Skip to main content
Top
Published in: Cluster Computing 5/2019

20-01-2018

Security analysis of prealigned fingerprint template using fuzzy vault scheme

Authors: D. Chitra, V. Sujitha

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biometric systems accumulate information from biometric elements of an individual and used to exceptionally confirm the person with the physical and behavioral properties of the biometric characteristic. Biometrics and cryptography systems have been identified as the two main components of digital security system. Cryptography is combined with biometric to achieve high security. In this paper, fingerprint template protection is proposed which is based on fuzzy vault scheme. Initially, enrolled fingerprint images are preprocessed using some image processing techniques and preprocessed images are prealigned automatically using directed reference point. All the minutiae points are extracted and extracted minutiae features along with secret key are used to produce the fuzzy vault. Query features are given as an input with the stored template to recover the corresponding key. The proposed method is validated on FVC 2002 database. Simulation results prove that the proposed method can achieve high genuine acceptance rate with improved security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Liu, H., Sun, D., Xiong, K., Zhengding, Q.: Palm print based multidimensional fuzzy vault scheme. Sci. World J. 2014, 8 (2014) Liu, H., Sun, D., Xiong, K., Zhengding, Q.: Palm print based multidimensional fuzzy vault scheme. Sci. World J. 2014, 8 (2014)
2.
go back to reference Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy Extractors for Minutiae-based Fingerprint Authentication. In: Lee, S.W., Li, S.Z. (eds.) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science. Springer, Berlin (2007) Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy Extractors for Minutiae-based Fingerprint Authentication. In: Lee, S.W., Li, S.Z. (eds.) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science. Springer, Berlin (2007)
3.
go back to reference Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the IEEE International Symposium on Information Theory, pp. 408 (2002) Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the IEEE International Symposium on Information Theory, pp. 408 (2002)
4.
go back to reference Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of the ACM Conference on Computer and Communications Security (ACMCCS ’99), pp. 28–36 (1999) Juels, A., Wattenberg, M.: Fuzzy commitment scheme. In: Proceedings of the ACM Conference on Computer and Communications Security (ACMCCS ’99), pp. 28–36 (1999)
5.
go back to reference Sapkal, S., Deshmukh, R.: Biometric template protection with fuzzy vault and fuzzy commitment. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, pp. 1–6. https://doi.org/10.1145/2905055.2905118 (2016) Sapkal, S., Deshmukh, R.: Biometric template protection with fuzzy vault and fuzzy commitment. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ACM, pp. 1–6. https://​doi.​org/​10.​1145/​2905055.​2905118 (2016)
6.
go back to reference Hidano, S., Tetsushi, O., Takahashi, K.: Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. In: Proceedings of the International Conference of the Biometrics Compendium, Darmstadt, Germany. pp. 1–6 (2012) Hidano, S., Tetsushi, O., Takahashi, K.: Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. In: Proceedings of the International Conference of the Biometrics Compendium, Darmstadt, Germany. pp. 1–6 (2012)
7.
go back to reference Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)CrossRef Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)CrossRef
8.
go back to reference Tam, B., Mihăilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015)CrossRef Tam, B., Mihăilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015)CrossRef
9.
go back to reference Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: Proceedings of the Biometrics Symposium (BSYM ’07), (2007) Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: Proceedings of the Biometrics Symposium (BSYM ’07), (2007)
10.
go back to reference Lee, Y.J., Park, K.R., Lee, S.J., Bae, K., Kim, J.: A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans. Syst. Man Cybern. B 38(5), 1302–1313 (2008)CrossRef Lee, Y.J., Park, K.R., Lee, S.J., Bae, K., Kim, J.: A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans. Syst. Man Cybern. B 38(5), 1302–1313 (2008)CrossRef
11.
go back to reference Kumar, L.R., Kumar, S.S., Prasad, J.R., et al.: Fingerprint minutia match using bifurcation technique. Int. J. Comput. Sci. Commun. Netw. 2(4), 478–486 (2012) Kumar, L.R., Kumar, S.S., Prasad, J.R., et al.: Fingerprint minutia match using bifurcation technique. Int. J. Comput. Sci. Commun. Netw. 2(4), 478–486 (2012)
12.
go back to reference Bhowmik, P., Bhowmik, K., Azam, M.N., Rony, M.W.: Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5), 117–121 (2012) Bhowmik, P., Bhowmik, K., Azam, M.N., Rony, M.W.: Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5), 117–121 (2012)
13.
go back to reference Joshua, A., Kwan, P., Gao, J.: Fingerprint Matching Using a Hybrid Shape and Orientation Descriptor. In: Jucheng, Y. (ed.) State of the Art in Biometrics. InTech, London (2011) Joshua, A., Kwan, P., Gao, J.: Fingerprint Matching Using a Hybrid Shape and Orientation Descriptor. In: Jucheng, Y. (ed.) State of the Art in Biometrics. InTech, London (2011)
