Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template

Published: 01 November 2014 Publication History

Abstract

With the massive deployment of biometric applications, protecting the biometric template has attracted great attention because of the privacy issue. Although many proposals on protecting biometric template have been reported in literature, design a method simultaneously satisfying four criteria, that is performance, non-invertibility, cancellability, and diversity still remains unsolved. In this paper, we proposed a two-dimensional random projected minutiae vicinity decomposition MVD technique to secure minutiae-based fingerprint template. Minutiae vicinity is first formed from a set of fingerprint minutiae and further used to generate a set of local features, namely MVD features; then, a random matrix derived from user-specific token is used to project MVD features for the concealment of the topology of MVD. Comprehensive experiments on fingerprint verification competition datasets are carried out, and the lowest equal error rate obtained in the stolen-token scenario is 3.07% and 1.02% for fingerprint verification competition 2002 database 1 and database 2, respectively. Besides, detail analyses on the irreversibility, cancellability, template size, and computational cost have been carried out. Copyright © 2013 John Wiley & Sons, Ltd.

References

[1]
Maltoni D, Maio D, Jain AL, Prabhakar S. Handbook of Fingerprint Recognition. Springer-Verlag London Limited: London.
[2]
Teoh ABJ, Goh A, Ngo DCL. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactionson Pattern Analysis and Machine Intelligence 2006; Volume 28 Issue 12: pp.1892-1901.
[3]
Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP Journal of Advances in Signal Processing 2008; Volume 8 Issue 2: pp.1-17, Jan. 2008, Article ID: 579416.
[4]
Juels A, Wattenberg M. A fuzzy commitment scheme. Proceeding of the Sixth ACM Conference on Computer and Communications Security 1999; Volume 1: pp.28-36.
[5]
Juels A, Sudan M. A fuzzy vault scheme. Proceeding of the IEEE International Symposium on Information Theory 2002; Volume 408: pp.237-257.
[6]
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 2008; Volume 38 Issue 1: pp.523-540.
[7]
Teoh ABJ, Ngo CL, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 2004; Volume 37 Issue 11: pp.2245-2255.
[8]
Ratha NK, Chikkerur S, Connell JH, Bolle RM. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 2007; Volume 29: pp.561-572.
[9]
Feng Q, Su F, Cai A, Zhao FF. Cracking cancelable fingerprint template of Ratha. In 2008 International Symposium on Computer Science and Computational Technology. IEEE Computer Society: Shanghai, China, 2008; pp.572-575.
[10]
Shin SW, Lee MK, Moon DS, Moon KY. Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI Journal 2009; Volume 31 Issue 5: pp.628-630.
[11]
Ang R, Safavi-Naini R, McAven L. Cancelable key-based fingerprint template. In Proceedings of 10th Australasian Conference ACISP'05 Information Security and Privacy. Springer-Verlag Berlin, Heidelberg: Brisbane, Australia, 2005; pp.109-128.
[12]
Sutcu Y, Rane S, Yedidia J, Draper S, Vetro A. Feature extraction for a Slepian-Wolf biometric system using LDPC codes. Proceedings of International Symposium on Information Theory 2008; Volume 1: pp.2297-2301.
[13]
Nagar A, Rane S, Vetro A. Alignment and bit extraction for secure fingerprint biometrics. SPIE Conference on Electronic Imaging 2010 Special Collection, Vol. 7541, 75410N 2010; January 2010.
[14]
Farooq F, Bolle RM, Jea TY, Ratha NK. Anonymous and revocable fingerprint recognition. In IEEE Conference on Computer Vision and Pattern Recognition. IEEE Computer Society: Minneapolis, 2007; pp.1-7.
[15]
Lee C, Kim J. Cancelable fingerprint templates using minutiae-based bit-strings. J Network Comput Appl 2010; Volume 33 Issue 3: pp.236-246.
[16]
Jin Z, Teoh ABJ, Ong TS, Tee C. Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Systems with Applications 2012; Volume 39 Issue 6: pp.6157-6167.
[17]
Yang B, Busch C. Parameterized geometric alignment for minutiae-based fingerprint template protection. In 3rd IEEE International Conference on Biometrics: Theory. IEEE Computer Society: Washington, DC, 2009; pp.1-7.
[18]
Ahmad T, Hu J, Wang S. Pair-polar coordinate based cancellable fingerprint templates. Pattern Recognition 2011; Volume 44 Issue 10-11: pp.2555-2564.
[19]
Wang S, Hu J. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping DITOM approach. Pattern Recognition 2012; Volume 45 12: pp.4129-4137.
[20]
Jin Z, Teoh A, Ong TS, Tee C. A revocable fingerprint template for security and privacy preserving. KSII Transactions on Internet and Information Systems 2010; Volume 4 Issue 6: pp.1327-1341.
[21]
Ferrara M, Maltoni D, Cappelli R. Non-invertible minutia cylinder-code representation. IEEE Transactions on Information Forensics and Security 2012; Volume 7 Issue 6: pp.1727-1737, December.
[22]
Cappelli R, Ferrara M, Maltoni D. Minutia cylinder-code: A new representation and matching technique for fingerprint recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 2010; Volume 32: pp.2128-2141.
[23]
Simoens K, Chang CM, Preneel B. Reversing protected minutiae vicinities. In Four IEEE International Conference on Biometrics: Theory. IEEE Computer Society: Washington, DC, USA, 2010; pp.1-7.
[24]
Jin Z, Teoh ABJ. Fingerprint template protection with minutia vicinity decomposition. In Proceeding of the International Joined Conference on Biometrics IJCB 2011. IEEE Computer Society: Washington, DC, USA, 2011; pp.1-7.
[25]
Teoh BJA, Yuang CT. Cancellable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics 2007; Volume 37 Issue 5: pp.1096-1106, Oct.
[26]
Liu K, Kargupta H, Ryan J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 2006; Volume 18 Issue 1: pp.92-106, Jan.
[27]
Fingerprint Verification Competition. <"http://bias.csr.unibo.it/fvc2002">, 2002.
[28]
Neurotechnology,VeriFinger SDK "http://www.neurotechnology.com/megamatcher.html"
[29]
Germain R, Califano A, Colville S. Fingerprint matching using transformation parameters. IEEE Computational Science and Engineering 1997; Volume 4 Issue 4: pp.42-49, October.
[30]
Tan X, Bhanu B. Fingerprint matching by genetic algorithms. Pattern Recognition 2006 Volume 39 Issue 3: pp.465-477, March, ISSN 0031-3203, 10.1016/j.patcog.2005.09.005.

Cited By

View all
  • (2022)Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-OrderingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321370420:5(3828-3844)Online publication date: 11-Oct-2022
  • (2021)FinPrivacy: A Privacy-preserving Mechanism for Fingerprint IdentificationACM Transactions on Internet Technology10.1145/338713021:3(1-15)Online publication date: 16-Jun-2021
  • (2020)A review on performance,security and various biometric template protection schemes for biometric authentication systemsMultimedia Tools and Applications10.1007/s11042-020-09197-779:37-38(27721-27776)Online publication date: 1-Oct-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 7, Issue 11
November 2014
596 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 November 2014

Author Tags

  1. fingerprint template protection
  2. minutiae vicinity decomposition
  3. two-dimensional random projection

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-OrderingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.321370420:5(3828-3844)Online publication date: 11-Oct-2022
  • (2021)FinPrivacy: A Privacy-preserving Mechanism for Fingerprint IdentificationACM Transactions on Internet Technology10.1145/338713021:3(1-15)Online publication date: 16-Jun-2021
  • (2020)A review on performance,security and various biometric template protection schemes for biometric authentication systemsMultimedia Tools and Applications10.1007/s11042-020-09197-779:37-38(27721-27776)Online publication date: 1-Oct-2020
  • (2018)Biometrics Based Privacy-Preserving Authentication and Mobile Template ProtectionWireless Communications & Mobile Computing10.1155/2018/71072952018Online publication date: 1-Jan-2018
  • (2018)Iris Template Protection using Discrete LogarithmProceedings of the 2018 2nd International Conference on Biometric Engineering and Applications10.1145/3230820.3230828(43-49)Online publication date: 16-May-2018
  • (2017)A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mappingComputers and Security10.1016/j.cose.2016.10.00465:C(373-386)Online publication date: 1-Mar-2017
  • (2015)Biometric key-binding using lattice maskingSecurity and Communication Networks10.1002/sec.12678:18(3405-3414)Online publication date: 1-Dec-2015

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media