Abstract
In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. To guarantee the integrity/confidentiality of the fingerprint images transmitted, a standard encryption algorithm is employed. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity/confidentiality of the fingerprint images can be guaranteed without any leakage of the ridge information. Also, the image-based selective bitplane encryption can be completed in real-time on embedded processors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jain, A., Bole, R., Panakanti, S.: Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, Dordrecht (1999)
Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Im, S., et al.: A Direction-Based Vascular Pattern Extraction Algorithm for Hand Vascular Pattern Verification. ETRI Journal 25(2), 101–108 (2003)
Lee, K., et al.: A New Similarity Measure Based on Intraclass Statistics for Biometric Systems. ETRI Journal 25(5), 401–406 (2003)
Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)
Ratha, N., Connell, J., Bolle, R.: An analysis of minutiae matching strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)
Stallings, W.: Cryptography and Network Security. Pearson Ed. Inc., London (2003)
Moon, D., et al.: Performance Analysis of the Match-on-Card System for the Fingerprint Authentication. In: Proc. of International Workshop on Information Security Applications, pp. 449–459 (2001)
Moon, Y., et al.: Collaborative Fingerprint Authentication by Smart Card and a Trusted Host. Electrical and Computer Engineering 1, 108–112 (2000)
Pan, S., et al.: A Memory-Efficient Fingerprint Verification Algorithm using A Multi-Resolution Accumulator Array for Match-on-Card. ETRI Journal 25(3), 179–186 (2003)
Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)
Jain, A., Prabhakar, S., Ross, A.: Biometrics-based Web Access. Technical Report, Michigan State U. (1998)
Rila, L., Mitchell, C.: Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication. In: Proc. of CARDIS, pp. 19–28 (2002)
Yeung, M., Pankanti, S.: Verification Watermarks on Fingerprint Recognition and Retrieval. Journal of Electronic Imaging 9(4), 468–476 (2002)
Jain, A., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proc. of AutoID, pp. 97–102 (2002)
Davida, G., et al.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)
Podesser, M., Schmidt, H., Uhl, A.: Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments. In: Proc. of the 5th IEEE Nordic Signal Processing Symposium (2002)
Gonzalez, R.: Digital Image Processing. Addison Wesley, Reading (1992)
NiGen, http://www.nitgen.com
Hachez, G., Koeune, F., Quisquater, J.: cAESar Results: Implementation of Four AES Candidates on Two Smart Cards. In: Proc. of the Second AES Conference (1999)
Moon, D., et al.: The Implementation of the USB Token System for Fingerprint Verification. In: Bigun, J., Gustavsson, T. (eds.) SCIA 2003. LNCS, vol. 2749, pp. 998–1005. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moon, D., Chung, Y., Moon, K., Pan, S. (2005). Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. In: Kamel, M., Campilho, A. (eds) Image Analysis and Recognition. ICIAR 2005. Lecture Notes in Computer Science, vol 3656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11559573_134
Download citation
DOI: https://doi.org/10.1007/11559573_134
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29069-8
Online ISBN: 978-3-540-31938-2
eBook Packages: Computer ScienceComputer Science (R0)