Advertisement

An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing

  • R. RamyaEmail author
  • T. Sasikala
Methodologies and Application
  • 19 Downloads

Abstract

Biometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with some sort of similarity distance methods. In this paper, Minkowski distance-based matching with Merkle hash tree authentication approach is proposed to overcome the above-mentioned challenges. Merkle hash tree-based encryption algorithm is introduced to improve the privacy concerns, usability and memory durability of the proposed system. This strategy handles security concerns via feature extracted data hashing with the private key. Minutiae feature extraction procedure adequately removes edge-detected features from the sensed data. Notwithstanding the security improvement, the proposed methodology stores just the produced keys for lessening memory stockpiling of cloud framework. Thus, authentication enhancement improves the entire security considerations through the proposed Minkowski distance-based authentication methodology. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using the MATLAB simulator. A fingerprint dataset named as NIST Special Database 4 (NIST-4) is used for experimental evaluation. The proposed recognition system has achieved superior accuracy of 100% compared to the existing approaches.

Keywords

Biometric Authentication Cloud service Key generation Hash function Minkowski distance 

Notes

Compliance with ethical standards

Conflict of interest

Authors R. Ramya and Dr. T. Sasikala declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. Abualigah LMQ, Hanandeh ES (2015) Applying genetic algorithms to information retrieval using vector space model. Int J Comput Sci Eng Appl 5(1):19Google Scholar
  2. Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773–4795Google Scholar
  3. Abualigah LM, Khader AT, Al-Betar MA (2016) Unsupervised feature selection technique based on genetic algorithm for improving the text clustering. In: 2016 7th international conference on computer science and information technology (CSIT). IEEE, pp 1–6Google Scholar
  4. Abualigah LM, Khader AT, Al-Betar MA, Hanandeh ES (2017a) A new hybridization strategy for krill herd algorithm and harmony search algorithm applied to improve the data clustering. Management.  https://doi.org/10.4108/eai.27-2-2017.152255 Google Scholar
  5. Abualigah LM, Khader AT, Al-Betar MA, Alomari OA (2017b) Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering. Expert Syst Appl 84:24–36Google Scholar
  6. Abualigah LM, Khader AT, Hanandeh ES (2017c) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456–466Google Scholar
  7. Abualigah LM, Khader AT, Hanandeh ES, Gandomi AH (2017d) A novel hybridization strategy for Krill herd algorithm applied to clustering techniques. Appl Soft Comput 60:423–435Google Scholar
  8. Abualigah LM, Khader AT, Hanandeh ES (2018a) A combination of objective functions and hybrid Krill herd algorithm for text document clustering analysis. Eng Appl Artif Intell 73:111–125Google Scholar
  9. Abualigah LM, Khader AT, Hanandeh ES (2018b) A novel weighting scheme applied to improve the text document clustering techniques. In: Abualigah LM, Khader AT, Hanandeh ES (eds) Innovative computing, optimization and its applications. Springer, Cham, pp 305–320Google Scholar
  10. Abualigah LM, Khader AT, Hanandeh ES (2018c) A hybrid strategy for krill herd algorithm with harmony search algorithm to improve the data clustering. Intell Decis Technol 12:1–12Google Scholar
  11. Abualigah LM, Khader AT, Hanandeh ES (2018d) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047–4071Google Scholar
  12. Al-Riyami A, Zhang N, Keane J (2016) Impact of hash value truncation on ID anonymity in wireless sensor networks. Ad Hoc Netw 45(1):80–103Google Scholar
  13. Alyasseri ZAA, Khader AT, Al-Betar MA, Abualigah LM (2017) ECG signal denoising using β-hill climbing algorithm and wavelet transform. In: 2017 8th international conference on IEEE information technology (ICIT), pp 96–101Google Scholar
  14. Doroz R, Porwik P, Orczyk T (2016) Dynamic sig-nature verification method based on association of features with similarity measures. Neurocomputing 171:921–931Google Scholar
  15. Gupta P, Gupta P (2015) An accurate finger vein based verification system. Dig Signal Process 38(1):43–52MathSciNetGoogle Scholar
