Li C et al (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans Inf Forensics Secur 10(6):1193–1206
14.
go back to reference Subramaniam U, Subbaraya K (2015) A biometric based secure session key agreement using modified elliptic curve cryptography. Int Arab J Inf Technol (IAJIT) 12(2) Subramaniam U, Subbaraya K (2015) A biometric based secure session key agreement using modified elliptic curve cryptography. Int Arab J Inf Technol (IAJIT) 12(2)
15.
go back to reference Barman S, Samanta D, Chattopadhyay S (2015) Fingerprint-based crypto-biometric system for network security. EURASIP J Inform Sec 2015(1):1–17 Barman S, Samanta D, Chattopadhyay S (2015) Fingerprint-based crypto-biometric system for network security. EURASIP J Inform Sec 2015(1):1–17
16.
go back to reference Vijayakumar T (2021) Synthesis of palm print in feature fusion techniques for multimodal biometric recognition system online signature. J Innov Image Process (JIIP) 3(02):131–143CrossRef Vijayakumar T (2021) Synthesis of palm print in feature fusion techniques for multimodal biometric recognition system online signature. J Innov Image Process (JIIP) 3(02):131–143CrossRef
17.
go back to reference Smys S, Wang H (2021) Data elimination on repetition using a blockchain based cyber threat intelligence. IRO J Sustain Wirel Syst 2(4):149–154 Smys S, Wang H (2021) Data elimination on repetition using a blockchain based cyber threat intelligence. IRO J Sustain Wirel Syst 2(4):149–154
18.
go back to reference Gilbile A, Ganjewar PD. Design of secure biometric using cancelable techniques. In: Springer international conference on data science, machine learning and applications (ICDSMLA 2020). EBook ISBN 978-981-16-3690-5, Hardcover ISBN 978-981-16-3689-9. http://doi.org/10.1007/978-981-16-3690-5 Gilbile A, Ganjewar PD. Design of secure biometric using cancelable techniques. In: Springer international conference on data science, machine learning and applications (ICDSMLA 2020). EBook ISBN 978-981-16-3690-5, Hardcover ISBN 978-981-16-3689-9. http://​doi.​org/​10.​1007/​978-981-16-3690-5
Metadata
Title
Privacy Threat Reduction Using Modified Multi-line Code Generation Algorithm (MMLCGA) for Cancelable Biometric Technique (CBT)
Authors
Pramod D. Ganjewar
Sanjeev J. Wagh
Aarti L. Gilbile
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-18497-0_21

Premium Partner