Skip to main content
Erschienen in: Soft Computing 7/2018

21.01.2017 | Methodologies and Application

Finger vein secure biometric template generation based on deep learning

verfasst von: Yi Liu, Jie Ling, Zhusong Liu, Jian Shen, Chongzhi Gao

Erschienen in: Soft Computing | Ausgabe 7/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Leakage of unprotected biometric authentication data has become a high-risk threat for many applications. Lots of researchers are investigating and designing novel authentication schemes to prevent such attacks. However, the biggest challenge is how to protect biometric data while keeping the practical performance of identity verification systems. For the sake of tackling this problem, this paper presents a novel finger vein recognition algorithm by using secure biometric template scheme based on deep learning and random projections, named FVR-DLRP. FVR-DLRP preserves the core biometric information even with the user’s password cracked, whereas the original biometric information is still safe. The results of experiment show that the algorithm FVR-DLRP can maintain the accuracy of biometric identification while enhancing the uncertainty of the transformation, which provides better protection for biometric authentication.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Ang R, Safavi-Naini R, Mcaven L (2005) Cancelable key-based fingerprint templates. In: Proceedings of the Australasian conference information security and privacy (ACISP 2005), Brisbane, Australia, July 4–6, 2005, pp 242–252 Ang R, Safavi-Naini R, Mcaven L (2005) Cancelable key-based fingerprint templates. In: Proceedings of the Australasian conference information security and privacy (ACISP 2005), Brisbane, Australia, July 4–6, 2005, pp 242–252
Zurück zum Zitat Chen C, Wu Z, Li P, Zhang J, Wang Y, Li H (2015) A finger vein recognition algorithm using feature block fusion and depth neural network. In: International symposium on intelligence computation and applications, Springer, Berlin, pp 572–583 Chen C, Wu Z, Li P, Zhang J, Wang Y, Li H (2015) A finger vein recognition algorithm using feature block fusion and depth neural network. In: International symposium on intelligence computation and applications, Springer, Berlin, pp 572–583
Zurück zum Zitat Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403–1416MathSciNetCrossRef Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403–1416MathSciNetCrossRef
Zurück zum Zitat Hinton GE (2010) A practical guide to training restricted Boltzmann machines. Momentum 9(1):599–619 Hinton GE (2010) A practical guide to training restricted Boltzmann machines. Momentum 9(1):599–619
Zurück zum Zitat Jain AK, Ross A, Uludag U (2005) Biometric template security: Challenges and solutions. In: 2005 13th European signal processing conference. IEEE, pp 1–4 Jain AK, Ross A, Uludag U (2005) Biometric template security: Challenges and solutions. In: 2005 13th European signal processing conference. IEEE, pp 1–4
Zurück zum Zitat Kong A, Zhang D, Kamel M (2008) Three measures for secure palmprint identification. Pattern Recogn 41(4):1329–1337CrossRef Kong A, Zhang D, Kamel M (2008) Three measures for secure palmprint identification. Pattern Recogn 41(4):1329–1337CrossRef
Zurück zum Zitat Li X, Guo S, Gao F, Li Y (2007) Vein pattern recognitions by moment invariants. In: The international conference on bioinformatics and biomedical engineering, pp 612–615 Li X, Guo S, Gao F, Li Y (2007) Vein pattern recognitions by moment invariants. In: The international conference on bioinformatics and biomedical engineering, pp 612–615
Zurück zum Zitat Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2013) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRef Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2013) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRef
Zurück zum Zitat Li J, Li X, Yang B, Sun X (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRef Li J, Li X, Yang B, Sun X (2015a) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensics Secur 10(3):507–518CrossRef
Zurück zum Zitat Li J, Li YK, Chen X, Lee P, Lou W (2015b) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216CrossRef Li J, Li YK, Chen X, Lee P, Lou W (2015b) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216CrossRef
Zurück zum Zitat Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971CrossRef Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971CrossRef
Zurück zum Zitat Liu Z, Yin Y, Wang H, Song S, Li Q (2010) Finger vein recognition with manifold learning. J Netw Comput Appl 33(3):275–282CrossRef Liu Z, Yin Y, Wang H, Song S, Li Q (2010) Finger vein recognition with manifold learning. J Netw Comput Appl 33(3):275–282CrossRef
Zurück zum Zitat Maio D, Nanni L (2005) Multihashing, human authentication featuring biometrics data and tokenized random number: a case study fvc2004. Neurocomputing 69(1):242–249CrossRef Maio D, Nanni L (2005) Multihashing, human authentication featuring biometrics data and tokenized random number: a case study fvc2004. Neurocomputing 69(1):242–249CrossRef
