Skip to main content

Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors

  • Conference paper
  • 1272 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 3656))

Abstract

In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. To guarantee the integrity/confidentiality of the fingerprint images transmitted, a standard encryption algorithm is employed. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity/confidentiality of the fingerprint images can be guaranteed without any leakage of the ridge information. Also, the image-based selective bitplane encryption can be completed in real-time on embedded processors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Bole, R., Panakanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)

    Google Scholar 

  2. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  3. Im, S., et al.: A Direction-Based Vascular Pattern Extraction Algorithm for Hand Vascular Pattern Verification. ETRI Journal 25(2), 101–108 (2003)

    Article  MathSciNet  Google Scholar 

  4. Lee, K., et al.: A New Similarity Measure Based on Intraclass Statistics for Biometric Systems. ETRI Journal 25(5), 401–406 (2003)

    Article  Google Scholar 

  5. Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  6. Ratha, N., Connell, J., Bolle, R.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Stallings, W.: Cryptography and Network Security. Pearson Ed. Inc., London (2003)

    Google Scholar 

  8. Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)

    Google Scholar 

  9. Moon, Y., et al.: Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. Electrical and Computer Engineering 1, 108–112 (2000)

    Google Scholar 

  10. Pan, S., et al.: A Memory-Efficient Fingerprint Verification Algorithm using A Multi-Resolution Accumulator Array for Match-on-Card. ETRI Journal 25(3), 179–186 (2003)

    Article  Google Scholar 

  11. Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)

    Google Scholar 

  12. Jain, A., Prabhakar, S., Ross, A.: Biometrics-based Web Access. Technical Report, Michigan State U. (1998)

    Google Scholar 

  13. Rila, L., Mitchell, C.: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. In: Proc. of CARDIS, pp. 19–28 (2002)

    Google Scholar 

  14. Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging 9(4), 468–476 (2002)

    Article  Google Scholar 

  15. Jain, A., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proc. of AutoID, pp. 97–102 (2002)

    Google Scholar 

  16. Davida, G., et al.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)

    Google Scholar 

  17. Podesser, M., Schmidt, H., Uhl, A.: Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: Proc. of the 5th IEEE Nordic Signal Processing Symposium (2002)

    Google Scholar 

  18. Gonzalez, R.: Digital Image Processing. Addison Wesley, Reading (1992)

    Google Scholar 

  19. NiGen, http://www.nitgen.com

  20. Hachez, G., Koeune, F., Quisquater, J.: cAESar Results: Implementation of Four AES Candidates on Two Smart Cards. In: Proc. of the Second AES Conference (1999)

    Google Scholar 

  21. Moon, D., et al.: The Implementation of the USB Token System for Fingerprint Verification. In: Bigun, J., Gustavsson, T. (eds.) SCIA 2003. LNCS, vol. 2749, pp. 998–1005. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Moon, D., Chung, Y., Moon, K., Pan, S. (2005). Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2005. Lecture Notes in Computer Science, vol 3656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559573_134

Download citation

  • DOI: https://doi.org/10.1007/11559573_134

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29069-8

  • Online ISBN: 978-3-540-31938-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics