Advertisement

The European Physical Journal Special Topics

, Volume 223, Issue 8, pp 1647–1662 | Cite as

Biometric identification using local iterated function

  • N.M.G. Al-SaidiEmail author
  • M.R.M. Said
Regular Article Chaos Based Image Encryption, Stream Cipher and Authentication
Part of the following topical collections:
  1. Chaos, Cryptography and Communications

Abstract

Biometric identification protocol has been received an increasing interest recently. It is a process that determines person identity by making use of their biometric features. A new biometric identification method is presented in this paper based on partial self-similarity that used to identify features within fingerprint images. This approach is already used in Fractal Image Compression (FIC) due to their ability to represent the images by a limited number of affine transformations, and its variation of scale, translation or rotation. These features give the recognition process high impact and good performance. To process data in a fingerprint image, it first converted into digital format using Optical Fingerprint Reader (OFR). The verification process is done by comparing these data with the server data. The system analysis shows that the proposed method is efficient in terms of memory and time complexity.

Keywords

European Physical Journal Special Topic Smart Card Server Side Iterate Function System Registration Phase 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Francis Galton, Fingerprints (McMillan & Co., London and New York, 1892)Google Scholar
  2. 2.
    C.H. Lin, J.L. Chen, C. Yi Tseng, Expert Syst. Appl. 38, 5081 (2011)CrossRefGoogle Scholar
  3. 3.
    B.B. Mandelbrot, Fractals: Form, Chance, and Dimension (W.H. Freeman and Co, San Francisco, 1977)Google Scholar
  4. 4.
    B.B. Mandelbrot, The Fractal Geometry of Nature (W.H. Freeman and Co., New York, NY-480, 1983)Google Scholar
  5. 5.
    J. Hutchinson, Indiana Univ. J. Math. 30, 713 (1981)CrossRefzbMATHMathSciNetGoogle Scholar
  6. 6.
    M.F. Barnsley, S. Demko, Proc. Royal Soc. London A399, 243 (1985)ADSCrossRefMathSciNetGoogle Scholar
  7. 7.
    M.F. Barnsley, Fractals everywhere, 2nd ed. (Academic Press Professional, Inc., San Diego, CA, USA, 1993)Google Scholar
  8. 8.
    M.F. Barnsley, L.P. Hud, Fractal Image Compression (AK Peters, Ltd., Wellesley, Massachusetts, 1993)Google Scholar
  9. 9.
    Y. Fisher, Fractal image compression: theory and application (Springer-Verlag, New York, 1995)Google Scholar
  10. 10.
    A. Jacquin, IEEE Trans. Image Process. 1, 18 (1992)ADSCrossRefGoogle Scholar
  11. 11.
    A. Kouzani, S. Nahavandi, Proc. IEEE Int. Conf. Syst. Man, Cybernetics, 1372 (2000)Google Scholar
  12. 12.
    T. Tan, H. Yan, Proc. 15th Int. Conf. Patt. Recognition 2, 781 (2000)Google Scholar
  13. 13.
    H. Komleh, V. Chandran, S. Sridharan, Proc. Int. Conf. Image Proc. 3, 58 (2001)Google Scholar
  14. 14.
    T. Tan, H. Yan, IEEE Trans. Syst., Man Cybernet. Part C, Appl. Rev. 35(4), 576 (2005)CrossRefGoogle Scholar
  15. 15.
    M. Jampour, et al., IEEE Int. Conf. ITNG, 1319 (2009)Google Scholar
  16. 16.
    M. Jampour, M.M. Mohammad, A. Soleymani, M. Ashourzadeh, M. Yaghoobi, Int. J. Inter. Multimedia Artif. Intell. 1(3), 27 (2010)Google Scholar
  17. 17.
    M. Jampur, R. Ebrahimzadeh, M. Yahoobi, A.S. Nezhad, Int. J. Patt. Recogn. Artificial Intell. 26(4) (2012)Google Scholar
  18. 18.
    K. Xi, H. Jiankun, Bio-Cryptography in Handbook of Information and Communication Security (Springer, 2010)Google Scholar
  19. 19.
    K. Xi, T. Ahmed, F. Han, J. Hu, A Fingerprint Based Bio-Cryptographic Security Protocol Designed for Client/server Authentication in Mobile Computing Environment. Security and Communication Networks (John Wiley and Sons, 2011)Google Scholar
  20. 20.
    J.K. Lee, S.R. Ryu, K.Y. Yoo, IEE Electr. Lett. 12(38), 554 (2002)CrossRefGoogle Scholar
  21. 21.
    L. Liang, Q. Wang, K. Lv, H. Ning, A fingerprint key binding algorithm based on vector quantization and error correction. Proceedings Article, SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), (2012)Google Scholar
  22. 22.
    A.Z. Kouzani, Mach. Vision Appl. 19(4), 223 (2008)CrossRefGoogle Scholar
  23. 23.
    N. Polikarpova, Proc. Int. Conf. Pattern Recognition 3, 591 (1996)CrossRefGoogle Scholar
  24. 24.
    K. Gdawiec, Man-Mach. Inter. Adv. Intell. Soft Comput. 59, 451 (2009)CrossRefGoogle Scholar
  25. 25.
    D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Fingerprint Analysis and Representation, Handbook of Fingerprint Recognition (Springer, London, 2009), p. 97Google Scholar
  26. 26.
    E. Henry, Classification and Uses of Finger Prints (Routledge, London, 1900)Google Scholar
  27. 27.
    D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar, Fingerprint Sensing, Handbook of Fingerprint Recognition (Springer, London, 2009), p. 57Google Scholar
  28. 28.
    C. Fu, C.Y. Chen, Comput. Sci.-Technol. Appl. IFCSTA ’09. 1, 294 (2009)CrossRefMathSciNetGoogle Scholar
  29. 29.
    N.M.G. AL-Saidi, M.R.M. Said, A.M. Ahmed, J. Comput. Sci. 7(4), 526 (2011)CrossRefGoogle Scholar
  30. 30.
    S.K. Mitra, M.K. Kundu, C.A. Murthy, B.B. Bhattacharya, T. Acharya, Fund. Inform. 87, 1 (2008)MathSciNetGoogle Scholar
  31. 31.
    W. Yung-Gi, H. Ming-Zhi, W. Yu-Ling, Proc. Int. Conf. Multimedia Expo (ICME ’03) 1, 353 (2003)Google Scholar
  32. 32.
    L. Guojun, Image Comm. 5(4), 327 (1993)Google Scholar
  33. 33.
    N.M.G. Al-Saidi, M.R. Md. Said, W.A.M. Othman, J. Appl. Math. 2012 (2012)Google Scholar
  34. 34.
    W. Diffie, M. Hellman, IEEE Trans. Inform. Theory 22(6), 644 (1976)CrossRefzbMATHMathSciNetGoogle Scholar

Copyright information

© EDP Sciences and Springer 2014

Authors and Affiliations

  1. 1.The Branch of Applied Mathematics, Applied Sciences Department, University of TechnologyBaghdadIraq
  2. 2.Institute for Mathematical Research (INSPEM), Universiti Putra MalaysiaDarul EhsanMalaysia

Personalised recommendations