Skip to main content
Erschienen in: Journal of Medical Systems 5/2019

01.05.2019 | Image & Signal Processing

A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault

verfasst von: V. Sujitha, D. Chitra

Erschienen in: Journal of Medical Systems | Ausgabe 5/2019

Einloggen, um Zugang zu erhalten

Abstract

Biometric authentication is the process of recognizing a person by means of his\her psychological or behavioral traits. One of the most important issues faced by the biometric system developer is to protect the template obtained from the biometric of a person. Unimodal biometric system has some drawbacks such as noisy data, interclass variations and spoof attack. Multimodal biometric system has been developed to address the boundaries of unimodal biometric system and increase the security of template. In this paper, template security analysis of multimodal biometric system based of fingerprint and palmprint is proposed and implemented. Fuzzy vault scheme is employed to protect both the fingerprint and palmprint template. At enrollment, image processing techniques such as image enhancement, segmentation and bottom-hat filtering are applied on both the biometric to improve the quality and subsequently the most important features are extracted. Extracted features are concatenated. Combined features along with secret key are utilized to generate the database in the vault. During authentication, query images are sent as an input with the stored template to recover the key. Experimental results are shown that the proposed multi biometrics system performs well than the other methods considered for comparison.
Literatur
1.
Zurück zum Zitat Fu, B., Yang, S. X., Li, J., and Hu, D., Multibiometric Cryptosystem: Model Structure and Performance Analysis. IEEE Transactions on Information Forensics and Security 4(4):867–882, 2009.CrossRef Fu, B., Yang, S. X., Li, J., and Hu, D., Multibiometric Cryptosystem: Model Structure and Performance Analysis. IEEE Transactions on Information Forensics and Security 4(4):867–882, 2009.CrossRef
2.
Zurück zum Zitat Brindha, V. E., and Natarajan, A. M., Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault. Journal of Biometrics & Biostatistics 3(6):1–6, 2012.CrossRef Brindha, V. E., and Natarajan, A. M., Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault. Journal of Biometrics & Biostatistics 3(6):1–6, 2012.CrossRef
3.
Zurück zum Zitat Sanjekar, J. B., and Patil, P. S., An Overview of Multimodal Biometrics, Signal & Image Processing. An International Journal (SIPIJ) 4(1):57–64, 2013. Sanjekar, J. B., and Patil, P. S., An Overview of Multimodal Biometrics, Signal & Image Processing. An International Journal (SIPIJ) 4(1):57–64, 2013.
4.
Zurück zum Zitat Mishra, A., Multimodal Biometrics it is: Need for Future System. Int. J. Comput. Appl. 3(4):28–33, 2010. Mishra, A., Multimodal Biometrics it is: Need for Future System. Int. J. Comput. Appl. 3(4):28–33, 2010.
5.
Zurück zum Zitat Prakash, S. M., Betty, P., and Sivanarulselvan, K., Fusion of Multimodal Biometrics using Feature and Score Level Fusion. International Journal on Applications in Information and Communication Engineering 2(4):52–56, 2016. Prakash, S. M., Betty, P., and Sivanarulselvan, K., Fusion of Multimodal Biometrics using Feature and Score Level Fusion. International Journal on Applications in Information and Communication Engineering 2(4):52–56, 2016.
6.
Zurück zum Zitat Nagar, A., Nandhakumar, K., and Jain, A. K., Multibiometric cryptosystem based on feature level fusion. IEEE Transaction on Information Forensics and Security 7(1):255–268, 2012.CrossRef Nagar, A., Nandhakumar, K., and Jain, A. K., Multibiometric cryptosystem based on feature level fusion. IEEE Transaction on Information Forensics and Security 7(1):255–268, 2012.CrossRef
7.
Zurück zum Zitat Juels, A., and Sudan, M., A fuzzy vault scheme. Des. Codes Crypt. 38(2):237–257, 2006.CrossRef Juels, A., and Sudan, M., A fuzzy vault scheme. Des. Codes Crypt. 38(2):237–257, 2006.CrossRef
8.
Zurück zum Zitat Juels, A., and Wattenberg, M., A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, New York: ACM, 28–36, 1999. Juels, A., and Wattenberg, M., A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, New York: ACM, 28–36, 1999.
9.
Zurück zum Zitat Draper, S., Khisti, A., Martinian, E., Vetro, A., and Yedidia, J. S., Using distributed source coding to secure fingerprint biometrics. IEEE International Conference on Acoustics, Speech and Signal Processing, IN-9582274, 2007. Draper, S., Khisti, A., Martinian, E., Vetro, A., and Yedidia, J. S., Using distributed source coding to secure fingerprint biometrics. IEEE International Conference on Acoustics, Speech and Signal Processing, IN-9582274, 2007.
10.
Zurück zum Zitat Dodis, Y., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in cryptology-Euro crypt, Springer Berlin Heidelberg, 523–540, 2004.CrossRef Dodis, Y., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in cryptology-Euro crypt, Springer Berlin Heidelberg, 523–540, 2004.CrossRef
11.
Zurück zum Zitat Uludag, U., and Jain, A. K., Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of IEEE Workshop on Privacy Research in Vision, pp. 163–169, 2006. Uludag, U., and Jain, A. K., Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of IEEE Workshop on Privacy Research in Vision, pp. 163–169, 2006.
12.
Zurück zum Zitat Orencik, C., Fuzzy vault scheme for fingerprint verification: implementation, analysis and improvements. Sabanci University, pp. 1–50, 2008. Orencik, C., Fuzzy vault scheme for fingerprint verification: implementation, analysis and improvements. Sabanci University, pp. 1–50, 2008.
13.
Zurück zum Zitat NandaKumar, K., Multibiometric systems: fusion strategies and template security. PhD Thesis, Department of Computer Science and Engineering, Michigan State University, 2008. NandaKumar, K., Multibiometric systems: fusion strategies and template security. PhD Thesis, Department of Computer Science and Engineering, Michigan State University, 2008.
14.
Zurück zum Zitat Vinothkanna, R., and Wahi, A., Fuzzy Vault Fusion Based Multimodal Biometric Human Recognition System with Fingerprint and Ear. J. Theor. Appl. Inf. Technol. 59(2):304–316, 2014. Vinothkanna, R., and Wahi, A., Fuzzy Vault Fusion Based Multimodal Biometric Human Recognition System with Fingerprint and Ear. J. Theor. Appl. Inf. Technol. 59(2):304–316, 2014.
15.
Zurück zum Zitat Selwal, A., Gupta, S. K., and Kumar, S., A Scheme for Template Security at Feature Fusion Level in Multimodal Biometric System. Advances in Science and Technology 10(31):23–30, 2016. Selwal, A., Gupta, S. K., and Kumar, S., A Scheme for Template Security at Feature Fusion Level in Multimodal Biometric System. Advances in Science and Technology 10(31):23–30, 2016.
16.
Zurück zum Zitat Bhowmik, P., Bhowmik, K., Azam, M. N., and Rony, M. W., Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5):117–121, 2012. Bhowmik, P., Bhowmik, K., Azam, M. N., and Rony, M. W., Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5):117–121, 2012.
17.
Zurück zum Zitat Tatar, F., and Machhout, M., Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2):1–16, 2017. Tatar, F., and Machhout, M., Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2):1–16, 2017.
18.
Zurück zum Zitat Tam, B., Mihăilescu, P., and Munk, A., Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5):985–998, 2015.CrossRef Tam, B., Mihăilescu, P., and Munk, A., Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5):985–998, 2015.CrossRef
19.
Zurück zum Zitat Malik, J., Sainarayanan, G., and Dahiya, R., Personal Authentication using Palmprint with Sobel Code, Canny Edge and Phase Congruency Feature Extraction Method. ICTACT Journal on Image and Video Processing 2(3):357–368, 2012.CrossRef Malik, J., Sainarayanan, G., and Dahiya, R., Personal Authentication using Palmprint with Sobel Code, Canny Edge and Phase Congruency Feature Extraction Method. ICTACT Journal on Image and Video Processing 2(3):357–368, 2012.CrossRef
20.
Zurück zum Zitat Bruno, A., Carminetti, P., Gentile, V, La Cascia, M., and Mancino, E., Palmprint principal lines extraction. In the proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, BIOMS, 2014. Bruno, A., Carminetti, P., Gentile, V, La Cascia, M., and Mancino, E., Palmprint principal lines extraction. In the proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, BIOMS, 2014.
21.
Zurück zum Zitat Jain, K., Nandakumar, K., and Nagar, A., Biometric template security. EURASIP Journal on Advances in Signal Processing:1–17, 2008. Jain, K., Nandakumar, K., and Nagar, A., Biometric template security. EURASIP Journal on Advances in Signal Processing:1–17, 2008.
22.
Zurück zum Zitat Nandakumar, K., Jain, A. K., and Pankanti, S., Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4):744–757, 2007.CrossRef Nandakumar, K., Jain, A. K., and Pankanti, S., Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4):744–757, 2007.CrossRef
23.
Zurück zum Zitat Meenakshia, V. S., and Padmavathi, G., Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc, Computer. Science. 2:195–206, 2010.CrossRef Meenakshia, V. S., and Padmavathi, G., Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc, Computer. Science. 2:195–206, 2010.CrossRef
24.
Zurück zum Zitat Kholmatov, A., and Yanikoglu, B., Realization of correlation attack against the fuzzy vault scheme. Proc. SPIE 6819:681900–681907, 2008. Kholmatov, A., and Yanikoglu, B., Realization of correlation attack against the fuzzy vault scheme. Proc. SPIE 6819:681900–681907, 2008.
Metadaten
Titel
A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault
verfasst von
V. Sujitha
D. Chitra
Publikationsdatum
01.05.2019
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2019
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-019-1220-x

Weitere Artikel der Ausgabe 5/2019

Journal of Medical Systems 5/2019 Zur Ausgabe