Skip to main content
Top
Published in: Journal of Medical Systems 5/2019

01-05-2019 | Image & Signal Processing

A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault

Authors: V. Sujitha, D. Chitra

Published in: Journal of Medical Systems | Issue 5/2019

Login to get access

Abstract

Biometric authentication is the process of recognizing a person by means of his\her psychological or behavioral traits. One of the most important issues faced by the biometric system developer is to protect the template obtained from the biometric of a person. Unimodal biometric system has some drawbacks such as noisy data, interclass variations and spoof attack. Multimodal biometric system has been developed to address the boundaries of unimodal biometric system and increase the security of template. In this paper, template security analysis of multimodal biometric system based of fingerprint and palmprint is proposed and implemented. Fuzzy vault scheme is employed to protect both the fingerprint and palmprint template. At enrollment, image processing techniques such as image enhancement, segmentation and bottom-hat filtering are applied on both the biometric to improve the quality and subsequently the most important features are extracted. Extracted features are concatenated. Combined features along with secret key are utilized to generate the database in the vault. During authentication, query images are sent as an input with the stored template to recover the key. Experimental results are shown that the proposed multi biometrics system performs well than the other methods considered for comparison.
Literature
1.
go back to reference Fu, B., Yang, S. X., Li, J., and Hu, D., Multibiometric Cryptosystem: Model Structure and Performance Analysis. IEEE Transactions on Information Forensics and Security 4(4):867–882, 2009.CrossRef Fu, B., Yang, S. X., Li, J., and Hu, D., Multibiometric Cryptosystem: Model Structure and Performance Analysis. IEEE Transactions on Information Forensics and Security 4(4):867–882, 2009.CrossRef
2.
go back to reference Brindha, V. E., and Natarajan, A. M., Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault. Journal of Biometrics & Biostatistics 3(6):1–6, 2012.CrossRef Brindha, V. E., and Natarajan, A. M., Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault. Journal of Biometrics & Biostatistics 3(6):1–6, 2012.CrossRef
3.
go back to reference Sanjekar, J. B., and Patil, P. S., An Overview of Multimodal Biometrics, Signal & Image Processing. An International Journal (SIPIJ) 4(1):57–64, 2013. Sanjekar, J. B., and Patil, P. S., An Overview of Multimodal Biometrics, Signal & Image Processing. An International Journal (SIPIJ) 4(1):57–64, 2013.
4.
go back to reference Mishra, A., Multimodal Biometrics it is: Need for Future System. Int. J. Comput. Appl. 3(4):28–33, 2010. Mishra, A., Multimodal Biometrics it is: Need for Future System. Int. J. Comput. Appl. 3(4):28–33, 2010.
5.
go back to reference Prakash, S. M., Betty, P., and Sivanarulselvan, K., Fusion of Multimodal Biometrics using Feature and Score Level Fusion. International Journal on Applications in Information and Communication Engineering 2(4):52–56, 2016. Prakash, S. M., Betty, P., and Sivanarulselvan, K., Fusion of Multimodal Biometrics using Feature and Score Level Fusion. International Journal on Applications in Information and Communication Engineering 2(4):52–56, 2016.
6.
go back to reference Nagar, A., Nandhakumar, K., and Jain, A. K., Multibiometric cryptosystem based on feature level fusion. IEEE Transaction on Information Forensics and Security 7(1):255–268, 2012.CrossRef Nagar, A., Nandhakumar, K., and Jain, A. K., Multibiometric cryptosystem based on feature level fusion. IEEE Transaction on Information Forensics and Security 7(1):255–268, 2012.CrossRef
7.
go back to reference Juels, A., and Sudan, M., A fuzzy vault scheme. Des. Codes Crypt. 38(2):237–257, 2006.CrossRef Juels, A., and Sudan, M., A fuzzy vault scheme. Des. Codes Crypt. 38(2):237–257, 2006.CrossRef
8.
go back to reference Juels, A., and Wattenberg, M., A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, New York: ACM, 28–36, 1999. Juels, A., and Wattenberg, M., A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, New York: ACM, 28–36, 1999.
9.
go back to reference Draper, S., Khisti, A., Martinian, E., Vetro, A., and Yedidia, J. S., Using distributed source coding to secure fingerprint biometrics. IEEE International Conference on Acoustics, Speech and Signal Processing, IN-9582274, 2007. Draper, S., Khisti, A., Martinian, E., Vetro, A., and Yedidia, J. S., Using distributed source coding to secure fingerprint biometrics. IEEE International Conference on Acoustics, Speech and Signal Processing, IN-9582274, 2007.
10.
go back to reference Dodis, Y., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in cryptology-Euro crypt, Springer Berlin Heidelberg, 523–540, 2004.CrossRef Dodis, Y., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in cryptology-Euro crypt, Springer Berlin Heidelberg, 523–540, 2004.CrossRef
