Skip to main content

A Chaff-Point Based Approach for Cancelable Template Generation of Fingerprint Data

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 83))

Abstract

In the recent biometric community security of biometric information has accepted basic significance. Cancelable biometrics is the one technique to do this, which manage before biometric information putting away in the database transforming the biometric information, in a manner that relative minutiae data is not defiled in the transformed template. This paper shows an investigation of few methods of generating cancelable biometric templates. The security level of current biometric framework is upgraded by the structure of fuzzy vault as far as concealing secret key and ensuring the template, by applying a binding strategy on biometric template and cryptographic key. Apply cyclic redundant code(CRC) to distinguish a real polynomial from an arrangement of competitors in light of its straightforwardness. In CRC based fuzzy vault scheme to overcome issue of blend substitution attack two new module is proposed chaff point verifier along with generator. The systems dispense with a blend substitution assault to enhance general security and, subsequently it can distinguish any alteration in vault.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ala, A.-F., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Comm. Surv. Tutorials 17(4), 2347–2376 (2015)

    Article  MathSciNet  Google Scholar 

  2. Karagiannis, V.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)

    Google Scholar 

  3. Luzuriaga, E.J.: A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks.In: 12th Annual IEEE Consumer Communications and Networking Conference. IEEE (2015)

    Google Scholar 

  4. Fernandes, L.J.: Performance evaluation of RESTful web services and AMQP protocol. In: Fifth International Conference on Ubiquitous and Future Networks. IEEE (2013)

    Google Scholar 

  5. Rostanski, M., Grochla, K., Seman, A.: Evaluation of highly available and fault-tolerant middleware clustered architectures using RabbitMQ. In: Federated Conference on Computer Science and Information Systems. IEEE (2014)

    Google Scholar 

  6. Xiong, X., Fu, J.: Active status certificate publish and subscribe based on AMQP. In: International Conference on Computational and Information Sciences. IEEE (2011)

    Google Scholar 

  7. Subramoni, H.: Design and evaluation of benchmarks for financial applications using advanced message queuing protocol (AMQP) over InfiniBand. In: Workshop on High Performance Computational Finance. WHPCF. IEEE (2008)

    Google Scholar 

  8. Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87 (2006)

    Article  Google Scholar 

  9. AMQP: Advanced Message Queuing, version 0.8, AMQP working group protocol specification (2006). http://www.iona.com/opensource

  10. Programming WireAPI. http://www.openamq.org/

  11. Pivotal Software Inc., Messaging that just works. https://www.rabbitmq.com (2014)

  12. Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: “Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm”. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)

    Google Scholar 

  13. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing, Bangalore, India, pp. 248–251 (2010)

    Google Scholar 

  14. Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)

    Article  Google Scholar 

  15. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)

    Article  Google Scholar 

  16. Panchal, G., Panchal, D.: Solving np hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)

    Google Scholar 

  17. Panchal, G., Panchal, D.: 11 Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)

    Google Scholar 

  18. Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. 4(4), 1503–1506 (2015)

    Google Scholar 

  19. Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. 4(4), 1507–1511 (2015)

    Google Scholar 

  20. Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, pp. 1–6 (2016)

    Google Scholar 

  21. Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer, New York (2016)

    Google Scholar 

  22. Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer, New York (2017)

    Google Scholar 

  23. Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)

    Google Scholar 

  24. Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems, p. 6 (2017)

    Google Scholar 

  25. Patel, J., Panchal, G.: An iot based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development, pp. 1–6 (2017)

    Google Scholar 

  26. Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems, pp. 1–6 (2017)

    Google Scholar 

  27. Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems, pp. 1–6 (2017)

    Google Scholar 

  28. Bhimani, P., Panchal, G.: Message delivery guarantee and status up- date of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development, pp. 1–6 (2017)

    Google Scholar 

  29. Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems, p. 6 (2017)

    Google Scholar 

  30. Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurang Panchal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Patel, G., Panchal, G. (2018). A Chaff-Point Based Approach for Cancelable Template Generation of Fingerprint Data. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics