Reference Hub3
Fingerprint Image Hashing Based on Minutiae Points and Shape Context

Fingerprint Image Hashing Based on Minutiae Points and Shape Context

Sani M. Abdullahi, Hongxia Wang, Asad Malik
Copyright: © 2018 |Volume: 10 |Issue: 4 |Pages: 20
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781522543633|DOI: 10.4018/IJDCF.2018100101
Cite Article Cite Article

MLA

Abdullahi, Sani M., et al. "Fingerprint Image Hashing Based on Minutiae Points and Shape Context." IJDCF vol.10, no.4 2018: pp.1-20. http://doi.org/10.4018/IJDCF.2018100101

APA

Abdullahi, S. M., Wang, H., & Malik, A. (2018). Fingerprint Image Hashing Based on Minutiae Points and Shape Context. International Journal of Digital Crime and Forensics (IJDCF), 10(4), 1-20. http://doi.org/10.4018/IJDCF.2018100101

Chicago

Abdullahi, Sani M., Hongxia Wang, and Asad Malik. "Fingerprint Image Hashing Based on Minutiae Points and Shape Context," International Journal of Digital Crime and Forensics (IJDCF) 10, no.4: 1-20. http://doi.org/10.4018/IJDCF.2018100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Fingerprint minutiae is the unique representation of fingerprint image feature points as terminations and bifurcations. Therefore, generating a hash signature from these feature points will unarguably meet the desired properties of a robust hash signature and which will accurately fit in for fingerprint image content authentication purposes. This article proposes a novel minutiae and shape context-based fingerprint image hashing scheme. Fingerprint image minutiae points were extracted by incorporating their orientation and descriptors, then embedded into the shape context-based descriptors in order to generate a unique, compact, and robust hash signature. The robustness of the proposed scheme is determined by performing content preserving attacks, including noise addition, blurring and geometric distribution. Efficient results were achieved from the given attacks. Also, a series of evaluations on the performance comparison between the proposed and other state-of-art schemes has proven the approach to be robust and secure, by yielding a better result.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.