Abstract
With the emergence of biometric-based authentication systems in real-world applications, template protection in biometrics is a significant issue to be considered in the recent years. This paper presents two feature set computation algorithms, namely nearest neighbor feature set (NNFS) and Delaunay triangle feature set (DTFS), for a fingerprint sample. Further, the match scores obtained from these algorithms are fused using weighted sum rule and T-operators (T-norms and T-conorms). The experimental evaluation done on FVC 2002 databases confirms the credibility of fusion method compared to each individual algorithm used for fusing. The EER obtained for proposed method is 0 %, 0.059 %, and 3.93 % for FVC 2002 DB1, DB2, and DB3 databases, respectively. This paper also aims to prove the effectiveness of applying T-operators for fusion at score level in fingerprint template protection.











Similar content being viewed by others
References
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:113
Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer, New York
Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recognit Lett 24(13):2115–2125
Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572
Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35(12):2727–2738
Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246
Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogit 44(10–11):2555–2564
Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recognit 45(12):4129–4137
Das P, Karthik K, Garai BC (2012) A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs. Pattern Recognit 45(9):3373–3388
Ferrara M, Maltoni D, Cappelli R (2012) Noninvertible minutia cylinder-code representation. IEEE Trans Inf Forensics Secur 7(6):1727–1737
Cappelli R, Ferrara M, Maltoni D (2010) Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans Pattern Anal Machine Intell 32(12):2128–2141
Prasad Munaga VNK, Swathi P, Rao CR, Deekshatulu BL (2014) Minimum spanning tree(MST) based techniques for generation of cancelable fingerprint templates. Int J Pattern Recognit Artif Intell 28(06):1456,013
Yang W, Hu J, Wang S (2014) A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans Inf Forensics Secur 9(7):1179–1192
Prasad MVNK, Kumar CS (2014) Fingerprint template protection using multiline neighboring relation. Expert Syst Appl 41(14):6114–6122
Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognit Lett 42:137–147
Sandhya M, Munaga VNK Prasad (2015) k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection. In: International conference on biometrics (ICB), pp 386–393
Sandhya M, Prasad MVNK, Chillarige RR (2016) Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biom 5(2):131–139
Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574
Yang W, Hu J, Wang S, Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognit 47(3):1309–1320
Sandhya M, Prasad MV (2016) A bio-cryptosystem for fingerprints using Delaunay neighbor structures(dns) and fuzzy commitment scheme. In: Advances in signal processing and intelligent recognition systems, advances in intelligent systems and computing, vol 425, Springer International Publishing, pp 159–171
Li C, Hu J (2016) A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans Inf Forensics Secur 11(3):543–555
Poh N, Bengio S (2006) Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication. Pattern Recognit 39(2):223–233
Tao Q, Veldhuis R (2009) Threshold-optimized decision-level fusion and its application to biometrics. Pattern Recognit 42(5):823–836
He M, Horng SJ, Fan P, Run RS, Chen RJ, Lai JL, Sentosai MKKKO (2010) Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit Lett 43(5):1789–1800
Hanmandlu M, Grover J, Gureja A, Guptai HM (2011) Score level fusion of multimodal biometrics using triangular norms. Pattern Recognit Lett 32:1843–1850
Peng J, El-Latif AAA, Li Q, Niu X (2014) Multimodal biometric authentication based on score level fusion of finger biometrics. Optik 125(23):6891–6897
Shariatmadar ZS, Faez K (2014) Finger-knuckle-print recognition performance improvement via multi-instance fusion at the score level. Optik 125(3):908–910
Sim HM, Asmuni H, Hassan R, Othman RM (2014) Multimodal biometrics: weighted score level fusion based on non-ideal iris and face images. Expert Syst Appl 41(11):5390–5404
Hanmandlu M (2015) Multimodal biometric system built on the new entropy function for feature extraction and the refined scores as a classifier. Expert Syst Appl 42(7):3702–3723
Wang N, Li Q, El-Latif AAA, Peng J, Yan X, Niu X (2015) A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process 9:1–11
Gupta M, Qi J (1991) Theory of t-norms and fuzzy inference methods. Fuzzy Sets Syst 40(3):431–450
Zadeh LA (1973) Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans Syst Man Cybern SMC 3(1):28–44
Giles R (1976) Łukasiewicz logic and fuzzy set theory. Int J Man-Mach Stud 8(3):313–327
Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with Delaunay triangle-based local structures. In: Cyberspace safety and security, lecture notes in computer science, vol 8300, pp 81–91
Bandler W, Kohout L (1980) Fuzzy power sets and fuzzy implication operators. Fuzzy Sets Syst 4(1):13–30
Weber S (1983) A general concept of fuzzy connectives, negations and implications based on t-norms and t-conorms. Fuzzy Sets Syst 11(1–3):103–113
Yager RR (1980) On a general class of fuzzy connectives. Fuzzy Sets Syst 4(3):235–242
Schweizer Sklar (1983) Probabilistic metric spaces. North-Holland, New York
Frank M (1979) On the simultaneous associativity of F(x, y) and x+y-F(x, y). Aequ Math 19(1):194–226
Dombi J (1982) A general class of fuzzy operators, the DeMorgan class of fuzzy operators and fuzziness measures induced by fuzzy operators. Fuzzy Sets Syst 8(2):149–163
Dubois D, Prade H (1980) New results about properties and semantics of fuzzy set-theoretic operators. In: Wang P, Chang S (eds) Fuzzy Sets. Springer, New York, pp 59–75
Yandong Y (1985) Triangular norms and TNF-sigma-algebras. Fuzzy Sets Syst 16(3):251–264
Aczél J, Alsina C (1982) Characterizations of some classes of quasilinear functions with applications to triangular norms and to synthesizing judgements. Aequ Math 25(1):313–315
Fingerprint Verification Competition (2002) http://bias.csr.unibo.it/fvc2002
Lee C, Choi JY, Toh KA, Lee S (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans Syst Man Cybern 37(4):980–992
Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. In: Proceedings of SPIE, security, steganography, and watermarking of multimedia contents, vol 5306, pp 622–633
Jin Z, Teoh ABJ, Ong TS, Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157–6167
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sandhya, M., Prasad, M.V.N.K. Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern Anal Applic 21, 397–412 (2018). https://doi.org/10.1007/s10044-016-0584-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-016-0584-5