A Novel Retina Based Biometric Privacy Using Visual Cryptography
A Novel Retina Based Biometric Privacy Using Visual Cryptography
A Novel Retina Based Biometric Privacy Using Visual Cryptography
9, September 2016
ABSTRACT are available such as facial thermo gram, hand vein, odor,
Biometrics deal with automated methods of identifying a person ear, hand geometry, fingerprint, face, retina, iris, palm
or verifying the identity of a person based on physiological or print, voice and signature. Among those retina recognition
behavioral characteristics. Preserving the biometric privacy such is one of the most promising approach because of stability,
as digital biometric data (eg. face, iris, retina and fingerprint) is uniqueness and noninvasiveness.
very important nowadays. The retinal biometrics is considered
one of the most accurate and robust methods of the identity
Biometrics systems are more consistent and more user
verification. The unique retina features of an individual can be friendly. Still there are certain issues particularly the
presented in a compact binary form which can be easily security facet of both biometric system and biometric data.
compared with the reference template to confirm identity. As As template is stored in centralized database, they are
biometric template are stored in the centralized database, due to vulnerable to eavesdropping and attacks. Thus alternative
security threats biometric template may be modified by attacker. protection mechanisms need to be considered. For these
If biometric template is altered authorized user will not be reasons various researches have been made to protect the
allowed to access the resource. To deal this issue visual biometric data and template in the system by using
cryptography schemes can be applied to secure the iris template. cryptography, stenography and watermarking. In this work
Visual cryptography is a secret sharing scheme where a secret
image is encrypted into the shares which independently disclose
a system is proposed by applying visual cryptography
no information about the original secret image. The combination technique to biometric template (retina). Visual
of biometrics and visual cryptography is a promising information cryptography technique has been applied on to the retinal
security technique which offers an efficient way to protect the template to make it secure from attack in centralized
biometric template. Visual cryptography provides great means database as well as extra layer of authentication to the
for helping such security needs as well as extra layer of users.
authentication.
Keywords: 1.1 Modules in Biometric System
Biometric, Visual cryptography, Retina authentication,
Enrollment, Authentication There are basically two phases in biometric system. There
are enrollment phase and authentication phase. In these
two phases there are four modules. The sensor module is
1. Introduction used in extracting the biometric data which may be image,
audio or video. The feature extraction module is used in
Security of data has been a major issue from many years. obtaining the template that is generated from the features
Using the age old technique of encryption and decryption of the biometric data. Each feature is labeled with a user’s
has been easy to track for people around. Providing
identity. The Matching module is used in authentication
security to data using new technique is the need of the
phase, where the template data is compared with data
hour. This project uses the technique of Visual which is obtained from user and that it estimates the
cryptography and providing biometric authentication. For similarity between these data. These similar elements are
automated personal identification biometric authentication processed in Decision making module which is used to
is getting more attention. Biometrics is the detailed identify the individual.
measurement of human body. Biometrics deal with
This work is organized as follow: Related work for
automated methods of identifying a person or verifying security enhancement of biometrics system and various
the identity of person based on physiological or behavioral visual cryptography schemes are discussed in section2,
characteristics. There are various applications where section 3 presents the proposed system, experiments and
personal identification is required such as passport. results are shown in section 4, and section 5 concludes the
Controls, computer login control, secure electronic work.
banking, bank ATM, credit cards, airport, mobile phones,
health and social services, etc. Many biometric techniques
cryptography techniques guarantee that no information is generated. Now this feature template is matched with
revealed by one share alone, this provides security to the retina feature of newly provided retina image.
retina template in the database.
B. Authentication
4. Experimental Results
The main intent of this work is providing security to the Fig. 5 (a) Retina template image (b) Share1 (c) Share2 (d) Result of
retina template in the database. To build this system, superimposing of share1 and share 2
MATLAB platform is selected because of powerful inbuilt
mathematical, signal and image processing functions of In this experiment, the possibility of exposing the identity
visual cryptography. Retina images are taken from DRIVE of the secret image by using the sheet images in the
standard database. matching process is investigated. For this experiment, the
Since the proposed technique was devised for binary eye sheet images for three different Retina samples of the
images, a threshold value was used to generate the binary same subject were first computed. Next, the reconstructed
image for each probe. Each binary image was then images and the corresponding sheets were independently
decomposed into two sheets using VCS. The sheets were used in the matching process (i.e., sheet image 1 of all the
superimposed to get the target image. The reconstructed as private images were matched against each other; sheet
well as the original grayscale retina probes were matched image 2 of all the private images were matched against
against the images in the gallery. These experiments each other; reconstructed images of all the private images
suggest the possibility of decomposing and storing retina were matched against each other).The public datasets used
images. Two shares are generated Share1 and Share2 as in this experiments were datasets A. This experiment
output of visual cryptography algorithm. One share along resulted in three EERs: the first was a result of using the
with username is kept by system and other is given on the reconstructed target images for matching, while the
user ID Card. Table 2 shows the result of using the second and the third EERs were a result of using the first
reconstructed retina as probes; the performance is reported sheet and second sheet, respectively, for matching. The
as a function of the different threshold values used to results in Table 3 confirm the difficulty of exposing the
binarize the original probe images. It is observed that a identity of the secret retina image by using the sheets
threshold of 180 results in an EER of 7.05%. alone.
Table 1. Equal Error Rate (%) at different threshold values Table 2.Equal Error Rate (%) for the experiment shows the individual
Threshold Equal Error Rate shift images to reveal the secret images
120 28.2 ERR (%)
150 14.6 Reconstructed vs Reconstructed 2.5
Sheet 1 vs Sheet 1 38.7
180 7.05
Sheet 2 vs Sheet 2 35.4
For authentication user provides share which is on the ID
card. The share extracted from this card is superimposed
with corresponding share that is stored in the database,
generates the retina template image as shown in figure 5.
From this retina template image feature template is
80 IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016