Abstract
Feature transformation is the most primary step in biometric template protection whose effectiveness is directly dependent upon the test and trained samples. The minutiae points are segregated to retrieve the attributes with the singular point data to enlarge the secure user template. The user fingerprint information could be revealed to produce the secured template with the help of the fingerprint image. An attempt of feature transformation is experimented in this paper by DNA based encoding methodology. The general formation of the proposed technique is constructed from the Biometric data to generate the feature extraction; the Z pattern generation is used for implementing the transformation and produced the DNA codec. The evaluation of each step in the proposed scheme is theoretically evaluated and experimented with. The revocability, diversity and the security parameters are analyzed and compared with the relevant methods using the images from FVC2004 dataset that the accuracy for biometric template is achieved through the enhanced recognition rate. The complexity and the performance of the proposed method proved challenging to the state of art techniques.


















Similar content being viewed by others
References
Ali SS, Prakash S (2015) Enhanced fingerprint shell, in: Proc. of SPIN 2015, pp. 801–805
Ali SS, Prakash S (2017) Fingerprint shell construction with prominent minutiae points, in: Proc. of COMPUTE ACM, 2017, pp. 91–98
Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) GREYC-hashing: combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst 101:819–830
Balaji S (2019) Yesudhas Harold Robinson, Enoch Golden Julie,:GBMS: a new centralized graph based Mirror system approach to prevent evaders for data handling with arithmetic coding in wireless sensor networks. Ingénierie des Systèmes d’Information 24(5):481–490
Balaji S, Golden Julie E, Harold Robinson Y, Kumar R, Thong PH, Son LH (2019) Design of a security-aware routing scheme in Mobile Ad-hoc Network using Repeated Game Model, Computer Standards & Interfaces, 66
Biometric Security Concerns CESG UK Biometric Working Group Tech. Rep.,
Cappelli R, Ferrara M, Maltoni D (2010) Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. PAMI 32(12):2128–2141
Cavoukian A, Stoianov A (2007) Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy, Office of the Information and Privacy Commissioner of Ontario, Technical Report
Dasgupta D et al (2017) Biometric authentication, Authentication through human characteristics, Springer International Publishing AG
Dodis Y, Reyzina L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Lecture Notes Comput Sci 3027:523–540
Ferrara M, Maltoni D, Cappelli R (2012) Noninvertible Minutia Cylinder-Code Representation, IEEE Transactions on Information Forensics and Security, VOL. 7, No. 6
FVC2004 web site: http://bias.csr.unibo.it/fvc2004
Ghammam L, Barbier M, Rosenberger C (2018) Enhancing the security of transformation based biometric template protection schemes, in: International conference on CYBERWORLDS (CW)
Harold Robinson Y, Golden Julie E (2019) SMR: a synchronized multipath re-broadcasting mechanism for improving the quality of conversational video service. Wireless Pers Commun 104:1149–1173. https://doi.org/10.1007/s11277-018-6074-x
Hill CJ (2001) Risk of masquerade arising from the storage of biometrics, B.S. Thesis, Australian National University, November http://chris.fornax.net/biometrics. html
Iyappan GI, Prakash S, Dave IR, Joshi P, Ali SS, Shrivastava AM (2018) Ear recognition in 3D using 2D curvilinear features. IET Biom 7(6):519–529
Iyappan GI, Ali SS, Prakash S (2019) Multi-resolution local descriptor for 3d ear recognition, in: Proc. of BIOSIG 2019, pp. 1–8
Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn Lett 42:137–147
Jin Z, Hwang JY, Lai YL, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Transactions on Information Forensics and Security 13(2):393–407
Juels A, Wattenberg M (1999) A Fuzzy Commitment Scheme, in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, pp. 28–36.
Kaur K (2015) Fortifying pattern recognition for substantiating augmented performance with an ideal authentication scheme, Faculty of Technology And Sciences Lovely Professional University, Phagwara
Lee H, Lee C, Choi JY, Kim J, Kim J (2007) Changeable face representations suitable for human recognition. Lecture Notes ComputSci 4642:557–565
Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2(4):744–757
Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Security Privacy Mag. 1(2):33–42
Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha, in Proc. Int. Symp. Computer Science and ComputationalTechnology, pp. 572–575
Ratha NK, Connell JH, Bolle R (2001) Enhancing security and privacy of biometric-based authentication systems. IBM Syst J 40(3):614–634
Ratha N, Chikkerur S, Connell JH, Bolle RM (Apr. 2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal MachIntell 29(4):561–572
Rosenberger C (2018) Evaluation of biometric template protection schemes based on a transformation, in: International conference on information systems security and privacy (ICISSP)
Rúa EA, Maiorana E, Castro JLA, Campisi P (2012) Biometric Template Protection Using Universal Background Models: An Application to Online Signature, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1
Sandhya M, Prasad MVNK (2015) k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection, in: Proc. of ICB 2015, pp. 386–393
Santhana Krishnan R, Golden Julie E, Harold Robinson Y, Kumar R, Son LH, Tuan TA, Long HV (2019) Modified Zone Based Intrusion Detection System for Security Enhancement in Mobile Ad-hoc Networks, Wireless Networks, 1-15
Selwal A, Gupta SK, Surender A (2016) Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry. Perspectives in Science 8:705–708
Sutcu Y, Li Q, Memon N (2009) Protecting biometric templates with sketch: theory and practice. IEEE Trans Inf Forensics Security 2(3):503–512
Teoh ABJ, Ngo DCL, Goh A (2006) Randommultispace quantization as an analytic mechanism for bio-hashing of biometric and random identity inputs. IEEE Trans PAMI 28(12):1892–1901
Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints, in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA)
Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric Cryptosystems: Issues and Challenges, vol. 92, no. 6, pp. 948–960
Wong WJ, Teoh ABJ, Wong MLD, Kho YH (2013) Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn Lett 34(11):1221–1229
Yang W , Hu J , Wang S , Yang J (2013) Cancelable fingerprint templates with De- launay triangle-based local structures, in: Cyberspace Safety and Security, Springer International Publishing, pp. 81–91
Yang W, Hu J, Stojmenovic MSW (2014) An alignment-free fingerprint bio-cryp- tosystem based on modified voronoi neighbor structures. Pattern Recogn 47(3):1309–1320
Zhang L, Zhang L, Zhang D (2009) Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation. In: Jiang X., Petkov N. (eds) Computer Analysis of Images and Patterns. CAIP 2009. Lecture notes in computer science, vol 5702. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-03767-2_17
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jacob, I.J., Betty, P., Darney, P.E. et al. Biometric template security using DNA codec based transformation. Multimed Tools Appl 80, 7547–7566 (2021). https://doi.org/10.1007/s11042-020-10127-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10127-w