Skip to main content
Log in

A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn 44(10-11):2555–2564

  2. Ahn D, Kong SG, Chung Yun-S, Moon KY (2008) Matching with secure fingerprint templates using non-invertible transform. In: 2008 Congress on Image and Signal Processing, vol 2. IEEE, pp 29–33

  3. Alam B, Jin Z, Yap W-S, Goi B-M (2018) An alignment-free cancelable fingerprint template for bio-cryptosystems. J Netw Comput Appl 115:20–32

  4. Alsuhibany SA (2019) Developing a visual cryptography tool for arabic text. IEEE Access 7:76573–76579

  5. Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Australasian conference on information security and privacy. Springer, pp 242–252

  6. Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB)pp 196–201. IEEE

  7. Bhosale AG, Patil VS (2020) A (2, 2) visual cryptography technique with improved contrast. Inf SecurJ Glob Perspect 29(4):199–208

  8. Breebaart J, Yang B, Buhan-Dulman I, Busch C (2009) Biometric template protection. Datenschutz Datensicherheit-DuD, 33(5):299–304

  9. Camlikaya E, Kholmatov A, Yanikoglu B (2008) Multi-biometric templates using fingerprint and voice. In: Biometric technology for human identification Vvolume 6944. International Society for Optics and Photonics, pp 69440I

  10. Chin CS, Jin ATB, Ling DNC (2006) High security iris verification system based on random secret integration. Comput Vis Image Understand 102(2):169–177

  11. Chiu P-L, Lee K-H (2019) Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165:233–249

  12. Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. IEEE Access 8:111330–111346

  13. Derman E, KeskinΓΆz M (2016) Normalized cross-correlation based global distortion correction in fingerprint image matching. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, pp 1–4

  14. Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. Int J Emerging Technol Adv Eng 2(12):2250–2459

  15. Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des Codes Cryptogr 87(7):1699–1711

  16. Elad M, Feuer A (1997) Restoration of a single superresolution image from several blurred, noisy, and undersampled measured images. IEEE Trans Image Process 6(12):1646–1658

  17. Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37–50

  18. Gunjan VK, Prasad PS, Mukherjee S (2020) Biometric template protection scheme-cancelable biometrics. In: ICCCE 2019. Springer, pp 405–411

  19. Gurunathan K, Rajagopalan SP (2020) A stegano-visual cryptography technique for multimedia security. Multimed Tools Appl 79(5):3893–3911

  20. Hu H, Shen G, Liu Y, Fu Z, Yu B (2019) Improved schemes for visual secret sharing based on random grids. Multimed Tools App 78(9):12055–12082

  21. Hwang JW, Lee HS (2004) Adaptive image interpolation based on local gradient features. IEEE Signal Process Lett 11(3):359–362

  22. Jin Z, Lim M-H, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn Lett 42:137–147

  23. Jin Z, Lim MH, Teoh ABJ, Goi BM, Tay YH (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415–1428

  24. Jin Z, Teoh ABJ, Ong TS , Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157–6167

  25. Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257

  26. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28–36

  27. Kaur H, Khanna P (2016) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75(23):16333–16361

  28. Kaur H, Khanna P (2020) Remote multimodal biometric authentication using visual cryptography. In: Proceedings of 3rd International Conference on Computer Vision and Image Processing. Springer, pp 13–25

  29. Kho JB, Kim J, Kim I-J, Teoh ABJ (2019) Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn 91:245–260

  30. Kumar N et al (2020) On generating cancelable biometric templates using visual secret sharing. In: Science and Information Conference. Springer, pp 532–544

  31. Kumar G, Tulyakov S, Govindaraju V (2010) Combination of symmetric hash functions for secure fingerprint matching. In: 2010 20th International Conference on Pattern Recognition. IEEE, pp 890–893

  32. Lacharme P, Cherrier E, Rosenberger C (2013) Reconstruction attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT), pp 8

  33. Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications. IEEE, pp 92–97

  34. Lee MJ, Jin Z, Teoh ABJ (2018) One-factor cancellable scheme for fingerprint template protection: Extended feature vector (efv) hashing. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–7

  35. Li C, Hu J (2014) Attacks via record multiplicity on cancelable biometrics templates. Concurr Comput Pract Exper 26(8):1593–1605

  36. Liu W, Xu Y, Zhang M, Chen J, Yang C-N (2019) A novel quantum visual secret sharing scheme. IEEE Access 7:114374–114384

  37. Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057–1065

  38. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain. AK (2002) Fvc2002: Second fingerprint verification competition. In: Object recognition supported by user interaction for service robotsvol 3, pp 811–814. IEEE

  39. Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media

  40. Mehmood R, Selwal A (2020) Fingerprint biometric template security schemes: Attacks and countermeasures. In: Proceedings of ICRIC 2019. Springer, pp 455–467

  41. Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422–431

  42. Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422–431

  43. Mhala NC, Pais AR (2019) Contrast enhancement of progressive visual secret sharing (pvss) scheme for gray-scale and color images using super-resolution. Signal Processing162:253–267

  44. Monoth T et al (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148

  45. Monoth T et al (2010) Contrast-enhanced visual cryptography schemes based on additional pixel patterns. In: 2010 International Conference on Cyberworlds. IEEE, pp 171–178

  46. Mukesh R, Subashini VJ (2012) Fingerprint based authentication system using threshold visual cryptographic technique. In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 16–19

