Skip to main content
Log in

Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators

  • Theoretical Advances
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

With the emergence of biometric-based authentication systems in real-world applications, template protection in biometrics is a significant issue to be considered in the recent years. This paper presents two feature set computation algorithms, namely nearest neighbor feature set (NNFS) and Delaunay triangle feature set (DTFS), for a fingerprint sample. Further, the match scores obtained from these algorithms are fused using weighted sum rule and T-operators (T-norms and T-conorms). The experimental evaluation done on FVC 2002 databases confirms the credibility of fusion method compared to each individual algorithm used for fusing. The EER obtained for proposed method is 0 %, 0.059 %, and 3.93 % for FVC 2002 DB1, DB2, and DB3 databases, respectively. This paper also aims to prove the effectiveness of applying T-operators for fusion at score level in fingerprint template protection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:113

    Article  Google Scholar 

  2. Ross AA, Nandakumar K, Jain AK (2006) Handbook of multibiometrics. Springer, New York

    Google Scholar 

  3. Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recognit Lett 24(13):2115–2125

    Article  Google Scholar 

  4. Ratha N, Chikkerur S, Connell J, Bolle R (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572

    Article  Google Scholar 

  5. Ratha N, Connell J, Bolle R (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  6. Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35(12):2727–2738

    Article  MATH  Google Scholar 

  7. Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246

    Article  MathSciNet  Google Scholar 

  8. Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogit 44(10–11):2555–2564

    Article  Google Scholar 

  9. Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recognit 45(12):4129–4137

    Article  MathSciNet  Google Scholar 

  10. Das P, Karthik K, Garai BC (2012) A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs. Pattern Recognit 45(9):3373–3388

    Article  Google Scholar 

  11. Ferrara M, Maltoni D, Cappelli R (2012) Noninvertible minutia cylinder-code representation. IEEE Trans Inf Forensics Secur 7(6):1727–1737

    Article  Google Scholar 

  12. Cappelli R, Ferrara M, Maltoni D (2010) Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans Pattern Anal Machine Intell 32(12):2128–2141

    Article  Google Scholar 

  13. Prasad Munaga VNK, Swathi P, Rao CR, Deekshatulu BL (2014) Minimum spanning tree(MST) based techniques for generation of cancelable fingerprint templates. Int J Pattern Recognit Artif Intell 28(06):1456,013

    Article  Google Scholar 

  14. Yang W, Hu J, Wang S (2014) A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans Inf Forensics Secur 9(7):1179–1192

    Article  Google Scholar 

  15. Prasad MVNK, Kumar CS (2014) Fingerprint template protection using multiline neighboring relation. Expert Syst Appl 41(14):6114–6122

    Article  Google Scholar 

  16. Jin Z, Lim MH, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognit Lett 42:137–147

    Article  Google Scholar 

  17. Sandhya M, Munaga VNK Prasad (2015) k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection. In: International conference on biometrics (ICB), pp 386–393

  18. Sandhya M, Prasad MVNK, Chillarige RR (2016) Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biom 5(2):131–139

    Article  Google Scholar 

  19. Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574

    Article  Google Scholar 

  20. Yang W, Hu J, Wang S, Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognit 47(3):1309–1320

    Article  Google Scholar 

  21. Sandhya M, Prasad MV (2016) A bio-cryptosystem for fingerprints using Delaunay neighbor structures(dns) and fuzzy commitment scheme. In: Advances in signal processing and intelligent recognition systems, advances in intelligent systems and computing, vol 425, Springer International Publishing, pp 159–171

  22. Li C, Hu J (2016) A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans Inf Forensics Secur 11(3):543–555

    Article  Google Scholar 

  23. Poh N, Bengio S (2006) Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication. Pattern Recognit 39(2):223–233

    Article  Google Scholar 

  24. Tao Q, Veldhuis R (2009) Threshold-optimized decision-level fusion and its application to biometrics. Pattern Recognit 42(5):823–836

    Article  Google Scholar 

  25. He M, Horng SJ, Fan P, Run RS, Chen RJ, Lai JL, Sentosai MKKKO (2010) Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit Lett 43(5):1789–1800

    Article  MATH  Google Scholar 

  26. Hanmandlu M, Grover J, Gureja A, Guptai HM (2011) Score level fusion of multimodal biometrics using triangular norms. Pattern Recognit Lett 32:1843–1850

    Article  Google Scholar 

  27. Peng J, El-Latif AAA, Li Q, Niu X (2014) Multimodal biometric authentication based on score level fusion of finger biometrics. Optik 125(23):6891–6897

    Article  Google Scholar 

  28. Shariatmadar ZS, Faez K (2014) Finger-knuckle-print recognition performance improvement via multi-instance fusion at the score level. Optik 125(3):908–910

    Article  Google Scholar 

  29. Sim HM, Asmuni H, Hassan R, Othman RM (2014) Multimodal biometrics: weighted score level fusion based on non-ideal iris and face images. Expert Syst Appl 41(11):5390–5404

    Article  Google Scholar 

  30. Hanmandlu M (2015) Multimodal biometric system built on the new entropy function for feature extraction and the refined scores as a classifier. Expert Syst Appl 42(7):3702–3723

    Article  Google Scholar 

  31. Wang N, Li Q, El-Latif AAA, Peng J, Yan X, Niu X (2015) A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process 9:1–11

    Google Scholar 

  32. Gupta M, Qi J (1991) Theory of t-norms and fuzzy inference methods. Fuzzy Sets Syst 40(3):431–450

    Article  MathSciNet  MATH  Google Scholar 

  33. Zadeh LA (1973) Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans Syst Man Cybern SMC 3(1):28–44

    Article  MathSciNet  MATH  Google Scholar 

  34. Giles R (1976) Łukasiewicz logic and fuzzy set theory. Int J Man-Mach Stud 8(3):313–327

    Article  MathSciNet  MATH  Google Scholar 

  35. Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with Delaunay triangle-based local structures. In: Cyberspace safety and security, lecture notes in computer science, vol 8300, pp 81–91

  36. Bandler W, Kohout L (1980) Fuzzy power sets and fuzzy implication operators. Fuzzy Sets Syst 4(1):13–30

    Article  MathSciNet  MATH  Google Scholar 

  37. Weber S (1983) A general concept of fuzzy connectives, negations and implications based on t-norms and t-conorms. Fuzzy Sets Syst 11(1–3):103–113

    MathSciNet  MATH  Google Scholar 

  38. Yager RR (1980) On a general class of fuzzy connectives. Fuzzy Sets Syst 4(3):235–242

    Article  MathSciNet  MATH  Google Scholar 

  39. Schweizer Sklar (1983) Probabilistic metric spaces. North-Holland, New York

    MATH  Google Scholar 

  40. Frank M (1979) On the simultaneous associativity of F(x, y) and x+y-F(x, y). Aequ Math 19(1):194–226

    Article  MathSciNet  MATH  Google Scholar 

  41. Dombi J (1982) A general class of fuzzy operators, the DeMorgan class of fuzzy operators and fuzziness measures induced by fuzzy operators. Fuzzy Sets Syst 8(2):149–163

    Article  MathSciNet  MATH  Google Scholar 

  42. Dubois D, Prade H (1980) New results about properties and semantics of fuzzy set-theoretic operators. In: Wang P, Chang S (eds) Fuzzy Sets. Springer, New York, pp 59–75

    Chapter  Google Scholar 

  43. Yandong Y (1985) Triangular norms and TNF-sigma-algebras. Fuzzy Sets Syst 16(3):251–264

    Article  MathSciNet  MATH  Google Scholar 

  44. Aczél J, Alsina C (1982) Characterizations of some classes of quasilinear functions with applications to triangular norms and to synthesizing judgements. Aequ Math 25(1):313–315

    Article  MathSciNet  MATH  Google Scholar 

  45. Fingerprint Verification Competition (2002) http://bias.csr.unibo.it/fvc2002

  46. Lee C, Choi JY, Toh KA, Lee S (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans Syst Man Cybern 37(4):980–992

    Article  Google Scholar 

  47. Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. In: Proceedings of SPIE, security, steganography, and watermarking of multimedia contents, vol 5306, pp 622–633

  48. Jin Z, Teoh ABJ, Ong TS, Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157–6167

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mulagala Sandhya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sandhya, M., Prasad, M.V.N.K. Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern Anal Applic 21, 397–412 (2018). https://doi.org/10.1007/s10044-016-0584-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-016-0584-5

Keywords

Navigation