Abstract
Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.
Similar content being viewed by others
References
Ahmad T, Hu J, Wang S (2011) Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn 44(10-11):2555–2564
Ahn D, Kong SG, Chung Yun-S, Moon KY (2008) Matching with secure fingerprint templates using non-invertible transform. In: 2008 Congress on Image and Signal Processing, vol 2. IEEE, pp 29–33
Alam B, Jin Z, Yap W-S, Goi B-M (2018) An alignment-free cancelable fingerprint template for bio-cryptosystems. J Netw Comput Appl 115:20–32
Alsuhibany SA (2019) Developing a visual cryptography tool for arabic text. IEEE Access 7:76573–76579
Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Australasian conference on information security and privacy. Springer, pp 242–252
Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB)pp 196–201. IEEE
Bhosale AG, Patil VS (2020) A (2, 2) visual cryptography technique with improved contrast. Inf SecurJ Glob Perspect 29(4):199–208
Breebaart J, Yang B, Buhan-Dulman I, Busch C (2009) Biometric template protection. Datenschutz Datensicherheit-DuD, 33(5):299–304
Camlikaya E, Kholmatov A, Yanikoglu B (2008) Multi-biometric templates using fingerprint and voice. In: Biometric technology for human identification Vvolume 6944. International Society for Optics and Photonics, pp 69440I
Chin CS, Jin ATB, Ling DNC (2006) High security iris verification system based on random secret integration. Comput Vis Image Understand 102(2):169–177
Chiu P-L, Lee K-H (2019) Efficient constructions for progressive visual cryptography with meaningful shares. Signal Process 165:233–249
Chiu P-L, Lee K-H (2020) Threshold visual cryptography schemes with tagged shares. IEEE Access 8:111330–111346
Derman E, Keskinöz M (2016) Normalized cross-correlation based global distortion correction in fingerprint image matching. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, pp 1–4
Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. Int J Emerging Technol Adv Eng 2(12):2250–2459
Dutta S, Adhikari A, Ruj S (2019) Maximal contrast color visual secret sharing schemes. Des Codes Cryptogr 87(7):1699–1711
Elad M, Feuer A (1997) Restoration of a single superresolution image from several blurred, noisy, and undersampled measured images. IEEE Trans Image Process 6(12):1646–1658
Gomez-Barrero M, Rathgeb C, Li G, Ramachandra R, Galbally J, Busch C (2018) Multi-biometric template protection based on bloom filters. Inf Fusion 42:37–50
Gunjan VK, Prasad PS, Mukherjee S (2020) Biometric template protection scheme-cancelable biometrics. In: ICCCE 2019. Springer, pp 405–411
Gurunathan K, Rajagopalan SP (2020) A stegano-visual cryptography technique for multimedia security. Multimed Tools Appl 79(5):3893–3911
Hu H, Shen G, Liu Y, Fu Z, Yu B (2019) Improved schemes for visual secret sharing based on random grids. Multimed Tools App 78(9):12055–12082
Hwang JW, Lee HS (2004) Adaptive image interpolation based on local gradient features. IEEE Signal Process Lett 11(3):359–362
Jin Z, Lim M-H, Teoh ABJ, Goi BM (2014) A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn Lett 42:137–147
Jin Z, Lim MH, Teoh ABJ, Goi BM, Tay YH (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415–1428
Jin Z, Teoh ABJ, Ong TS , Tee C (2012) Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Syst Appl 39(6):6157–6167
Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28–36
Kaur H, Khanna P (2016) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75(23):16333–16361
Kaur H, Khanna P (2020) Remote multimodal biometric authentication using visual cryptography. In: Proceedings of 3rd International Conference on Computer Vision and Image Processing. Springer, pp 13–25
Kho JB, Kim J, Kim I-J, Teoh ABJ (2019) Cancelable fingerprint template design with randomized non-negative least squares. Pattern Recogn 91:245–260
Kumar N et al (2020) On generating cancelable biometric templates using visual secret sharing. In: Science and Information Conference. Springer, pp 532–544
Kumar G, Tulyakov S, Govindaraju V (2010) Combination of symmetric hash functions for secure fingerprint matching. In: 2010 20th International Conference on Pattern Recognition. IEEE, pp 890–893
Lacharme P, Cherrier E, Rosenberger C (2013) Reconstruction attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT), pp 8
Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications. IEEE, pp 92–97
Lee MJ, Jin Z, Teoh ABJ (2018) One-factor cancellable scheme for fingerprint template protection: Extended feature vector (efv) hashing. In: 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–7
Li C, Hu J (2014) Attacks via record multiplicity on cancelable biometrics templates. Concurr Comput Pract Exper 26(8):1593–1605
Liu W, Xu Y, Zhang M, Chen J, Yang C-N (2019) A novel quantum visual secret sharing scheme. IEEE Access 7:114374–114384
Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recogn 40(3):1057–1065
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain. AK (2002) Fvc2002: Second fingerprint verification competition. In: Object recognition supported by user interaction for service robotsvol 3, pp 811–814. IEEE
Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer Science & Business Media
Mehmood R, Selwal A (2020) Fingerprint biometric template security schemes: Attacks and countermeasures. In: Proceedings of ICRIC 2019. Springer, pp 455–467
Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422–431
Mhala NC, Jamal R, Pais AR (2017) Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process 12(3):422–431
Mhala NC, Pais AR (2019) Contrast enhancement of progressive visual secret sharing (pvss) scheme for gray-scale and color images using super-resolution. Signal Processing162:253–267
Monoth T et al (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput Sci 2:143–148
Monoth T et al (2010) Contrast-enhanced visual cryptography schemes based on additional pixel patterns. In: 2010 International Conference on Cyberworlds. IEEE, pp 171–178
Mukesh R, Subashini VJ (2012) Fingerprint based authentication system using threshold visual cryptographic technique. In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 16–19
Murad SH, Gody AM, Barakat TM (2019) Enhanced security of symmetric encryption using combination of steganography with visual cryptography. arXiv:1902.11167
Nagar A, Nandakumar K, Jain AN (2008) Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 2008 19th International Conference on Pattern Recognition. IEEE, pp 1–4
Nandakumar K, Ratha N , Pankanti S, Darnell S (2017) Secure one-time biometrie tokens for non-repudiable multi-party transactions. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6
Nandakumar. L (2010) A fingerprint cryptosystem based on minutiae phase spectrum. In: 2010 IEEE International Workshop on Information Forensics and Security. IEEE, pp 1–6
Naor M, Shamir A (1994) Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniquespp 1–12. Springer
Patil S, Tajane K, Sirdeshpande J (2015) Enhancing security and privacy in biometrics based authentication system using multiple secret sharing. In: 2015 International Conference on Computing Communication Control and Automation. IEEE, pp 190–194
Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology vol 2. IEEE, pp 572–575
Rao YVS, Sukonkina Y, Bhagwati C, Singh UK (2008) Fingerprint based authentication application using visual cryptography methods (improved id card). In: TENCON 2008-2008 IEEE Region 10 Conference. IEEE, pp 1–5
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell, 29(4):561–572
Ratha NK, Connell JG, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J, 40(3):614–634
Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR’06), vol 4. IEEE, pp 370–373
Revenkar PS, Anjum A, Gandhare WZ (2010) Secure iris authentication using visual cryptography. arXiv:1004.1748
Ross A, Othman A (2010) Visual cryptography for biometric privacy. IEEE Trans Inf Forensic Secur 6(1):70–81
Ross A, Othman AA (2010) Visual cryptography for face privacy. In: Biometric Technology for Human Identification VII, vol 7667. International Society for Optics and Photonics, pp 76670B
Ross AA, Shah J, Jain AK (2005) Toward reconstructing fingerprints from minutiae points. In: Biometric Technology for Human Identification II, volume 5779. International Society for Optics and Photonics, pp 68–80
Sadhya D, Singh SK (2018) Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multimed Tools Appl 77(12):15113–15137
Sandhya M, Prasad MVNK (2015) k-nearest neighborhood structure (k-nns) based alignment-free method for fingerprint template protection. In: 2015 International Conference on Biometrics (ICB). IEEE, pp 386–393
Sandhya M, Prasad MVNK (2016) Securing fingerprint templates using fused structures. IET Biom 6(3):173–182
Sandhya M, Prasad MVNK (2018) Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and t-operators. Pattern Anal Appl 21(2):397–412
Sandhya M, Prasad MVNK, Chillarige RR (2016) Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biom 5(2):131–139
Savvides M, Kumar BVK V, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., vol 3. IEEE, pp 922–925
Sherlock BG, Monro DM, Millard K (1994) Fingerprint enhancement by directional fourier filtering. IEE Proceedings-Vision, Image and Signal Processing 141(2):87–94
Shin SW, Lee M-K, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI journal31(5):628–630
Sinduja R, Sathiya RD, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012). IEEE, pp 650–655
Takur V, Jaiswal R, Sonawane S, Nalavade R et al (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32–36
Tan L, Lu Y, Yan X, Liu L, Zhou X (2020) Xor-ed visual secret sharing scheme with robust and meaningful shadows based on qr codes. Multimed Tools Appl 79(9):5719–5741
Trivedi AK, Thounaojam DM, Pal S (2020) Non-invertible cancellable fingerprint template for fingerprint biometric. Comput Secur 90:101690
Tulyakov S, Farooq F, Mansukhani P, Govindaraju. V (2007) Symmetric hash functions for secure fingerprint biometric systems. Pattern Recogn Lett 28(16):2427–2436
VeriFinger SDK (2010) Neuro technology. VeriFinger, SDK Neuro Technology
Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396
Wang S, Deng G, Hu J (2017) A partial hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations. Pattern Recogn 61:447–458
Wang S, Hu J (2012) Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (ditom) approach. Pattern Recogn 45(12):4129–4137
Wang S, Hu J (2016) A blind system identification approach to cancelable fingerprint templates. Pattern Recogn 54:14–22
Wong WJ, Teoh ABJ, Wong MLD, Kho YH (2013) Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn Lett 34(11):1221–1229
Yan X, Lu Y, Liu L, Wan S, Ding W, Liu H (2016) Contrast-improved visual cryptography for general access structure. In: 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp 578–583
Yan B, Xiang Y, Hua Gx (2018) Improving the visual quality of size-invariant visual cryptography for grayscale images: an analysis-by-synthesis (abs) approach. IEEE Trans Image Process 28(2):896– 911
Yang W, Hu J, Wang S, Stojmenovic M (2014) An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recogn 47(3):1309–1320
Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81–91
Yang W, Wang S, Hu J, Zheng G, Valli C (2019) Security and accuracy of fingerprint-based biometrics: A review. Symmetry, 11(2):141
Yanikoglu B, Kholmatov A (2004) Combining multiple biometrics to protect privacy. In: Proceedings of ICPR-BCTP Workshoppp 43–46
Zhou Z, Yang C-N, Cai S-R, Wang D-S (2019) Boolean operation based visual cryptography. IEEE Access 7:165496–165508
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Muhammed, A., Mhala, N.C. & Pais, A.R. A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. Multimed Tools Appl 80, 10255–10284 (2021). https://doi.org/10.1007/s11042-020-10095-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10095-1