  47. Murad SH, Gody AM, Barakat TM (2019) Enhanced security of symmetric encryption using combination of steganography with visual cryptography. arXiv:1902.11167

  48. Nagar A, Nandakumar K, Jain AN (2008) Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 2008 19th International Conference on Pattern Recognition. IEEE, pp 1–4

  49. Nandakumar K, Ratha N , Pankanti S, Darnell S (2017) Secure one-time biometrie tokens for non-repudiable multi-party transactions. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6

  50. Nandakumar. L (2010) A fingerprint cryptosystem based on minutiae phase spectrum. In: 2010 IEEE International Workshop on Information Forensics and Security. IEEE, pp 1–6

  51. Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniquespp 1–12. Springer

  52. Patil S, Tajane K, Sirdeshpande J (2015) Enhancing security and privacy in biometrics based authentication system using multiple secret sharing. In: 2015 International Conference on Computing Communication Control and Automation. IEEE, pp 190–194

  53. Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology vol 2. IEEE, pp 572–575

  54. Rao YVS, Sukonkina Y, Bhagwati C, Singh UK (2008) Fingerprint based authentication application using visual cryptography methods (improved id card). In: TENCON 2008-2008 IEEE Region 10 Conference. IEEE, pp 1–5

  55. Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell, 29(4):561–572

  56. Ratha NK, Connell JG, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J, 40(3):614–634

  57. Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR’06), vol 4. IEEE, pp 370–373

  58. Revenkar PS, Anjum A, Gandhare WZ (2010) Secure iris authentication using visual cryptography. arXiv:1004.1748

  59. Ross A, Othman A (2010) Visual cryptography for biometric privacy. IEEE Trans Inf Forensic Secur 6(1):70–81

  60. Ross A, Othman AA (2010) Visual cryptography for face privacy. In: Biometric Technology for Human Identification VII, vol 7667. International Society for Optics and Photonics, pp 76670B

  61. Ross AA, Shah J, Jain AK (2005) Toward reconstructing fingerprints from minutiae points. In: Biometric Technology for Human Identification II, volume 5779. International Society for Optics and Photonics, pp 68–80

  62. Sadhya D, Singh SK (2018) Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multimed Tools Appl 77(12):15113–15137

  63. Sandhya M, Prasad MVNK (2015) k-nearest neighborhood structure (k-nns) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB). IEEE, pp 386–393

  64. Sandhya M, Prasad MVNK (2016) Securing fingerprint templates using fused structures. IET Biom 6(3):173–182

  65. Sandhya M, Prasad MVNK (2018) Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and t-operators. Pattern Anal Appl 21(2):397–412

  66. Sandhya M, Prasad MVNK, Chillarige RR (2016) Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biom 5(2):131–139

  67. Savvides M, Kumar BVK V, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., vol 3. IEEE, pp 922–925

  68. Sherlock BG, Monro DM, Millard K (1994) Fingerprint enhancement by directional fourier filtering. IEE Proceedings-Vision, Image and Signal Processing 141(2):87–94

  69. Shin SW, Lee M-K, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI journal31(5):628–630

  70. Sinduja R, Sathiya RD, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 650–655

  71. Takur V, Jaiswal R, Sonawane S, Nalavade R et al (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32–36

  72. Tan L, Lu Y, Yan X, Liu L, Zhou X (2020) Xor-ed visual secret sharing scheme with robust and meaningful shadows based on qr codes. Multimed Tools Appl 79(9):5719–5741

  73. Trivedi AK, Thounaojam DM, Pal S (2020) Non-invertible cancellable fingerprint template for fingerprint biometric. Comput Secur 90:101690

  74. Tulyakov S, Farooq F, Mansukhani P, Govindaraju. V (2007) Symmetric hash functions for secure fingerprint biometric systems. Pattern Recogn Lett 28(16):2427–2436

  75. VeriFinger SDK (2010) Neuro technology. VeriFinger, SDK Neuro Technology

  76. Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396

  77. Wang S, Deng G, Hu J (2017) A partial hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn 61:447–458

  78. Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (ditom) approach. Pattern Recogn 45(12):4129–4137

  79. Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14–22

  80. Wong WJ, Teoh ABJ, Wong MLD, Kho YH (2013) Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn Lett 34(11):1221–1229

  81. Yan X, Lu Y, Liu L, Wan S, Ding W, Liu H (2016) Contrast-improved visual cryptography for general access structure. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 578–583

  82. Yan B, Xiang Y, Hua Gx (2018) Improving the visual quality of size-invariant visual cryptography for grayscale images: an analysis-by-synthesis (abs) approach. IEEE Trans Image Process 28(2):896– 911

  83. Yang W, Hu J, Wang S, Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recogn 47(3):1309–1320

  84. Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81–91

  85. Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: A review. Symmetry, 11(2):141

  86. Yanikoglu B, Kholmatov A (2004) Combining multiple biometrics to protect privacy. In: Proceedings of ICPR-BCTP Workshoppp 43–46

  87. Zhou Z, Yang C-N, Cai S-R, Wang D-S (2019) Boolean operation based visual cryptography. IEEE Access 7:165496–165508

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajnas Muhammed.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muhammed, A., Mhala, N.C. & Pais, A.R. A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. Multimed Tools Appl 80, 10255–10284 (2021). https://doi.org/10.1007/s11042-020-10095-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10095-1

Keywords

Navigation