Skip to main content

A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme

  • Conference paper
  • First Online:
Book cover Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

Abstract

The emergence of biometrics and it’s widespread use in authentication applications made template protection in biometrics an important task to be considered in recent years. In this paper we propose a fingerprint bio-cryptosystem using fuzzy commitment scheme. We constructed Delaunay Neighbor Structures(DNS) from fingerprint minutiae points. Then a bit string representation of DNSs was developed. Bose, Chaudhuri, and Hocquenghem(BCH) error correction code is used along with bit string in the fuzzy commitment scheme to generate a secure template. During decoding phase, BCH decoding is performed to get the codeword. The EER obtained for proposed method on FVC 2002 DB1, DB2 and DB3 are 1.43%, 1.79%, and 5.89% respectively. This shows the credibility of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arakala, A., Jeffers, J., Horadam, K.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Advances in Biometrics, vol. 4642, pp. 760–769 (2007)

    Google Scholar 

  2. Isa, M.A.M., Ahmad, M.M., Sani, N.F.M., Hashim, H., Mahmod, R.: Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine. Procedia Computer Science 42, 263–270 (2014)

    Article  Google Scholar 

  3. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process., 113:1–113:17 (2008)

    Google Scholar 

  4. Jin, Z., Lim, M.H., Teoh, A.B.J., Goi, B.M.: A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters 42, 137–147 (2014)

    Article  Google Scholar 

  5. Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  6. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 28–36. ACM (1999)

    Google Scholar 

  7. Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. Journal of Network and Computer Applications 33(3), 236–246 (2010)

    Article  Google Scholar 

  8. Leng, L., Teoh, A.B.J.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recognition 48(7), 2290–2303 (2015)

    Article  Google Scholar 

  9. Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33(3), 207–220 (2010)

    Article  Google Scholar 

  10. Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39(7), 6562–6574 (2012)

    Article  Google Scholar 

  11. Lin, S., Costello, D.J.: Error control coding. Prentice Hall (1982)

    Google Scholar 

  12. Liu, E., Liang, J., Pang, L., Xie, M., Tian, J.: Minutiae and modified biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications 33(3), 221–235 (2010)

    Article  Google Scholar 

  13. Prasad, M.V.N.K., Swathi, P., Rao, C.R., Deekshatulu, B.L.: Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. International Journal of Pattern Recognition and Artificial Intelligence 28(06), 1456013 (2014)

    Article  Google Scholar 

  14. Prasad, M.V.N.K., Kumar, C.S.: Fingerprint template protection using multiline neighboring relation. Expert Systems with Applications 41(14), 6114–6122 (2014)

    Article  Google Scholar 

  15. Neurotechnology VeriFinger SDK: http://www.neurotechnology.com (accessed December 11, 2013)

  16. Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  17. Sandhya, M., Prasad, M.V.N.K.: k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection. In: International Conference on Biometrics (ICB), 2015, pp. 386–393 (2015)

    Google Scholar 

  18. Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633 (2004)

    Google Scholar 

  19. Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition 47(3), 1309–1320 (2014)

    Article  Google Scholar 

  20. Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security, vol. 8300, pp. 81–91 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mulagala Sandhya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Sandhya, M., Prasad, M.V.N.K. (2016). A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics