Abstract
In this paper we propose a fingerprint bio-cryptosystem with cancelability using fuzzy commitment scheme. The minutiae of a fingerprint are transformed using Delaunay triangulation net constructed from fingerprint minutiae. Further, these transformed features are encrypted using convolution coding. During decoding phase, the Viterbi algorithm is used to get the codeword. Experimental evaluation done on FVC 2002 databases show the credibility of the proposed method. The EER obtained for the proposed method is 1.66%, 1.89% and 6.87% for FVC 2002 DB1, DB2, and DB3 respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Benhammadi, F., Bey, K.B.: Password hardened fuzzy vault for fingerprint authentication system. Image and Vision Computing 32(8), 487–496 (2014)
Fingerprint Verification Competetion: http://bias.csr.unibo.it/fvc2002 (accessed January 30, 2014)
Isa, M.A.M., Ahmad, M.M., Sani, N.F.M., Hashim, H., Mahmod, R.: Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine. Procedia Computer Science 42, 263–270 (2014)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process., 113:1–113:17 (2008)
Jin, Z., Lim, M.H., Teoh, A.B.J., Goi, B.M.: A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters 42, 137–147 (2014)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory, 2002, p. 408 (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 28–36. ACM (1999)
Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. Journal of Network and Computer Applications 33(3), 236–246 (2010)
Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39(7), 6562–6574 (2012)
Lin, S., Costello, D.J.: Error control coding. Prentice Hall (1982)
Liu, E., Liang, J., Pang, L., Xie, M., Tian, J.: Minutiae and modified biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications 33(3), 221–235 (2010). Recent Advances and Future Directions in Biometrics Personal Identification
Mihailescu, M.I.: New enrollment scheme for biometric template using hash chaos-based cryptography. Procedia Engineering 69, 1459–1468 (2014)
Prasad, M.V.N.K., Swathi, P., Rao, C.R., Deekshatulu, B.L.: Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. International Journal of Pattern Recognition and Artificial Intelligence 28(06), 1456013 (2014)
Prasad, M.V.N.K., Kumar, C.S.: Fingerprint template protection using multiline neighboring relation. Expert Systems with Applications 41(14), 6114–6122 (2014)
Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters 31(8), 733–741 (2010)
Neurotechnology VeriFinger SDK: http://www.neurotechnology.com (accessed December 11, 2013)
Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Ratha, N., Connell, J., Bolle, R.: An analysis of minutiae matching strength. In: Audio- and Video-Based Biometric Person Authentication. Lecture Notes in Computer Science, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)
Sandhya, M., Prasad, M.V.N.K.: k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection. In: International Conference on Biometrics (ICB), 2015, pp. 386–393 (2015)
Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VI. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, vol. 5306, pp. 622–633 (2004)
Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition 47(3), 1309–1320 (2014)
Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Lecture Notes in Computer Science, vol. 8300, pp. 81–91. Springer International Publishing (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Sandhya, M., Prasad, M.V.N.K. (2016). Cancelable Fingerprint Cryptosystem Based on Convolution Coding. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)