Skip to main content

Cancelable Fingerprint Cryptosystem Based on Convolution Coding

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

In this paper we propose a fingerprint bio-cryptosystem with cancelability using fuzzy commitment scheme. The minutiae of a fingerprint are transformed using Delaunay triangulation net constructed from fingerprint minutiae. Further, these transformed features are encrypted using convolution coding. During decoding phase, the Viterbi algorithm is used to get the codeword. Experimental evaluation done on FVC 2002 databases show the credibility of the proposed method. The EER obtained for the proposed method is 1.66%, 1.89% and 6.87% for FVC 2002 DB1, DB2, and DB3 respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Benhammadi, F., Bey, K.B.: Password hardened fuzzy vault for fingerprint authentication system. Image and Vision Computing 32(8), 487–496 (2014)

    Article  Google Scholar 

  2. Fingerprint Verification Competetion: http://bias.csr.unibo.it/fvc2002 (accessed January 30, 2014)

  3. Isa, M.A.M., Ahmad, M.M., Sani, N.F.M., Hashim, H., Mahmod, R.: Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine. Procedia Computer Science 42, 263–270 (2014)

    Article  Google Scholar 

  4. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process., 113:1–113:17 (2008)

    Google Scholar 

  5. Jin, Z., Lim, M.H., Teoh, A.B.J., Goi, B.M.: A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters 42, 137–147 (2014)

    Article  Google Scholar 

  6. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory, 2002, p. 408 (2002)

    Google Scholar 

  7. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 28–36. ACM (1999)

    Google Scholar 

  8. Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. Journal of Network and Computer Applications 33(3), 236–246 (2010)

    Article  Google Scholar 

  9. Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39(7), 6562–6574 (2012)

    Article  Google Scholar 

  10. Lin, S., Costello, D.J.: Error control coding. Prentice Hall (1982)

    Google Scholar 

  11. Liu, E., Liang, J., Pang, L., Xie, M., Tian, J.: Minutiae and modified biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications 33(3), 221–235 (2010). Recent Advances and Future Directions in Biometrics Personal Identification

    Article  Google Scholar 

  12. Mihailescu, M.I.: New enrollment scheme for biometric template using hash chaos-based cryptography. Procedia Engineering 69, 1459–1468 (2014)

    Article  MathSciNet  Google Scholar 

  13. Prasad, M.V.N.K., Swathi, P., Rao, C.R., Deekshatulu, B.L.: Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. International Journal of Pattern Recognition and Artificial Intelligence 28(06), 1456013 (2014)

    Article  Google Scholar 

  14. Prasad, M.V.N.K., Kumar, C.S.: Fingerprint template protection using multiline neighboring relation. Expert Systems with Applications 41(14), 6114–6122 (2014)

    Article  Google Scholar 

  15. Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters 31(8), 733–741 (2010)

    Article  Google Scholar 

  16. Neurotechnology VeriFinger SDK: http://www.neurotechnology.com (accessed December 11, 2013)

  17. Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  18. Ratha, N., Connell, J., Bolle, R.: An analysis of minutiae matching strength. In: Audio- and Video-Based Biometric Person Authentication. Lecture Notes in Computer Science, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)

    Google Scholar 

  19. Sandhya, M., Prasad, M.V.N.K.: k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection. In: International Conference on Biometrics (ICB), 2015, pp. 386–393 (2015)

    Google Scholar 

  20. Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VI. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 5306, pp. 622–633 (2004)

    Google Scholar 

  21. Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition 47(3), 1309–1320 (2014)

    Article  Google Scholar 

  22. Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Lecture Notes in Computer Science, vol. 8300, pp. 81–91. Springer International Publishing (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mulagala Sandhya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sandhya, M., Prasad, M.V.N.K. (2016). Cancelable Fingerprint Cryptosystem Based on Convolution Coding. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics