Open Access Open Access  Restricted Access Subscription or Fee Access

Attack Resistant Fingerprint Recognition System Using Biocryptography

P Janani, K Ramakrishnan

Abstract


Biometric is one of the unique features are used for the person identification process. The biometric features like fingerprints, palmprints, eye retina and face recognition are used for the authentication process. Maintenance and verification of biometric features is the complex task for the person identification applications. Alignment-free fingerprint cryptosystems perform matching using relative information between minutiae features. Minutiae structure can avoid the recognition errors and information leakage caused by template alignment/registration. Most local minutiae structures only contain relative information of a few minutiae in a local region. They are less discriminative than the global minutiae pattern.
The similarity measures for trivially/coarsely quantized features cannot provide a robust way to deal with nonlinear distortions, a common form of intraclass variation. The recognition accuracy of current alignment-free fingerprint cryptosystems is unsatisfying. The system uses an alignment-free fuzzy vault-based fingerprint cryptosystem using highly discriminative pair-polar (P-P) minutiae structures. The adequate quantization used in the system can largely maintain information about a fingerprint template and enables the direct use of a traditional, well-established minutiae matcher. In terms of template/key protection, the system fuses cancelable biometrics and biocryptography.
Transforming the P-P minutiae structures before encoding abolishes the correlations between them and can provide privacy-enhancing features, such as revocability and protection against cross matching by setting distinct transformation seeds for different applications. The fingerprint recognition system is enhanced to handle the brute force attacks. The biocryptography mechanism can be integrated with other data security operations. The system is tuned to perform the biometric based security operations under distributed environment.

Full Text:

PDF

References


D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar. Handbook of Fingerprint Recognition. 2nd Edn., Springer; 2009.

N.K. Ratha, S. Chikkerur, J.H. Connell, R.M. Bolle. Generating cancelable fingerprint templates, IEEE Trans Pattern Anal Mach Intell. 2007; 29(4): 561–72p.

Q. Feng, F. Su, A. Cai, Cracking cancelable fingerprint template of ratha, In: The International Symposium on Computer Science and Computational Technology (ISCSCT’08). 2008, 572–5p.

S.W. Shin, M.-K. Lee, D. Moon, K. Moon. Dictionary attack on functional transform-based cancelable fingerprint templates, ETRI J. 2009; 31(5): 628–30p.

H. Yang, X. Jiang, A.C. Kot. Generating secure cancelable fingerprint templates using local and global features, In: Second IEEE International Conference on Computer Science and Information Technology. 2009, 645–9p.

S. Chikkerur, N. Ratha, J. Connell, R. Bolle. Generating registration-free cancelable fingerprint templates, In: Second IEEE International Conference on Biometrics: Theory, Applications and Systems. 2008, 1–6p.

Z. Jin, A. Teoh, T.S. Ong, C. Tee. Secure minutiae-based fingerprint templates using random triangle hashing, In: First International Visual Informatics Conference. 2009, 521–31p.

Z. Jin, A. Teoh, T.S. Ong, C. Tee. A revocable fingerprint template for security and privacy preserving, KSII Trans Internet Inform Syst. 2010; 4(6): 1327–41p.

[C. Lee, J. Kim. Cancelable fingerprint templates using minutiae-based bit-strings, J Network Comput Appl. 2010; 33(3): 236–46p.

Z. Jin, A. Teoh, T.S. Ong, C. Tee. Generating revocable fingerprint template using minutiae pair representation, In: The Second International Conference on Education Technology and Computer (ICETC). 2010, V5/251–5p.


Refbacks

  • There are currently no refbacks.