  16. Gupta P, Gupta P (2016) An accurate fingerprint orientation modeling algorithm. Appl Math Model 40(15):7182–7194MathSciNetGoogle Scholar
  17. Jain A, Prasad MV (2016) A novel fingerprint in-dexing scheme using dynamic clustering. J Reliab Intell Environ 2(3):59–171Google Scholar
  18. Jiao L, Tang X, Hou B, Wang S (2015) SAR images retrieval based on semantic classification and region-based similarity measure for earth observation. IEEE J Sel Top Appl Earth Obs Remote Sens 8(8):3876–3891Google Scholar
  19. Kavsaoğlu AR, Polat K, Bozkurt MR (2014) A novel feature ranking algorithm for biometric recognition with PPG signals. Comput Biol Med 49:1–14Google Scholar
  20. Li H (2016) Research on target information fusion identification algorithm in multi-sky-screen measurement system. IEEE Sens J 16(21):7653–7658Google Scholar
  21. Li C, Zhang Y, Tu W, Jun C, Liang H, Yu H (2017) Soft measurement of wood defects based on LDA feature fusion and compressed sensor images. J For Res 28(6):1285–1292Google Scholar
  22. Nair SAH, Aruna P (2015) Comparison of DCT, SVD and BFOA based multimodal biometric wa-termarking systems. Alex Eng J 54(4):1161–1174Google Scholar
  23. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion pro-cess. Multimed Syst 20(1):45–64Google Scholar
  24. Ozturk C, Hancer E, Karaboga D (2005) Dynamic clustering with improved binary artificial bee col-ony algorithm. Appl Soft Comput 28(1):69–80Google Scholar
  25. Petrou ZI, Tian Y (2016) High-resolution sea ice motion estimation with optical flow using satellite spectroradiometer data. IEEE Trans Geosci Remote Sens 55(3):1339–1350Google Scholar
  26. Sasirekha K, Thangavel K (2016) A novel feature extraction algorithm from fingerprint image in wavelet domain. Comput Intell Cyber Secur Comput Models 1:135–143Google Scholar
  27. Si X, Jianjiang F, Yuan B, Zhou J (2017) Dense registration of fingerprints. Pattern Recognit 63:87–101Google Scholar
  28. Sun R, Zeng W (2014) Secure and robust image hashing via compressive sensing. Multimed Tools Appl 70(3):1651–1665Google Scholar
  29. Swaminathan M, Yadav PK, Piloto O, Sjöblom T, Cheong I (2017) A new distance measure for non-identical data with application to image classification. Pattern Recognit 63:384–396Google Scholar
  30. Telgad RL, Deshmukh PD, Siddiqui AM (2014) Combination approach to score level fusion for Multimodal Biometric system by using face and fingerprint. In: Recent advances and innovations in engineering (ICRAIE), vol 1. IEEE, pp 1–8Google Scholar
  31. Thai TH, Retraint F, Cogranne R (2016) Camera model identification based on the generalized noise model in natural images. Digit Signal Process 48:285–297MathSciNetzbMATHGoogle Scholar
  32. Tome P, Fierrez J, Vera-Rodriguez R, Nixon MS (2014) Soft biometrics and their application in person recognition at a distance. IEEE Trans Inf Forensics Secur 9(3):464–475Google Scholar
  33. Topcu B, Karabat C, Azadmanesh M, Er-dogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 1:100Google Scholar
  34. Wan J, Tang S, Zhang Y, Li J, Wu P, Hoi SC (2016) HDIdx: high-dimensional indexing for efficient approximate nearest neighbor search. Neurocomputing 1:401–404Google Scholar
  35. Wang C, Qin S (2015) Adaptive detection method of infrared small target based on tar-get-background separation via robust principal component analysis. Infrared Phys Technol 69(1):123–135MathSciNetGoogle Scholar
  36. Wang B, Zhang J, Liu Y, Zou Y (2017a) Density peaks clustering based integrate framework for multi-document summarization. CAAI Trans Intell Technol 2(1):26–30Google Scholar
  37. Wang S, Deng G, Hu J (2017b) A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recognit 61:447–458Google Scholar
  38. Watson CI, Wilson CL. (1992) NIST special data-base 4, fingerprint database. U.S. National Institute of Standards and TechnologyGoogle Scholar
  39. Yijing S, Jianjiang F, Jie Z (2016) Fingerprint index-ing with pose constraint. Pattern Recognit 54:1–13Google Scholar
  40. Zhang K, Huang D, Zhang B, Zhang D (2016) Im-proving texture analysis performance in biometrics by adjusting image sharpness. Pattern Recognit 66(1):16–25Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Sathyabama UniversityChennaiIndia
  2. 2.SRR Engineering CollegePadur, ChennaiIndia

Personalised recommendations