Skip to main content

Advertisement

Log in

Biometric template security using DNA codec based transformation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Feature transformation is the most primary step in biometric template protection whose effectiveness is directly dependent upon the test and trained samples. The minutiae points are segregated to retrieve the attributes with the singular point data to enlarge the secure user template. The user fingerprint information could be revealed to produce the secured template with the help of the fingerprint image. An attempt of feature transformation is experimented in this paper by DNA based encoding methodology. The general formation of the proposed technique is constructed from the Biometric data to generate the feature extraction; the Z pattern generation is used for implementing the transformation and produced the DNA codec. The evaluation of each step in the proposed scheme is theoretically evaluated and experimented with. The revocability, diversity and the security parameters are analyzed and compared with the relevant methods using the images from FVC2004 dataset that the accuracy for biometric template is achieved through the enhanced recognition rate. The complexity and the performance of the proposed method proved challenging to the state of art techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Ali SS, Prakash S (2015) Enhanced fingerprint shell, in: Proc. of SPIN 2015, pp. 801–805

  2. Ali SS, Prakash S (2017) Fingerprint shell construction with prominent minutiae points, in: Proc. of COMPUTE ACM, 2017, pp. 91–98

  3. Atighehchi K, Ghammam L, Barbier M, Rosenberger C (2019) GREYC-hashing: combining biometrics and secret for enhancing the security of protected templates. Futur Gener Comput Syst 101:819–830

    Article  Google Scholar 

  4. Balaji S (2019) Yesudhas Harold Robinson, Enoch Golden Julie,:GBMS: a new centralized graph based Mirror system approach to prevent evaders for data handling with arithmetic coding in wireless sensor networks. Ingénierie des Systèmes d’Information 24(5):481–490

    Article  Google Scholar 

  5. Balaji S, Golden Julie E, Harold Robinson Y, Kumar R, Thong PH, Son LH (2019) Design of a security-aware routing scheme in Mobile Ad-hoc Network using Repeated Game Model, Computer Standards & Interfaces, 66

  6. Biometric Security Concerns CESG UK Biometric Working Group Tech. Rep.,

  7. Cappelli R, Ferrara M, Maltoni D (2010) Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. PAMI 32(12):2128–2141

    Article  Google Scholar 

  8. Cavoukian A, Stoianov A (2007) Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy, Office of the Information and Privacy Commissioner of Ontario, Technical Report

  9. Dasgupta D et al (2017) Biometric authentication, Authentication through human characteristics, Springer International Publishing AG

  10. Dodis Y, Reyzina L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Lecture Notes Comput Sci 3027:523–540

    Article  MathSciNet  Google Scholar 

  11. Ferrara M, Maltoni D, Cappelli R (2012) Noninvertible Minutia Cylinder-Code Representation, IEEE Transactions on Information Forensics and Security, VOL. 7, No. 6

  12. FVC2004 web site: http://bias.csr.unibo.it/fvc2004

  13. Ghammam L, Barbier M, Rosenberger C (2018) Enhancing the security of transformation based biometric template protection schemes, in: International conference on CYBERWORLDS (CW)

  14. Harold Robinson Y, Golden Julie E (2019) SMR: a synchronized multipath re-broadcasting mechanism for improving the quality of conversational video service. Wireless Pers Commun 104:1149–1173. https://doi.org/10.1007/s11277-018-6074-x

    Article  Google Scholar 

  15. Hill CJ (2001) Risk of masquerade arising from the storage of biometrics, B.S. Thesis, Australian National University, November http://chris.fornax.net/biometrics. html

  16. Iyappan GI, Prakash S, Dave IR, Joshi P, Ali SS, Shrivastava AM (2018) Ear recognition in 3D using 2D curvilinear features. IET Biom 7(6):519–529

    Article  Google Scholar 

  17. Iyappan GI, Ali SS, Prakash S (2019) Multi-resolution local descriptor for 3d ear recognition, in: Proc. of BIOSIG 2019, pp. 1–8

  18. Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn Lett 42:137–147

    Article  Google Scholar 

  19. Jin Z, Hwang JY, Lai YL, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Transactions on Information Forensics and Security 13(2):393–407

    Article  Google Scholar 

  20. Juels A, Wattenberg M (1999) A Fuzzy Commitment Scheme, in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, pp. 28–36.

  21. Kaur K (2015) Fortifying pattern recognition for substantiating augmented performance with an ideal authentication scheme, Faculty of Technology And Sciences Lovely Professional University, Phagwara

  22. Lee H, Lee C, Choi JY, Kim J, Kim J (2007) Changeable face representations suitable for human recognition. Lecture Notes ComputSci 4642:557–565

    Article  Google Scholar 

  23. Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2(4):744–757

    Article  Google Scholar 

  24. Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: Security and privacy concerns. IEEE Security Privacy Mag. 1(2):33–42

    Article  Google Scholar 

  25. Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha, in Proc. Int. Symp. Computer Science and ComputationalTechnology, pp. 572–575

  26. Ratha NK, Connell JH, Bolle R (2001) Enhancing security and privacy of biometric-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  27. Ratha N, Chikkerur S, Connell JH, Bolle RM (Apr. 2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal MachIntell 29(4):561–572

    Article  Google Scholar 

  28. Rosenberger C (2018) Evaluation of biometric template protection schemes based on a transformation, in: International conference on information systems security and privacy (ICISSP)

  29. Rúa EA, Maiorana E, Castro JLA, Campisi P (2012) Biometric Template Protection Using Universal Background Models: An Application to Online Signature, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1

  30. Sandhya M, Prasad MVNK (2015) k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection, in: Proc. of ICB 2015, pp. 386–393

  31. Santhana Krishnan R, Golden Julie E, Harold Robinson Y, Kumar R, Son LH, Tuan TA, Long HV (2019) Modified Zone Based Intrusion Detection System for Security Enhancement in Mobile Ad-hoc Networks, Wireless Networks, 1-15

  32. Selwal A, Gupta SK, Surender A (2016) Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry. Perspectives in Science 8:705–708

    Article  Google Scholar 

  33. Sutcu Y, Li Q, Memon N (2009) Protecting biometric templates with sketch: theory and practice. IEEE Trans Inf Forensics Security 2(3):503–512

    Article  Google Scholar 

  34. Teoh ABJ, Ngo DCL, Goh A (2006) Randommultispace quantization as an analytic mechanism for bio-hashing of biometric and random identity inputs. IEEE Trans PAMI 28(12):1892–1901

    Article  Google Scholar 

  35. Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints, in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA)

  36. Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric Cryptosystems: Issues and Challenges, vol. 92, no. 6, pp. 948–960

  37. Wong WJ, Teoh ABJ, Wong MLD, Kho YH (2013) Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn Lett 34(11):1221–1229

    Article  Google Scholar 

  38. Yang W , Hu J , Wang S , Yang J (2013) Cancelable fingerprint templates with De- launay triangle-based local structures, in: Cyberspace Safety and Security, Springer International Publishing, pp. 81–91

  39. Yang W, Hu J, Stojmenovic MSW (2014) An alignment-free fingerprint bio-cryp- tosystem based on modified voronoi neighbor structures. Pattern Recogn 47(3):1309–1320

    Article  Google Scholar 

  40. Zhang L, Zhang L, Zhang D (2009) Finger-Knuckle-Print Verification Based on Band-Limited Phase-Only Correlation. In: Jiang X., Petkov N. (eds) Computer Analysis of Images and Patterns. CAIP 2009. Lecture notes in computer science, vol 5702. Springer, Berlin, Heidelberg https://doi.org/10.1007/978-3-642-03767-2_17

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Harold Robinson.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jacob, I.J., Betty, P., Darney, P.E. et al. Biometric template security using DNA codec based transformation. Multimed Tools Appl 80, 7547–7566 (2021). https://doi.org/10.1007/s11042-020-10127-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10127-w

Keywords