Abstract
Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a personβs minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.
Similar content being viewed by others
References
Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn 44(10-11):2555β2564
Ahn D, Kong SG, Chung Yun-S, Moon KY (2008) Matching with secure fingerprint templates using non-invertible transform. In: 2008 Congress on Image and Signal Processing, vol 2. IEEE, pp 29β33
Alam B, Jin Z, Yap W-S, Goi B-M (2018) An alignment-free cancelable fingerprint template for bio-cryptosystems. J Netw Comput Appl 115:20β32
Alsuhibany SA (2019) Developing a visual cryptography tool for arabic text. IEEE Access 7:76573β76579
Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Australasian conference on information security and privacy. Springer, pp 242β252
Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB)pp 196β201. IEEE
Bhosale AG, Patil VS (2020) A (2, 2) visual cryptography technique with improved contrast. Inf SecurJ Glob Perspect 29(4):199β208
Breebaart J, Yang B, Buhan-Dulman I, Busch C (2009) Biometric template protection. Datenschutz Datensicherheit-DuD, 33(5):299β304
Camlikaya E, Kholmatov A, Yanikoglu B (2008) Multi-biometric templates using fingerprint and voice. In: Biometric technology for human identification Vvolume 6944. International Society for Optics and Photonics, pp 69440I
Chin CS, Jin ATB, Ling DNC (2006) High security iris verification system based on random secret integration. Comput Vis Image Understand 102(2):169β177
Chiu P-L, Lee K-H (2019) Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165:233β249
Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. IEEE Access 8:111330β111346
Derman E, KeskinΓΆz M (2016) Normalized cross-correlation based global distortion correction in fingerprint image matching. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, pp 1β4
Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. Int J Emerging Technol Adv Eng 2(12):2250β2459
Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des Codes Cryptogr 87(7):1699β1711
Elad M, Feuer A (1997) Restoration of a single superresolution image from several blurred, noisy, and undersampled measured images. IEEE Trans Image Process 6(12):1646β1658
Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37β50
Gunjan VK, Prasad PS, Mukherjee S (2020) Biometric template protection scheme-cancelable biometrics. In: ICCCE 2019. Springer, pp 405β411
Gurunathan K, Rajagopalan SP (2020) A stegano-visual cryptography technique for multimedia security. Multimed Tools Appl 79(5):3893β3911
Hu H, Shen G, Liu Y, Fu Z, Yu B (2019) Improved schemes for visual secret sharing based on random grids. Multimed Tools App 78(9):12055β12082
Hwang JW, Lee HS (2004) Adaptive image interpolation based on local gradient features. IEEE Signal Process Lett 11(3):359β362
Jin Z, Lim M-H, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn Lett 42:137β147
Jin Z, Lim MH, Teoh ABJ, Goi BM, Tay YH (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415β1428
Jin Z, Teoh ABJ, Ong TS , Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157β6167
Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237β257
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28β36
Kaur H, Khanna P (2016) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75(23):16333β16361
Kaur H, Khanna P (2020) Remote multimodal biometric authentication using visual cryptography. In: Proceedings of 3rd International Conference on Computer Vision and Image Processing. Springer, pp 13β25
Kho JB, Kim J, Kim I-J, Teoh ABJ (2019) Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn 91:245β260
Kumar N et al (2020) On generating cancelable biometric templates using visual secret sharing. In: Science and Information Conference. Springer, pp 532β544
Kumar G, Tulyakov S, Govindaraju V (2010) Combination of symmetric hash functions for secure fingerprint matching. In: 2010 20th International Conference on Pattern Recognition. IEEE, pp 890β893
Lacharme P, Cherrier E, Rosenberger C (2013) Reconstruction attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT), pp 8
Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications. IEEE, pp 92β97
Lee MJ, Jin Z, Teoh ABJ (2018) One-factor cancellable scheme for fingerprint template protection: Extended feature vector (efv) hashing. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1β7
Li C, Hu J (2014) Attacks via record multiplicity on cancelable biometrics templates. Concurr Comput Pract Exper 26(8):1593β1605
Liu W, Xu Y, Zhang M, Chen J, Yang C-N (2019) A novel quantum visual secret sharing scheme. IEEE Access 7:114374β114384
Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057β1065
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain. AK (2002) Fvc2002: Second fingerprint verification competition. In: Object recognition supported by user interaction for service robotsvol 3, pp 811β814. IEEE
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media
Mehmood R, Selwal A (2020) Fingerprint biometric template security schemes: Attacks and countermeasures. In: Proceedings of ICRIC 2019. Springer, pp 455β467
Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422β431
Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422β431
Mhala NC, Pais AR (2019) Contrast enhancement of progressive visual secret sharing (pvss) scheme for gray-scale and color images using super-resolution. Signal Processing162:253β267
Monoth T et al (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143β148
Monoth T et al (2010) Contrast-enhanced visual cryptography schemes based on additional pixel patterns. In: 2010 International Conference on Cyberworlds. IEEE, pp 171β178
