Skip to main content
Log in

BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Biometric cryptosystem (BCS) is an emerging field which performs user authentication in a secured environment. User authentication is handled using Biometrics and security using Cryptography, thus together forms BCS. Furthermore, the use of biometrics eliminates the need to remember passwords. The features extracted from the user’s biometric are used in place of a password for user authentication. BCS unleashes the key from the secured place upon successful user authentication. This paper proposes a novel method called binary robust independent elementary features based biometric cryptosystem (BRIEFBCS) for biometric key generation. The proposed method relies on a well known cryptographic construct, Fuzzy vault scheme, for data security. The motivation behind using BRIEF scheme for biometric cryptosystem is that the obtained descriptor are compact in size, faster to implement and suitable for low memory devices. BRIEFBCS comprises of three levels, i.e., Key generation, Enrollment and Authentication. The experiments have been carried on five ear databases viz. AMI, CP, IITD-v1, IITD-v2 and USTB-v2. The proposed method’s performance is evaluated and compared to state-of-the-art methods in terms of accuracy, false reject rate, vault construction time, key recovery time and Receiver Operating Characteristics curve. The proposed method has been demonstrated to outperform numerous state-of-the-art methods in both qualitative and quantitative aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The datasets are publicly available.

References

  1. Manisha, K.N.: Cancelable biometrics: a comprehensive survey. Artif. Intell. Rev. 53, 3403–3446 (2020)

    Article  Google Scholar 

  2. Kholmatov, A., Yanikoglu, B.: Biometric cryptosystem using online signatures. In: International Symposium on Computer and Information Sciences, pp. 981–990. Springer, Berlin (2006)

    Google Scholar 

  3. Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011, 1–25 (2011)

    Google Scholar 

  4. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38, 237–257 (2006)

    Article  MathSciNet  Google Scholar 

  5. Huixian, L., Man, W., Liaojun, P., Weidong, Z.: Key binding based on biometric shielding functions. In: Fifth International Conference on Information Assurance and Security, pp. 19–22. IEEE, New York (2009)

    Google Scholar 

  6. Rathgeb, C., Uhl, A.: An iris-based interval-mapping scheme for biometric key generation. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, pp. 511–516 (2009)

  7. Krivoku’ca, V., Abdulla, W.: Intra-class variance among multiple samples of the same person’s fingerprint in a cooperative user scenario. In: International Conference on Pattern Recognition Applications and Methods, pp. 77–92 (2014)

  8. Koetter, R., Vardy, A.: Algebraic soft-decision decoding of Reed-Solomon codes. IEEE Trans. Inf. Theory. 49, 2809–2825 (2003)

    Article  MathSciNet  Google Scholar 

  9. Greg, C.: ISO/IEC JTC 1/SC 37 biometrics, https://www.iso.org/committee/313770.html. Accessed 12 Feb 2022

  10. Calonder, M., Lepetit, V., Strecha, C., Fua, P.: Brief: binary robust independent elementary features. In: European Conference on Computer Vision, pp. 778–792 (2010)

  11. Calonder, M., Lepetit, V., Ozuysal, M., Trzcinski, T., Strecha, C., Fua, P.: BRIEF: Computing a local binary descriptor very fast. IEEE Trans. Pattern Anal. Mach. Intell. 34, 1281–1298 (2011)

    Article  Google Scholar 

  12. Rosten, E., Porter, R., Drummond, T.: Faster and better: a machine learning approach to corner detection. IEEE Trans. Pattern Anal. Mach. Intell. 32, 105–119 (2008)

    Article  Google Scholar 

  13. Itakura, Y., Tsujii, S.: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int. J. Inf. Secur. 4, 288–296 (2005)

    Article  Google Scholar 

  14. Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55, 1081–1088 (2006)

    Article  Google Scholar 

  15. Wk, Y., Abj, T., Dcl, N.: Replaceable and securely hashed keys from online signatures. IEICE Electron. Express. 3, 410–416 (2006)

    Article  Google Scholar 

  16. Wang, Y., Plataniotis, K.N.: Fuzzy vault for face based cryptographic key generation. In: Biometrics Symposium, pp. 1–6. IEEE, New York (2007)

    Google Scholar 

  17. Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognit. Lett. 31, 733–741 (2010)

    Article  Google Scholar 

  18. Leng, L., Zhang, J.: Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J. Netw. Comput. Appl. 34, 1979–1989 (2011)

    Article  Google Scholar 

  19. Inthavisas, K., Lopresti, D.: Secure speech biometric templates for user authentication. IET Biometrics. 1, 46–54 (2012)

    Article  Google Scholar 

  20. Abikoye, O.C., Ojo, U.A., Awotunde, J.B., Ogundokun, R.O.: A safe and secured iris template using steganography and cryptography. Multimed. Tools Appl. 79, 23483–23506 (2020)

    Article  Google Scholar 

  21. Sujitha, V., Chitra, D.: Highly secure palmprint based biometric template using fuzzy vault. Concurr. Comput. Pract. Exp. 31, 1–7 (2018). https://doi.org/10.1002/cpe.4513

    Article  Google Scholar 

  22. Sujitha, V., Chitra, D.: A novel technique for multi biometric cryptosystem using fuzzy vault. J. Med. Syst. 43, 1–9 (2019)

    Article  Google Scholar 

  23. Moon, D., Choi, W.Y., Moon, K., Chung, Y.: Fuzzy fingerprint vault using multiple polynomials. In: IEEE 13th International Symposium on Consumer Electronics, pp. 290–293 (2009)

  24. Zhang, W., Chen, T.: Generalized optimal thresholding for biometric key generation using face images. In: IEEE International Conference on Image Processing, pp. 781–784 (2005)

  25. Panchal, G., Samanta, D.: A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput. Electr. Eng. 69, 461–478 (2018). https://doi.org/10.1016/j.compeleceng.2018.01.028

    Article  Google Scholar 

  26. Ponce-Hernandez, W., Blanco-Gonzalo, R., Liu-Jimenez, J., Sanchez-Reillo, R.: Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification. IEEE Access 8, 11152–11164 (2020). https://doi.org/10.1109/ACCESS.2020.2965165

    Article  Google Scholar 

  27. Loukhaoukha, K., Chouinard, J.Y., Berdai, A.: A secure image encryption algorithm based on Rubik’s cube principle. J. Electr. Comput. Eng. 2012, 1–13 (2012)

    Article  MathSciNet  Google Scholar 

  28. Gonzalez, E., Alvarez, L., Mazorra, L.: AMI ear database, https://ctim.ulpgc.es/research_works/ami_ear_database/basic (2012). Accessed 11 Jan 2022

  29. Mathur, A., Conway, R.: Ear Recognition System Using Principal Component Analysis. University of Limerick, Limerick (2013)

    Google Scholar 

  30. Kumar, A., Wu, C.: Automated human identification using ear imaging. Pattern Recognit. 45, 956–968 (2012)

    Article  Google Scholar 

  31. Z M.: USTB ear database. http://www1.ustb.edu.cn/resb/en/visit/visit.htm (2002). Accessed 12 Jan 2022

Download references

Funding

No funding is availed for this research work.

Author information

Authors and Affiliations

Authors

Contributions

NK conceptualized the idea, manuscript editing and proofreading, PK performed experiments and prepared the manuscript.

Corresponding author

Correspondence to Nitin Kumar.

Ethics declarations

Conflict of interest

There authors declare no competing interests.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, P., Kumar, N. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS. Cluster Comput 27, 3135–3148 (2024). https://doi.org/10.1007/s10586-023-04134-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04134-3

Keywords

Navigation