Design and Development of a Multi-Instance Fingerprint Template Security Scheme
Sheikh Imroza Manzoor1 , Abdul Rouf Wani2 , Arvind Selwal3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 1598-1603, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.15981603
Online published on Jun 30, 2018
Copyright © Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal, “Design and Development of a Multi-Instance Fingerprint Template Security Scheme,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1598-1603, 2018.
MLA Style Citation: Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal "Design and Development of a Multi-Instance Fingerprint Template Security Scheme." International Journal of Computer Sciences and Engineering 6.6 (2018): 1598-1603.
APA Style Citation: Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal, (2018). Design and Development of a Multi-Instance Fingerprint Template Security Scheme. International Journal of Computer Sciences and Engineering, 6(6), 1598-1603.
BibTex Style Citation:
@article{Manzoor_2018,
author = {Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal},
title = {Design and Development of a Multi-Instance Fingerprint Template Security Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1598-1603},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2810},
doi = {https://doi.org/10.26438/ijcse/v6i6.15981603}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.15981603}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2810
TI - Design and Development of a Multi-Instance Fingerprint Template Security Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Sheikh Imroza Manzoor, Abdul Rouf Wani, Arvind Selwal
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1598-1603
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
831 | 393 downloads | 313 downloads |
Abstract
Cancellable biometrics is one of the productive areas of biometrics and it guarantees the non-invertibility and revocability properties of an ideal template security scheme. In this paper, various cancellable fingerprint template security schemes, their comparison and a novel method for securing the multi-instance fingerprints have been discussed. The pseudocode of the proposed scheme is also presented. The proposed technique produces one fused secured template and this template is formed with the help of feature level fusion technique. The division method is used to secure both of the templates in order to make them non-invertible. The calculated EER and GAR for the proposed technique are 2.87% and 89.937% respectively.
Key-Words / Index Term
Cancellable Biometrics, Many-to-one mapping, Non-Invertible transforms, Biometric Salting
References
[1] A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A tool for information security,” IEEE Trans. Inf. Forensics Secur., vol. 1, no. 2, pp. 125–143, 2006.
[2] A. K. Jain and A. Kumar, “Biometrics of Next Generation: An Overview,” Second Gener. Biometrics Ethical, Leg. Soc. Context, vol. 11, pp. 49–79, 2010.
[3] O. Ogbanufe and D. J. Kim, “Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment,” Decis. Support Syst., vol. 106, pp. 1–14, 2018.
[4] Introduction to biometrics. "A.K, jain". .
[5] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, 2008.
[6] C. Rathgeb and A. Uhl, “A Survey on Biometric Cryptosystems,” pp. 1–25, 2011.
[7] G. Kumar et al., “Symmetric hash functions for secure fingerprint biometric systems,” Pattern Recognit. Lett., vol. 28, no. 16, pp. 2427–2436, 2007.
[8] G. Kumar, S. Tulyakov, and V. Govindaraju, “Combination of symmetric hash functions for secure fingerprint matching,” Proc. - Int. Conf. Pattern Recognit., pp. 890–893, 2010.
[9] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–572, 2007.
[10] F. Q. F. Quan, S. F. S. Fei, C. A. C. Anni, and Z. F. Z. Feifei, “Cracking Cancelable Fingerprint Template of Ratha,” 2008 Int. Symp. Comput. Sci. Comput. Technol., vol. 2, pp. 572–575, 2008.
[11] S. Wang and J. Hu, “Alignment-free cancelable fingerprint template design : A densely infinite-to-one mapping ( DITOM ) approach,” Pattern Recognit., vol. 45, no. 12, pp. 4129–4137, 2012.
[12] C. Lee and J. Kim, “Journal of Network and Computer Applications Cancelable fingerprint templates using minutiae-based bit-strings,” J. Netw. Comput. Appl., vol. 33, no. 3, pp. 236–246, 2010.
[13] Z. Jin, T. S. Ong, and C. Tee, “Generating Revocable Fingerprint Template Using Polar Grid based 3- Tuple Quantization Technique,” pp. 0–3, 2011.