Mukesh R, Subashini VJ (2012) Fingerprint based authentication system using threshold visual cryptographic technique. In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 16β19
Murad SH, Gody AM, Barakat TM (2019) Enhanced security of symmetric encryption using combination of steganography with visual cryptography. arXiv:1902.11167
Nagar A, Nandakumar K, Jain AN (2008) Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 2008 19th International Conference on Pattern Recognition. IEEE, pp 1β4
Nandakumar K, Ratha N , Pankanti S, Darnell S (2017) Secure one-time biometrie tokens for non-repudiable multi-party transactions. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS). IEEE, pp 1β6
Nandakumar. L (2010) A fingerprint cryptosystem based on minutiae phase spectrum. In: 2010 IEEE International Workshop on Information Forensics and Security. IEEE, pp 1β6
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniquespp 1β12. Springer
Patil S, Tajane K, Sirdeshpande J (2015) Enhancing security and privacy in biometrics based authentication system using multiple secret sharing. In: 2015 International Conference on Computing Communication Control and Automation. IEEE, pp 190β194
Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology vol 2. IEEE, pp 572β575
Rao YVS, Sukonkina Y, Bhagwati C, Singh UK (2008) Fingerprint based authentication application using visual cryptography methods (improved id card). In: TENCON 2008-2008 IEEE Region 10 Conference. IEEE, pp 1β5
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell, 29(4):561β572
Ratha NK, Connell JG, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J, 40(3):614β634
Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPRβ06), vol 4. IEEE, pp 370β373
Revenkar PS, Anjum A, Gandhare WZ (2010) Secure iris authentication using visual cryptography. arXiv:1004.1748
Ross A, Othman A (2010) Visual cryptography for biometric privacy. IEEE Trans Inf Forensic Secur 6(1):70β81
Ross A, Othman AA (2010) Visual cryptography for face privacy. In: Biometric Technology for Human Identification VII, vol 7667. International Society for Optics and Photonics, pp 76670B
Ross AA, Shah J, Jain AK (2005) Toward reconstructing fingerprints from minutiae points. In: Biometric Technology for Human Identification II, volume 5779. International Society for Optics and Photonics, pp 68β80
Sadhya D, Singh SK (2018) Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multimed Tools Appl 77(12):15113β15137
Sandhya M, Prasad MVNK (2015) k-nearest neighborhood structure (k-nns) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB). IEEE, pp 386β393
Sandhya M, Prasad MVNK (2016) Securing fingerprint templates using fused structures. IET Biom 6(3):173β182
Sandhya M, Prasad MVNK (2018) Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and t-operators. Pattern Anal Appl 21(2):397β412
Sandhya M, Prasad MVNK, Chillarige RR (2016) Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biom 5(2):131β139
Savvides M, Kumar BVK V, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., vol 3. IEEE, pp 922β925
Sherlock BG, Monro DM, Millard K (1994) Fingerprint enhancement by directional fourier filtering. IEE Proceedings-Vision, Image and Signal Processing 141(2):87β94
Shin SW, Lee M-K, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI journal31(5):628β630
Sinduja R, Sathiya RD, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 650β655
Takur V, Jaiswal R, Sonawane S, Nalavade R et al (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32β36
Tan L, Lu Y, Yan X, Liu L, Zhou X (2020) Xor-ed visual secret sharing scheme with robust and meaningful shadows based on qr codes. Multimed Tools Appl 79(9):5719β5741
Trivedi AK, Thounaojam DM, Pal S (2020) Non-invertible cancellable fingerprint template for fingerprint biometric. Comput Secur 90:101690
Tulyakov S, Farooq F, Mansukhani P, Govindaraju. V (2007) Symmetric hash functions for secure fingerprint biometric systems. Pattern Recogn Lett 28(16):2427β2436
VeriFinger SDK (2010) Neuro technology. VeriFinger, SDK Neuro Technology
Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383β396
Wang S, Deng G, Hu J (2017) A partial hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn 61:447β458
Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (ditom) approach. Pattern Recogn 45(12):4129β4137
Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14β22
Wong WJ, Teoh ABJ, Wong MLD, Kho YH (2013) Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn Lett 34(11):1221β1229
Yan X, Lu Y, Liu L, Wan S, Ding W, Liu H (2016) Contrast-improved visual cryptography for general access structure. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 578β583
Yan B, Xiang Y, Hua Gx (2018) Improving the visual quality of size-invariant visual cryptography for grayscale images: an analysis-by-synthesis (abs) approach. IEEE Trans Image Process 28(2):896β 911
Yang W, Hu J, Wang S, Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recogn 47(3):1309β1320
Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81β91
Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: A review. Symmetry, 11(2):141
Yanikoglu B, Kholmatov A (2004) Combining multiple biometrics to protect privacy. In: Proceedings of ICPR-BCTP Workshoppp 43β46
Zhou Z, Yang C-N, Cai S-R, Wang D-S (2019) Boolean operation based visual cryptography. IEEE Access 7:165496β165508
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisherβs note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Muhammed, A., Mhala, N.C. & Pais, A.R. A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. Multimed Tools Appl 80, 10255β10284 (2021). https://doi.org/10.1007/s11042-020-10095-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10095-1