Skip to main content
Log in

An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Biometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some sort of similarity distance methods. In this paper, Minkowski distance-based matching with Merkle hash tree authentication approach is proposed to overcome the above-mentioned challenges. Merkle hash tree-based encryption algorithm is introduced to improve the privacy concerns, usability and memory durability of the proposed system. This strategy handles security concerns via feature extracted data hashing with the private key. Minutiae feature extraction procedure adequately removes edge-detected features from the sensed data. Notwithstanding the security improvement, the proposed methodology stores just the produced keys for lessening memory stockpiling of cloud framework. Thus, authentication enhancement improves the entire security considerations through the proposed Minkowski distance-based authentication methodology. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the MATLAB simulator. A fingerprint dataset named as NIST Special Database 4 (NIST-4) is used for experimental evaluation. The proposed recognition system has achieved superior accuracy of 100% compared to the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19

    Google Scholar 

  • Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Al-Betar MA (2016) Unsupervised feature selection technique based on genetic algorithm for improving the text clustering. In: 2016 7th international conference on computer science and information technology (CSIT). IEEE, pp 1–6

  • Abualigah LM, Khader AT, Al-Betar MA, Hanandeh ES (2017a) A new hybridization strategy for krill herd algorithm and harmony search algorithm applied to improve the data clustering. Management. https://doi.org/10.4108/eai.27-2-2017.152255

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Al-Betar MA, Alomari OA (2017b) Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering. Expert Syst Appl 84:24–36

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2017c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017d) A novel hybridization strategy for Krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018b) A novel weighting scheme applied to improve the text document clustering techniques. In: Abualigah LM, Khader AT, Hanandeh ES (eds) Innovative computing, optimization and its applications. Springer, Cham, pp 305–320

    Chapter  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018c) A hybrid strategy for krill herd algorithm with harmony search algorithm to improve the data clustering. Intell Decis Technol 12:1–12

    Article  Google Scholar 

  • Abualigah LM, Khader AT, Hanandeh ES (2018d) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071

    Article  Google Scholar 

  • Al-Riyami A, Zhang N, Keane J (2016) Impact of hash value truncation on ID anonymity in wireless sensor networks. Ad Hoc Netw 45(1):80–103

    Article  Google Scholar 

  • Alyasseri ZAA, Khader AT, Al-Betar MA, Abualigah LM (2017) ECG signal denoising using β-hill climbing algorithm and wavelet transform. In: 2017 8th international conference on IEEE information technology (ICIT), pp 96–101

  • Doroz R, Porwik P, Orczyk T (2016) Dynamic sig-nature verification method based on association of features with similarity measures. Neurocomputing 171:921–931

    Article  Google Scholar 

  • Gupta P, Gupta P (2015) An accurate finger vein based verification system. Dig Signal Process 38(1):43–52

    Article  MathSciNet  Google Scholar 

  • Gupta P, Gupta P (2016) An accurate fingerprint orientation modeling algorithm. Appl Math Model 40(15):7182–7194

    Article  MathSciNet  Google Scholar 

  • Jain A, Prasad MV (2016) A novel fingerprint in-dexing scheme using dynamic clustering. J Reliab Intell Environ 2(3):59–171

    Article  Google Scholar 

  • Jiao L, Tang X, Hou B, Wang S (2015) SAR images retrieval based on semantic classification and region-based similarity measure for earth observation. IEEE J Sel Top Appl Earth Obs Remote Sens 8(8):3876–3891

    Article  Google Scholar 

  • Kavsaoğlu AR, Polat K, Bozkurt MR (2014) A novel feature ranking algorithm for biometric recognition with PPG signals. Comput Biol Med 49:1–14

    Article  Google Scholar 

  • Li H (2016) Research on target information fusion identification algorithm in multi-sky-screen measurement system. IEEE Sens J 16(21):7653–7658

    Article  Google Scholar 

  • Li C, Zhang Y, Tu W, Jun C, Liang H, Yu H (2017) Soft measurement of wood defects based on LDA feature fusion and compressed sensor images. J For Res 28(6):1285–1292

    Article  Google Scholar 

  • Nair SAH, Aruna P (2015) Comparison of DCT, SVD and BFOA based multimodal biometric wa-termarking systems. Alex Eng J 54(4):1161–1174

    Article  Google Scholar 

  • Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion pro-cess. Multimed Syst 20(1):45–64

    Article  Google Scholar 

  • Ozturk C, Hancer E, Karaboga D (2005) Dynamic clustering with improved binary artificial bee col-ony algorithm. Appl Soft Comput 28(1):69–80

    Google Scholar 

  • Petrou ZI, Tian Y (2016) High-resolution sea ice motion estimation with optical flow using satellite spectroradiometer data. IEEE Trans Geosci Remote Sens 55(3):1339–1350

    Article  Google Scholar 

  • Sasirekha K, Thangavel K (2016) A novel feature extraction algorithm from fingerprint image in wavelet domain. Comput Intell Cyber Secur Comput Models 1:135–143

    Google Scholar 

  • Si X, Jianjiang F, Yuan B, Zhou J (2017) Dense registration of fingerprints. Pattern Recognit 63:87–101

    Article  Google Scholar 

  • Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665

    Article  Google Scholar 

  • Swaminathan M, Yadav PK, Piloto O, Sjöblom T, Cheong I (2017) A new distance measure for non-identical data with application to image classification. Pattern Recognit 63:384–396

    Article  Google Scholar 

  • Telgad RL, Deshmukh PD, Siddiqui AM (2014) Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint. In: Recent advances and innovations in engineering (ICRAIE), vol 1. IEEE, pp 1–8

  • Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285–297

    Article  MathSciNet  MATH  Google Scholar 

  • Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475

    Article  Google Scholar 

  • Topcu B, Karabat C, Azadmanesh M, Er-dogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 1:100

    Article  Google Scholar 

  • Wan J, Tang S, Zhang Y, Li J, Wu P, Hoi SC (2016) HDIdx: high-dimensional indexing for efficient approximate nearest neighbor search. Neurocomputing 1:401–404

    Google Scholar 

  • Wang C, Qin S (2015) Adaptive detection method of infrared small target based on tar-get-background separation via robust principal component analysis. Infrared Phys Technol 69(1):123–135

    Article  MathSciNet  Google Scholar 

  • Wang B, Zhang J, Liu Y, Zou Y (2017a) Density peaks clustering based integrate framework for multi-document summarization. CAAI Trans Intell Technol 2(1):26–30

    Article  Google Scholar 

  • Wang S, Deng G, Hu J (2017b) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit 61:447–458

    Article  Google Scholar 

  • Watson CI, Wilson CL. (1992) NIST special data-base 4, fingerprint database. U.S. National Institute of Standards and Technology

  • Yijing S, Jianjiang F, Jie Z (2016) Fingerprint index-ing with pose constraint. Pattern Recognit 54:1–13

    Article  Google Scholar 

  • Zhang K, Huang D, Zhang B, Zhang D (2016) Im-proving texture analysis performance in biometrics by adjusting image sharpness. Pattern Recognit 66(1):16–25

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Ramya.

Ethics declarations

Conflict of interest

Authors R. Ramya and Dr. T. Sasikala declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramya, R., Sasikala, T. An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing. Soft Comput 23, 13423–13431 (2019). https://doi.org/10.1007/s00500-019-03881-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-03881-z

Keywords

Navigation