A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation

  • Fengling Han
  • Jiankun Hu
  • Xinghuo Yu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4115)


This paper presents a new biometric encryption protocol in which encryption key is incorporated with fingerprint indexing. Based on the extended chaotic Baker map, the pixel permutation and gray level value substitution are performed to shuffle pixel positions in the original fingerprint images. The encryption key of the pixel permutation is generated by the combination of the random pixel distribution of a fingerprint imprint as well as features used for the fingerprint indexing. In addition to the advantage enjoyed by biometric keys over traditional password/PINs, the proposed biometric encryption approach is very efficient in identity identification within a large database due to the pre-filtering feature of the fingerprint indexing incorporated in the keys. This approach is applicable to the centralized matching scenario where fingerprints need to be encrypted before transmitted. Simulation results have validated the proposed schemes.


Encrypt Image Fingerprint Image Biometric Template Fingerprint Match Fingerprint Classification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)MATHGoogle Scholar
  2. 2.
    Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based Fingerprint Matching. IEEE Trans. on Image Processing 9(5), 846–859 (2000)CrossRefGoogle Scholar
  3. 3.
    Bhanu, B., Tan, X.: Fingerprint Indexing Based on Novel Features of Minutiae Triplet. IEEE Trans. on Pattern Anal. Mach. Intell. 25(5), 616–622 (2003)CrossRefGoogle Scholar
  4. 4.
    Tan, X., Bhanu, B., Lin, Y.: Fingerprint Classification Based on Learned Features. IEEE Trans. on Systems, Man, and Cyber.–part C: Appl. Reviews 35(3), 287–300 (2005)CrossRefGoogle Scholar
  5. 5.
    Jain, A.K., Prabhakar, S., Hong, L.: A Multi-channel Approach to Fingerprint Classification. IEEE Trans. on Pattern Anal. Mach. Intell. 21(4), 348–359 (1999)CrossRefGoogle Scholar
  6. 6.
    Tan, X., Bhanu, B., Lin, Y.: Fingerprint Identification: Classification vs. Indexing. In: Proc. of the IEEE Conf. on Advanced Video and Signal Based Surveillance, pp. 151–156 (2003)Google Scholar
  7. 7.
    Ratha, N.K., Karu, K., Chen, S., Jain, A.K.: A Real-time Matching System for Large Fingerprint Databases. IEEE Trans. on Pattern Anal. Mach. Intell. 18(8), 799–813 (1996)CrossRefGoogle Scholar
  8. 8.
    Liu, T., Zhu, G., Zhang, C., Hao, P.: Fingerprint Indexing Based on Singular Point Correlation. In: Proc. of Intern. Conf. on Image Processing, vol. 3, pp. 293–296 (2005)Google Scholar
  9. 9.
    Boer, J., Bazen, A.M., Gerez, S.H.: Indexing Fingerprint Databases Based on Multiple Features. In: Workshop on Circuits, Systems and Signal Processing, Veldhoven, The Netherlands (2001)Google Scholar
  10. 10.
    Nandakumar, K., Jain, A.K.: Local Correlation-based Fingerprint Matching. In: Proc. of 4th Indian Conf. on Computer Vision, Graphics and Image Processing, Kolkata (2004)Google Scholar
  11. 11.
    Wang, S., Zhang, W., Wang, Y.: Fingerprint Classification by Directional Fields. In: Proc. of 4th IEEE Conf. on Multimodal Interfaces, Pittsburgh, PA, USA (2002)Google Scholar
  12. 12.
    Yen, J.C., Guo, J.I.: A New Key-based Design for Image Encryption and Decryption. Proc. of the IEEE Circuits and Systems 4, 49–52 (2000)Google Scholar
  13. 13.
    Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Map. IEEE Trans. on Circuits and Systems I, 163–169 (2001)MathSciNetGoogle Scholar
  14. 14.
    Fridrich, J.: Symmetric Ciphers Based on Two-dimensional Chaotic Maps. Int. J. Bifurcation and Chaos 8(6), 1259–1284 (1998)MATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Chen, G., Mao, Y., Chui, C.: A Symmetric Encryption Scheme Based on 3D Chaotic Cat Map, Chaos, Solitons & Fractals.  21, 749–761 (2004)Google Scholar
  16. 16.
    Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively, U. Cambridge Tech report UCAM-CL-TR-640Google Scholar
  17. 17.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Fengling Han
    • 1
  • Jiankun Hu
    • 1
  • Xinghuo Yu
    • 1
  1. 1.Science, Engineering and Technology PortfolioRoyal Melbourne Institute of TechnologyMelbourneAustralia

Personalised recommendations