Abstract
Biometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some sort of similarity distance methods. In this paper, Minkowski distance-based matching with Merkle hash tree authentication approach is proposed to overcome the above-mentioned challenges. Merkle hash tree-based encryption algorithm is introduced to improve the privacy concerns, usability and memory durability of the proposed system. This strategy handles security concerns via feature extracted data hashing with the private key. Minutiae feature extraction procedure adequately removes edge-detected features from the sensed data. Notwithstanding the security improvement, the proposed methodology stores just the produced keys for lessening memory stockpiling of cloud framework. Thus, authentication enhancement improves the entire security considerations through the proposed Minkowski distance-based authentication methodology. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the MATLAB simulator. A fingerprint dataset named as NIST Special Database 4 (NIST-4) is used for experimental evaluation. The proposed recognition system has achieved superior accuracy of 100% compared to the existing approaches.
Similar content being viewed by others
References
Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19
Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795
Abualigah LM, Khader AT, Al-Betar MA (2016) Unsupervised feature selection technique based on genetic algorithm for improving the text clustering. In: 2016 7th international conference on computer science and information technology (CSIT). IEEE, pp 1–6
Abualigah LM, Khader AT, Al-Betar MA, Hanandeh ES (2017a) A new hybridization strategy for krill herd algorithm and harmony search algorithm applied to improve the data clustering. Management. https://doi.org/10.4108/eai.27-2-2017.152255
Abualigah LM, Khader AT, Al-Betar MA, Alomari OA (2017b) Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering. Expert Syst Appl 84:24–36
Abualigah LM, Khader AT, Hanandeh ES (2017c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466
Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017d) A novel hybridization strategy for Krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435
Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125
Abualigah LM, Khader AT, Hanandeh ES (2018b) A novel weighting scheme applied to improve the text document clustering techniques. In: Abualigah LM, Khader AT, Hanandeh ES (eds) Innovative computing, optimization and its applications. Springer, Cham, pp 305–320
Abualigah LM, Khader AT, Hanandeh ES (2018c) A hybrid strategy for krill herd algorithm with harmony search algorithm to improve the data clustering. Intell Decis Technol 12:1–12
Abualigah LM, Khader AT, Hanandeh ES (2018d) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071
Al-Riyami A, Zhang N, Keane J (2016) Impact of hash value truncation on ID anonymity in wireless sensor networks. Ad Hoc Netw 45(1):80–103
Alyasseri ZAA, Khader AT, Al-Betar MA, Abualigah LM (2017) ECG signal denoising using β-hill climbing algorithm and wavelet transform. In: 2017 8th international conference on IEEE information technology (ICIT), pp 96–101
Doroz R, Porwik P, Orczyk T (2016) Dynamic sig-nature verification method based on association of features with similarity measures. Neurocomputing 171:921–931
Gupta P, Gupta P (2015) An accurate finger vein based verification system. Dig Signal Process 38(1):43–52
Gupta P, Gupta P (2016) An accurate fingerprint orientation modeling algorithm. Appl Math Model 40(15):7182–7194
Jain A, Prasad MV (2016) A novel fingerprint in-dexing scheme using dynamic clustering. J Reliab Intell Environ 2(3):59–171
Jiao L, Tang X, Hou B, Wang S (2015) SAR images retrieval based on semantic classification and region-based similarity measure for earth observation. IEEE J Sel Top Appl Earth Obs Remote Sens 8(8):3876–3891
Kavsaoğlu AR, Polat K, Bozkurt MR (2014) A novel feature ranking algorithm for biometric recognition with PPG signals. Comput Biol Med 49:1–14
Li H (2016) Research on target information fusion identification algorithm in multi-sky-screen measurement system. IEEE Sens J 16(21):7653–7658
Li C, Zhang Y, Tu W, Jun C, Liang H, Yu H (2017) Soft measurement of wood defects based on LDA feature fusion and compressed sensor images. J For Res 28(6):1285–1292
Nair SAH, Aruna P (2015) Comparison of DCT, SVD and BFOA based multimodal biometric wa-termarking systems. Alex Eng J 54(4):1161–1174
Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion pro-cess. Multimed Syst 20(1):45–64
Ozturk C, Hancer E, Karaboga D (2005) Dynamic clustering with improved binary artificial bee col-ony algorithm. Appl Soft Comput 28(1):69–80
Petrou ZI, Tian Y (2016) High-resolution sea ice motion estimation with optical flow using satellite spectroradiometer data. IEEE Trans Geosci Remote Sens 55(3):1339–1350
Sasirekha K, Thangavel K (2016) A novel feature extraction algorithm from fingerprint image in wavelet domain. Comput Intell Cyber Secur Comput Models 1:135–143
Si X, Jianjiang F, Yuan B, Zhou J (2017) Dense registration of fingerprints. Pattern Recognit 63:87–101
Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665
Swaminathan M, Yadav PK, Piloto O, Sjöblom T, Cheong I (2017) A new distance measure for non-identical data with application to image classification. Pattern Recognit 63:384–396
Telgad RL, Deshmukh PD, Siddiqui AM (2014) Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint. In: Recent advances and innovations in engineering (ICRAIE), vol 1. IEEE, pp 1–8
Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285–297
Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475
Topcu B, Karabat C, Azadmanesh M, Er-dogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 1:100
Wan J, Tang S, Zhang Y, Li J, Wu P, Hoi SC (2016) HDIdx: high-dimensional indexing for efficient approximate nearest neighbor search. Neurocomputing 1:401–404
Wang C, Qin S (2015) Adaptive detection method of infrared small target based on tar-get-background separation via robust principal component analysis. Infrared Phys Technol 69(1):123–135
Wang B, Zhang J, Liu Y, Zou Y (2017a) Density peaks clustering based integrate framework for multi-document summarization. CAAI Trans Intell Technol 2(1):26–30
Wang S, Deng G, Hu J (2017b) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit 61:447–458
Watson CI, Wilson CL. (1992) NIST special data-base 4, fingerprint database. U.S. National Institute of Standards and Technology
Yijing S, Jianjiang F, Jie Z (2016) Fingerprint index-ing with pose constraint. Pattern Recognit 54:1–13
Zhang K, Huang D, Zhang B, Zhang D (2016) Im-proving texture analysis performance in biometrics by adjusting image sharpness. Pattern Recognit 66(1):16–25
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors R. Ramya and Dr. T. Sasikala declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ramya, R., Sasikala, T. An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing. Soft Comput 23, 13423–13431 (2019). https://doi.org/10.1007/s00500-019-03881-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-019-03881-z