Zurück zum Zitat Maiorana E (2010) Biometric cryptosystem using function based on-line signature recognition. Expert Syst Appl 37(4):3454–3461CrossRef Maiorana E (2010) Biometric cryptosystem using function based on-line signature recognition. Expert Syst Appl 37(4):3454–3461CrossRef
Zurück zum Zitat Nanni L, Lumini A (2008) Random subspace for an improved biohashing for face authentication. Pattern Recognit Lett 29(3):295–300CrossRefMATH Nanni L, Lumini A (2008) Random subspace for an improved biohashing for face authentication. Pattern Recognit Lett 29(3):295–300CrossRefMATH
Zurück zum Zitat Pankanti S, Jain A, Hong L (2000) Biometrics: promising frontiers for emerging identification market. Comm ACM 43:91–98 Pankanti S, Jain A, Hong L (2000) Biometrics: promising frontiers for emerging identification market. Comm ACM 43:91–98
Zurück zum Zitat Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: International symposium on computer science and computational technology, pp 572–575 Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: International symposium on computer science and computational technology, pp 572–575
Zurück zum Zitat Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634CrossRef
Zurück zum Zitat Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572CrossRef Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572CrossRef
Zurück zum Zitat Rua EA, Maiorana E, Castro JLA, Campisi P (2012) Biometric template protection using universal background models: an application to online signature. IEEE Trans Inf Forensics Secur 7(1):269–282CrossRef Rua EA, Maiorana E, Castro JLA, Campisi P (2012) Biometric template protection using universal background models: an application to online signature. IEEE Trans Inf Forensics Secur 7(1):269–282CrossRef
Zurück zum Zitat Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178 Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171–178
Zurück zum Zitat Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960CrossRef Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960CrossRef
Zurück zum Zitat Wang KJ (2007) Finger vein recognition based on wavelet moment fused with PCA transform. Pattern Recognit Artif Intell 20(5):692–697 Wang KJ (2007) Finger vein recognition based on wavelet moment fused with PCA transform. Pattern Recognit Artif Intell 20(5):692–697
Zurück zum Zitat Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684CrossRef Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput Sci Inf Syst 10(2):667–684CrossRef
Zurück zum Zitat Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406CrossRef Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395–406CrossRef
Zurück zum Zitat Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918CrossRef Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918CrossRef
Zurück zum Zitat Wu Z, Yu Z, Yuan J, Zhang J (2016b) A twice face recognition algorithm. Soft Comput 20(3):1007–1019CrossRef Wu Z, Yu Z, Yuan J, Zhang J (2016b) A twice face recognition algorithm. Soft Comput 20(3):1007–1019CrossRef
Zurück zum Zitat Wu Z, Yuan J, Zhang J, Huang H (2016c) A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation. J Ambient Intell Human Comput 7(2):229–238CrossRef Wu Z, Yuan J, Zhang J, Huang H (2016c) A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation. J Ambient Intell Human Comput 7(2):229–238CrossRef
Zurück zum Zitat Yan F, Tan Y, Zhang Q, Wu F, Cheng Z, Zheng J (2016) An effective raid data layout for object-based de-duplication backup system. Chin J Electron 25(5):832–840CrossRef Yan F, Tan Y, Zhang Q, Wu F, Cheng Z, Zheng J (2016) An effective raid data layout for object-based de-duplication backup system. Chin J Electron 25(5):832–840CrossRef
Zurück zum Zitat Zheng Y, Byeungwoo J, Xu D, Wu QMJ, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy c-means algorithm. J Intell Fuzzy Syst 28(2):4024–4028 Zheng Y, Byeungwoo J, Xu D, Wu QMJ, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy c-means algorithm. J Intell Fuzzy Syst 28(2):4024–4028
Zurück zum Zitat Zhu R, Ya Tan, Zhang Q, Fei W, Zheng J, Yuan X (2016a) Determining image base of firmware files for arm devices. IEICE Trans Inf Syst 99(2):351–359CrossRef Zhu R, Ya Tan, Zhang Q, Fei W, Zheng J, Yuan X (2016a) Determining image base of firmware files for arm devices. IEICE Trans Inf Syst 99(2):351–359CrossRef
Zurück zum Zitat Zhu R, Ya Tan, Zhang Q, Li Y, Zheng J (2016b) Determining image base of firmware for arm devices by matching literal pools. Dig Investig 16:19–28CrossRef Zhu R, Ya Tan, Zhang Q, Li Y, Zheng J (2016b) Determining image base of firmware for arm devices by matching literal pools. Dig Investig 16:19–28CrossRef
Metadaten
Titel
Finger vein secure biometric template generation based on deep learning
verfasst von
Yi Liu
Jie Ling
Zhusong Liu
Jian Shen
Chongzhi Gao
Publikationsdatum
21.01.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 7/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2487-9

Weitere Artikel der Ausgabe 7/2018

Soft Computing 7/2018 Zur Ausgabe