11.
go back to reference Uludag, U., and Jain, A. K., Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of IEEE Workshop on Privacy Research in Vision, pp. 163–169, 2006. Uludag, U., and Jain, A. K., Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of IEEE Workshop on Privacy Research in Vision, pp. 163–169, 2006.
12.
go back to reference Orencik, C., Fuzzy vault scheme for fingerprint verification: implementation, analysis and improvements. Sabanci University, pp. 1–50, 2008. Orencik, C., Fuzzy vault scheme for fingerprint verification: implementation, analysis and improvements. Sabanci University, pp. 1–50, 2008.
13.
go back to reference NandaKumar, K., Multibiometric systems: fusion strategies and template security. PhD Thesis, Department of Computer Science and Engineering, Michigan State University, 2008. NandaKumar, K., Multibiometric systems: fusion strategies and template security. PhD Thesis, Department of Computer Science and Engineering, Michigan State University, 2008.
14.
go back to reference Vinothkanna, R., and Wahi, A., Fuzzy Vault Fusion Based Multimodal Biometric Human Recognition System with Fingerprint and Ear. J. Theor. Appl. Inf. Technol. 59(2):304–316, 2014. Vinothkanna, R., and Wahi, A., Fuzzy Vault Fusion Based Multimodal Biometric Human Recognition System with Fingerprint and Ear. J. Theor. Appl. Inf. Technol. 59(2):304–316, 2014.
15.
go back to reference Selwal, A., Gupta, S. K., and Kumar, S., A Scheme for Template Security at Feature Fusion Level in Multimodal Biometric System. Advances in Science and Technology 10(31):23–30, 2016. Selwal, A., Gupta, S. K., and Kumar, S., A Scheme for Template Security at Feature Fusion Level in Multimodal Biometric System. Advances in Science and Technology 10(31):23–30, 2016.
16.
go back to reference Bhowmik, P., Bhowmik, K., Azam, M. N., and Rony, M. W., Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5):117–121, 2012. Bhowmik, P., Bhowmik, K., Azam, M. N., and Rony, M. W., Fingerprint image enhancement and its feature extraction for recognition. Int. J. Sci. Technol. Res. 1(5):117–121, 2012.
17.
go back to reference Tatar, F., and Machhout, M., Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2):1–16, 2017. Tatar, F., and Machhout, M., Improvement of the fingerprint recognition process. Int. J. Bioinform. Biosci. 7(2):1–16, 2017.
18.
go back to reference Tam, B., Mihăilescu, P., and Munk, A., Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5):985–998, 2015.CrossRef Tam, B., Mihăilescu, P., and Munk, A., Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5):985–998, 2015.CrossRef
19.
go back to reference Malik, J., Sainarayanan, G., and Dahiya, R., Personal Authentication using Palmprint with Sobel Code, Canny Edge and Phase Congruency Feature Extraction Method. ICTACT Journal on Image and Video Processing 2(3):357–368, 2012.CrossRef Malik, J., Sainarayanan, G., and Dahiya, R., Personal Authentication using Palmprint with Sobel Code, Canny Edge and Phase Congruency Feature Extraction Method. ICTACT Journal on Image and Video Processing 2(3):357–368, 2012.CrossRef
20.
go back to reference Bruno, A., Carminetti, P., Gentile, V, La Cascia, M., and Mancino, E., Palmprint principal lines extraction. In the proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, BIOMS, 2014. Bruno, A., Carminetti, P., Gentile, V, La Cascia, M., and Mancino, E., Palmprint principal lines extraction. In the proceedings of the IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, BIOMS, 2014.
21.
go back to reference Jain, K., Nandakumar, K., and Nagar, A., Biometric template security. EURASIP Journal on Advances in Signal Processing:1–17, 2008. Jain, K., Nandakumar, K., and Nagar, A., Biometric template security. EURASIP Journal on Advances in Signal Processing:1–17, 2008.
22.
go back to reference Nandakumar, K., Jain, A. K., and Pankanti, S., Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4):744–757, 2007.CrossRef Nandakumar, K., Jain, A. K., and Pankanti, S., Fingerprint based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4):744–757, 2007.CrossRef
23.
go back to reference Meenakshia, V. S., and Padmavathi, G., Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc, Computer. Science. 2:195–206, 2010.CrossRef Meenakshia, V. S., and Padmavathi, G., Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Proc, Computer. Science. 2:195–206, 2010.CrossRef
24.
go back to reference Kholmatov, A., and Yanikoglu, B., Realization of correlation attack against the fuzzy vault scheme. Proc. SPIE 6819:681900–681907, 2008. Kholmatov, A., and Yanikoglu, B., Realization of correlation attack against the fuzzy vault scheme. Proc. SPIE 6819:681900–681907, 2008.
Metadata
Title
A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault
Authors
V. Sujitha
D. Chitra
Publication date
01-05-2019
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2019
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-019-1220-x

Other articles of this Issue 5/2019

Journal of Medical Systems 5/2019 Go to the issue