Abstract
The emergence of biometrics and it’s widespread use in authentication applications made template protection in biometrics an important task to be considered in recent years. In this paper we propose a fingerprint bio-cryptosystem using fuzzy commitment scheme. We constructed Delaunay Neighbor Structures(DNS) from fingerprint minutiae points. Then a bit string representation of DNSs was developed. Bose, Chaudhuri, and Hocquenghem(BCH) error correction code is used along with bit string in the fuzzy commitment scheme to generate a secure template. During decoding phase, BCH decoding is performed to get the codeword. The EER obtained for proposed method on FVC 2002 DB1, DB2 and DB3 are 1.43%, 1.79%, and 5.89% respectively. This shows the credibility of the proposed method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arakala, A., Jeffers, J., Horadam, K.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Advances in Biometrics, vol. 4642, pp. 760–769 (2007)
Isa, M.A.M., Ahmad, M.M., Sani, N.F.M., Hashim, H., Mahmod, R.: Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine. Procedia Computer Science 42, 263–270 (2014)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process., 113:1–113:17 (2008)
Jin, Z., Lim, M.H., Teoh, A.B.J., Goi, B.M.: A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters 42, 137–147 (2014)
Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS 1999, pp. 28–36. ACM (1999)
Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. Journal of Network and Computer Applications 33(3), 236–246 (2010)
Leng, L., Teoh, A.B.J.: Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recognition 48(7), 2290–2303 (2015)
Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33(3), 207–220 (2010)
Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39(7), 6562–6574 (2012)
Lin, S., Costello, D.J.: Error control coding. Prentice Hall (1982)
Liu, E., Liang, J., Pang, L., Xie, M., Tian, J.: Minutiae and modified biocode fusion for fingerprint-based key generation. Journal of Network and Computer Applications 33(3), 221–235 (2010)
Prasad, M.V.N.K., Swathi, P., Rao, C.R., Deekshatulu, B.L.: Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. International Journal of Pattern Recognition and Artificial Intelligence 28(06), 1456013 (2014)
Prasad, M.V.N.K., Kumar, C.S.: Fingerprint template protection using multiline neighboring relation. Expert Systems with Applications 41(14), 6114–6122 (2014)
Neurotechnology VeriFinger SDK: http://www.neurotechnology.com (accessed December 11, 2013)
Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Sandhya, M., Prasad, M.V.N.K.: k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection. In: International Conference on Biometrics (ICB), 2015, pp. 386–393 (2015)
Uludag, U., Jain, A.K.: Attacks on biometric systems: a case study in fingerprints. In: Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633 (2004)
Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition 47(3), 1309–1320 (2014)
Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security, vol. 8300, pp. 81–91 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Sandhya, M., Prasad, M.V.N.K. (2016). A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)