14.
go back to reference Hatano, T., Adachi, T., Shigematsu, S., Morimura, H., Onishi, S., Okazaki, Y., Kyuragi, H.: A fingerprint verification algorithm using the differential matching rate. In: Proceedings of the 16th International Conference on Pattern Recognition (2002) Hatano, T., Adachi, T., Shigematsu, S., Morimura, H., Onishi, S., Okazaki, Y., Kyuragi, H.: A fingerprint verification algorithm using the differential matching rate. In: Proceedings of the 16th International Conference on Pattern Recognition (2002)
15.
go back to reference Lindoso, A., Entrena, L., Liu Jimenez, J., San Millan, E.: Correlation-based fingerprint matching with orientation field alignment. In: Proceedings of the International conference on Biometrics, pp. 713–721 (2007) Lindoso, A., Entrena, L., Liu Jimenez, J., San Millan, E.: Correlation-based fingerprint matching with orientation field alignment. In: Proceedings of the International conference on Biometrics, pp. 713–721 (2007)
16.
go back to reference Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 17 (2008). Article ID579416CrossRef Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 17 (2008). Article ID579416CrossRef
17.
go back to reference Chopra, J., Upadhyay, D.P.: Various fingerprint enhancements and matching technique. Int. J. Electron. Commun. Eng. 5(3), 279–289 (2012) Chopra, J., Upadhyay, D.P.: Various fingerprint enhancements and matching technique. Int. J. Electron. Commun. Eng. 5(3), 279–289 (2012)
18.
go back to reference Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: Proceedings of the of BIOSIG, pp. 75–86 (2013) Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: Proceedings of the of BIOSIG, pp. 75–86 (2013)
19.
go back to reference Hanoon, M.F.: Contrast fingerprint enhancement based on histogram equalization followed by bit reduction of vector quantization. Int. J. Comput. Sci. Netw. Secur. 11(5), 116–123 (2011) Hanoon, M.F.: Contrast fingerprint enhancement based on histogram equalization followed by bit reduction of vector quantization. Int. J. Comput. Sci. Netw. Secur. 11(5), 116–123 (2011)
20.
go back to reference Barnouti, N.H.: Fingerprint recognition improvement using histogram equalization and compression methods. Int. J. Eng. Res. Gener. Sci. 4(2), 685–692 (2016) Barnouti, N.H.: Fingerprint recognition improvement using histogram equalization and compression methods. Int. J. Eng. Res. Gener. Sci. 4(2), 685–692 (2016)
21.
go back to reference Uludag, U., Jain, A.K.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop Privacy Research Vision, New York, pp. 163 (2006) Uludag, U., Jain, A.K.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop Privacy Research Vision, New York, pp. 163 (2006)
22.
go back to reference Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of the International Conference for Pattern Recognition, Tampa, pp. 1–4 (2008) Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of the International Conference for Pattern Recognition, Tampa, pp. 1–4 (2008)
23.
go back to reference Tatar, F., Machhout, M.: Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2), 1–16 (2017) Tatar, F., Machhout, M.: Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2), 1–16 (2017)
25.
go back to reference Carneiro, R.F.L., Bessa, J.A., de Moraes, J.L., et al.: Techniques of binarization, thinning and feature extraction applied to a fingerprint system. Int. J. Comput. Appl. 103(10), 1–8 (2014) Carneiro, R.F.L., Bessa, J.A., de Moraes, J.L., et al.: Techniques of binarization, thinning and feature extraction applied to a fingerprint system. Int. J. Comput. Appl. 103(10), 1–8 (2014)
26.
go back to reference Singh, R., Shah, U., Gupta, V.: Fingerprint recognition. Student project, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India (2009) Singh, R., Shah, U., Gupta, V.: Fingerprint recognition. Student project, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India (2009)
27.
go back to reference Maio, D., Maltoni, D., Cappelli, R., Wayman, J., Jain, A.: FVC2002: second fingerprint verification competition. In: Proceedings of the International Conference on Pattern Recognition, pp. 811–814 (2002) Maio, D., Maltoni, D., Cappelli, R., Wayman, J., Jain, A.: FVC2002: second fingerprint verification competition. In: Proceedings of the International Conference on Pattern Recognition, pp. 811–814 (2002)
28.
go back to reference Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33, 207–220 (2010)CrossRef Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33, 207–220 (2010)CrossRef
29.
go back to reference Meenakshia, V.S., Padmavathi, G.: Security analysis of password hardened multimodal biometric fuzzy vault. Int. J. Comput. Elect. Autom. Control Inf. Eng. 56, 312–320 (2009) Meenakshia, V.S., Padmavathi, G.: Security analysis of password hardened multimodal biometric fuzzy vault. Int. J. Comput. Elect. Autom. Control Inf. Eng. 56, 312–320 (2009)
30.
go back to reference Meenakshia, V.S., Padmavathi, G.: Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc. Comput. Sci. 2, 195–206 (2010)CrossRef Meenakshia, V.S., Padmavathi, G.: Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc. Comput. Sci. 2, 195–206 (2010)CrossRef
Metadata
Title
Security analysis of prealigned fingerprint template using fuzzy vault scheme
Authors
D. Chitra
V. Sujitha
Publication date
20-01-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1762-6

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner