Mixing Fingerprint Features for Template Security Shancymol Sojan 1,R.K.Kulkarni 2 1 PG scholar, 2 PhDProfessor,
|
|
- Clementine Willis
- 5 years ago
- Views:
Transcription
1 Mixing Fingerprint Features for Template Security Shancymol Sojan 1,R.K.Kulkarni 2 1 PG scholar, 2 PhDProfessor, Electronics and Telecommunication Dept, VESIT, Mumbai, Maharashtra, India Abstract Most of the authentication systems today don t just use traditional systems like password or PIN but also rely on biometrics for a better security. Securing the biometric template is thus becoming a major concern in biometrics based systems. Although it is possible to use different biometric traits in combination (multi- modal biometrics) to enhance security, it is computationally expensive and time consuming. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e keeping it unimodal but still offering the same security as that of the combined biometrics. The algorithm consists of extracting minutiae and orientation features from two different fingerprints and producing a mixed template using these extracted features. The template produced is tested using correlation based matching technique and the correlation co-efficient is calculated. The advantage of creating the mixed template is that it is cancellable and serves as a new virtual identity. Keywords minutiae,orientation, normalizaiton,spurious minutiae, cross numbering, mixing template,tempalte security,correlation-based matching. I. INTRODUCTION Authentication and security are one of the major concerns of today. Authentication based on passwords and PINS have a risk of being stolen or misused. In such a case, biometrics acts as an effective solution as it offers high security over these methods. Biometric traits can be either physiological like fingerprint, iris, face, palm or behavioral like gesture, gait etc[1],[2].out of these, fingerprints are the most commonly used biometric trait. Recently efforts are directed towards securing the stored templates as template theft is a serious issue wherein it is difficult to revoke or reissue a stolen template. The existing template protection techniques can be classified into biometric cryptosystem (key-binding and key-generation), feature transformation method (salting and non-invertible transforms), multimodal techniques (for eg.face + iris), feature combination methods, etc.biometric cryptosystems are also called helper data-based method. In the key binding scheme, a key is chosen and binded to the biometric template whereas in key generation scheme, keys are generated with the help of the given biometric and a helper key and in the matching process the keys are matched. Examples of bio-cryptosystems [3] are fuzzy commitment scheme, fuzzy vault technique [4],shielding functions [5], quantization schemes[6], etc.these method helps in hiding the user identity but has an inevitable drawback that it is very much possible to reconstruct the template if the key and the protected fingerprint is stolen thus compromising the user sidentity. Methods based on feature transformation are noninvertible transforms and salting approach. Teoh et al. proposed a bio hashing approach based on the inner products between the user s fingerprint features and a tokenized pseudo-random number[7].ratha et al. proposed to generate cancelable fingerprint templates by applying non-invertible transforms on the minutiae. This transform will usually lead to a reduction in matching accuracy as it is performed by a key [8].The methods based on bio hashing approach, non invertible transform approach provides better accuracy however it is vulnerable to intrusion and linkage attacks when both the key and the transformed template are stolen. The methods based on combining templates can be either combining features from the same biometric trait or using two or more biometric traits (mutimodal)[9]. ErenCamlikaya et al.[10] presented a multimodal biometric verification system by mixing fingerprint and voice modalities where minutiae from fingerprint is combined with artificially generated points from voice. Multibiometric template scheme has been used for providing robust integrity among fingerprint templates and difficult for the attacker to distinguish a mixed fingerprint from the original fingerprints, however the ridge enhancement is not addressed in these approaches. Yanikoglu et al.[11] presented two distinct fingerprints into a single identity either in the image level or in the feature level. In this the minutiae features of the two fingerprints are combined. The drawback here is that the combined template will have more minutiae points than the single fingerprint which makes it very easy for the attacker to guess. Arun Ross[12], [13], [14] presented the method in which the spiral and continuous components of two different fingerprint are mixed.in visual cryptography method [3], two sheets are generated from fingerprint and they are ISSN: Page 355
2 overlaid to produce a temporary template. However, there is a practical limitation in storing the sheets in separate databases owing to which it can t be used in many applications. In [15], Feng has combined minutiae features of two fingerprints. In [16], the combined fingerprint template is generated by combining minutiae and orientation points from different fingerprints. The advantage here is that it is possible to use the existing matching techniques on the combined template and it helps to create a new virtual identity. Papers [17-21] discuss fingerprint feature enhancement techniques. Minutiae feature or Galton feature extraction methods are discussed in [22-29]. It can broadly be classified into those that work on binarized images and those that work on grey scale images. Methods that work on binarized images are thinning-based & non-thinning based. Examples are chain code based, morphology based, run representation, cross numbering based, etc. Methods that directly work on gray-scale images are ridge line following based and fuzzy based. Among these, cross numbering based method which works on thinned images is most widely used. The orientation extraction methods are discussed in [30-35] which can be categorized as pixel-alignment based method, local method and global method. The accuracy of pixelalignment based method is limited to fixed number of discrete reference orientation values and computational complexity increases proportional to the number of reference orientations.some of the local methods are filter bank, wavelet projection, gradient based& spectral estimation of which the gradient based approach gives a more accurate result. Global methods are based on mathematical modeling of data. Though model based approach is robust to noise, the inefficiency in developing a perfect mathematical model to represent fingerprint of every individual is deterring it from being a popular approach. Fingerprint matching methods are discussed in [36-41]. The rest of the paper is organized as follows: Section II discusses the proposed mixed template recognition system. Section IIIdiscusses the matching methods and the parameters to evaluate the performance of the system. Section IV gives the results of minutiae and orientation extraction followed by conclusion and future work in section V. II. PROPOSED MIXED FINGERPRINT TEMPLATE RECOGNITION SYSTEM In the system, as shown in Fig.1, the minutiae and orientation features are extracted from fingerprints F1 and F2 respectively and using a coding strategy they are combined to produce a new template. This template is stored in the database and will be used for user verification. The advantage of creating mixed template is that it is more robust than single fingerprint matching. Even if a template is stolen, the identity of the user is not compromised. It is also possible to create cancellable templates using this technique. Thus it is a method that helps to create a whole new virtual identity to the user and also gives security to the biometric template. Fingerprint 1 Fingerprint 2 Fig 1.Proposed work A. Algorithm for minutiae generation Minutiae generation is done by the method of cross numbering as discussed in[29].in cross numbering method, 8-connected ridge flow pattern of skeletonized image is used and by scanning the local neighbourhood of each pixel, CN value is computed. CN =1 corresponds to a ridge ending, and a CN =3 corresponds to a bifurcation. The steps are as follows: (i) Preprocess the image using binarization and thinning process. (ii)use theminutiefunctionto find CN and categorize the points as ridge ending or ridge bifurcation. (iii) Remove spurious minutiae. Minutiae points CODING Orientation points (iv)save the minutiae points i.e. the coordinates and minutie direction. B. Algorithm for orientation generation The angle formed by the horizontal line with the ridge inclination is called as orientation[33]. Orientation computation is a block-wise operation and the steps are as follows: (i) Preprocess the image using normalization technique. (ii)divide the image into wxw overlapping blocks. Mixed Template ISSN: Page 356
3 (iii)compute gradients and using Sobel filter. (iv)compute average gradient vectors and. (v) Estimate the direction. Once the minutiae and orientation are extracted from the respective templates, unique mixed template is created. C. Algorithm for mixed template generation Let the first fingerprint be F1 and the second one be F2.The features extracted from both the fingerprints are combined to generate a single mixed template. (i)extract minutiae points from F1. (ii) Extract orientation points from F2. (iii)linear combination of F1 and F2. (iv)generate the binary ridge pattern of the combined image (v)generate the combined minutiae. (vi) Apply 32 point FFT to enhance the image. (vii)apply noise removal steps to reconstruct the template that looks similar to a real fingerprint. The mixed template thus formed is stored in the database. III. MATCHING TECHNIQUES AND PERFORMANCE PARAMETERS Fingerprint matching methods can be broadly classified as correlation based [40], minutiae based [36-38] and non-minutiae based matching [42].In minutiae based method, the minutiae points from the test and query fingerprints are computed and the matching score is computed. In correlation based method, the correlation coefficient is used to compute the degree of matching between two fingerprints. In non-minutiae based matching, parameters other than minutiae like core points, delta points etc can be computed and matched. A matching threshold can be set in order to distinguish the genuine and imposter fingerprints. The most common performance parameters of fingerprint based system are and where is the false rejectionrate and is the false acceptance rate. Using these parameters the Receiver Operating Curve ( ) can be plotted. The accuracy of the system can be computed using statistical parameters like precision ( ), recall ( ) and F-measure ( )..Precision of positive predictive value denotes the percentage of selected items that are correct. Recall or true positive rate or sensitivity is the percentage of correct items that are selected. F- measure of F-score is the indication of the accuracy of the test. It is calculated as the harmonic mean of and given by equation (i). The accuracy is given by equation (ii). (i)...(ii) where stands for true positive, stands for true negative, stands for false positive and stands for true negative. IV. RESULTS AND DISCUSSION The minutiae points are extracted as per the algorithm in section 2.1, the orientation points are extracted as per algorithm in section 2.2 and the mixed template is generated as per algorithm in section 2.3. The first fingerprint is taken from database FVC 2000 and the other is from database NIST. The mixed template generated is shown in Fig.2. Two such databases were created, one with the first impression of the input fingerprints called the test database and the other with the second impressions of the input fingerprints called the query database. The purpose of creating the query database is to test the system against attack on the template. Some of the mixed templates created are shown in Fig 3. Matching the templates was done using correlation based method. The correlation coefficient, efficiency and match time have been computed for each template. Two scenarios are considered: (I) when the exact two input fingerprints are used for verification ;(II) when a slightly different impression of the exact fingerprints are used or verification. The system was accurately able to identify the correct user in both the scenarios. (a) (b) (c) (f) (e) (d) ISSN: Page 357
4 Fig 2. Mixed template generation: (a) F1 output,(b) F2 output,(c) combination of F1 and F2,(d) combined minutiae (e)noisy result after enhancement,(e) mixed template. The template registration time has three aspects; the minutiae extraction time, orientation extraction time and the mixed template generation time. Even if this time is more compared to a single fingerprint feature extraction, once the templates have been registered, what matters is the verification time. The one-to-one matching time and other performance parameters for scenario II for a few templates are as seen in Table 1. Precision, recall, F-measure for the templates are as shown in Table 2. Input 1 Input2 Mixed template Table 2. Statistical parameters Template Precision Recall F-measure V. CONCLUSION AND FUTURE WORK In this paper, a template security method has been proposed. The minutiae and orientation features from two fingerprints are used to synthesize a new mixed template. The performance evaluation of the system shows that it is possible to use the same matching methods available for single fingerprint and achieve is acceptable accuracy and verification time. Here the matching is performed using correlation-based method but the correlation coefficients are lower due to the nature of the mixed template. Future work would be to use feature based matching of the templates and try to improve the performance of the system. VI. REFERENCES Fig 3. Results of mixed template generation Average template registration time is about seconds and the average verification time is about secs. Table 1. Performance Evaluation of the system Template Registration time (secs) Correlation coefficient Accuracy Verification time (secs) [1] Delac, Kresimir, and MislavGrgic. "A survey of biometric recognition methods." Electronics in Marine, Proceedings Elmar th International Symposium. IEEE, [2] Maltoni, Davide, et al. Handbook of fingerprint recognition.springer Science & Business Media, 2009 [3] Ross and A. Othman, Visual cryptography for biometric privacy, IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp ,Mar [4] K. Nandakumar, A. K. Jain, and S. Pankanti, Fingerprintbased fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp , Dec [5] Huixian, Li, et al. "Key binding based on biometric shielding functions."information Assurance and Security, IAS'09. Fifth International Conference on. Vol. 1. IEEE, [6] Chua, ShingChyi, EngKiong Wong, and Alan Wee Chiat Tan. "Fingerprint Singular Point Detection via Quantization and Fingerprint Classification."World of Computer Science & Information Technology Journal 5.12 (2015). [7] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognit., vol. 37, no. 11, pp , 2004 [8] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating cancellable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp , Apr [9] B.Yanikoglu and A. Kholmatov, Combining multiple ISSN: Page 358
5 biometrics to protect privacy, in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug [10] E. Camlikaya, A. Kholmatov, and B. Yanikoglu, Multibiometric templates using fingerprint and voice, Proc. SPIE, vol I, pp I I-9, [11] Yanikoglu and A. Kholmatov, Combining multiple biometrics to protect privacy, in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug [12] Ross and A. Othman, Mixing fingerprints for template security and privacy, in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29 Sep. 2, [13] Ross and A. Othman, Mixing fingerprints for template security and privacy, in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29 Sep. 2, [14] A.Othman and A.Ross, Mixing fingerprints for generating virtual identities, in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29 Dec. 2, [15] Jianjiang Feng, Combining Minutiae Descriptors For Fingerprint Matching, April [16] Li, Sheng, and Alex C. Kot. "Fingerprint combination for privacy protection."ieee transactions on information forensics and security 8.2 (2013): [17] Thai, Raymond. "Fingerprint image enhancement and minutiae extraction."the University of Western Australia (2003). [18] Hanoon, Muna F. "Contrast fingerprint enhancement based on histogram equalization followed by bit reduction of vector quantization." International Journal of Computer Science and Network Security 11.5 (2011): [19] Hong, Lin, Yifei Wan, and Anil Jain. "Fingerprint image enhancement: algorithm and performance evaluation." Pattern Analysis and Machine Intelligence, IEEE Transactions on 20.8 (1998): [20] Greenberg, Shlomo, et al. "Fingerprint image enhancement using filtering techniques." Pattern Recognition, Proceedings. 15th International Conference on. Vol. 3. IEEE, [21] Carneiro, Romulo Ferrer L., et al. "Techniques of Binarization, Thinning and Feature Extraction Applied to a Fingerprint System." International Journal of Computer Applications (2014 [22] Zhixin Shi, VenuGovindaraju, A chaincode based scheme for fingerprint feature extraction, Pattern Recognition Letters, vol. 27, 2006, pp [23] Zenzo, L. Cinque, and S. Levialdi, Run-Based Algorithms for Binary Image Analysis and Processing, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 18, no. 1, 1996, pp [24] J Hwan Shin, H. Y. Hwang, S Chien, Detecting fingerprint minutiae by run length encoding scheme, Pattern Recognition vol. 39, 2005, pp [25] k and M. Nilsson, "Implementation and evaluation of NIST Biometric Image Software for fingerprint recognition," Biosignals and Biorobotics Conference (BRC), 2011 ISSNIP, pp.1-5. [26] M. Gamassi, V. Pivri and F. Scotti, Fingerprint local analysis for high performance minutiae extraction, IEEE International Conference on Image Processing (ICIP) vol. 3, 2005, pp [27] E. Alibeigi, M. T. Rizi, P. Behnamfar, "Pipelined minutiae extraction from fingerprint images," Electrical and Computer Engineering, CCECE '09. Canadian Conference on, vol., no., pp [28] J. C. Amengual, A. Juan, J. C. Prez, F. Prat, S. Sez, and J. M. Vilar, Real-time minutiae extraction in fingerprint images, in Proc. of the 6th Int. Conf. on Image Processing and its Applications, 1997, pp [29] A. Farina, Z. M. Kovacs-Vajna, and A. Leone, Fingerprint minutiae extraction from skeletonized binary images, Pattern Recognition, vol. 32(5), 1999, pp [30] Hou, Zujun, Wei Yun Yau, and Yue Wang. "A review on fingerprint orientation estimation." Security and Communication Networks 4.5 (2011): [31] Biradar, Vidaydevi G., and H. Sarojadevi. "Fingerprint Ridge Orientation Extraction: A Review of State of the Art Techniques." International Journal of Computer Applications 91.3 (2014). [32] Wieclaw, Lukasz. "Fingerprint Orientation Field Enhancement." Computer Recognition Systems 4. Springer Berlin Heidelberg, [33] WIECLAW, Lukasz. "Gradient based fingerprint orientation field estimation."journal of Medical Informatics & Technologies 22 (2013): [34] Ke, Hongchang, Hui Wang, and Degang Kong. "An improved Gabor filtering for fingerprint image enhancement technology." 2nd [35] Zhou, Jie, and JinweiGu. "A model-based method for the computation of fingerprints' orientation field." Image Processing, IEEE Transactions on 13.6 (2004): [36] Lifeng Sha, Feng Zhao, and Xiaoou Tang, Minutiae-Based Fingerprint Matching Using Subset Combination, The 18th International Conference on Pattern Recognition (ICPR'06). [37] Anil Jain, Arun Ross and SalilPrabhakar, Fingerprint Matching Using Minutiae And Texture Features. [38] Ravi. J, K. B. Raja, Venugopal. K. R, Fingerprint Recognition Using Minutiae Score Matching, International Journal of Engineering Science and Technology, Vol.1 (2), 2009, [39] Le Hoang Thai 1 and Ha Nhat Tam, Fingerprint Recognition Using Standardized Fingerprint Model, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May [40] Nandakumar, Karthik, and Anil K. Jain. "Local Correlationbased Fingerprint Matching." ICVGIP [41] Mali, Kalyani, and Samayita Bhattacharya. "Fingerprint Matching Using Correlation (In Frequency Domain)." [42] Yang, Jucheng. Non-minutiae based fingerprint descriptor. INTECH Open Access Publisher, ISSN: Page 359
Combined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationGeneration of Combined Minutiae Template for Enrollment and Fingerprint Authentication
Generation of Combined Minutiae Template for Enrollment and Fingerprint Authentication Dr.G.S.ANANDHA MALA Professor & Head Dept. of CSE, St. Joseph s College of Engineering, Chennai-6001119. gs.anandhamala@gmail.com
More informationFingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy Ria Mathews 1 Bino Thomas 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 09, 2015 ISSN (online): 2321-0613 Fingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy Ria Mathews
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini
More informationOPTIMIZED DUAL FINGERPRINT MECHANISM FOR PRIVACY PROTECTION
OPTIMIZED DUAL FINGERPRINT MECHANISM FOR PRIVACY PROTECTION 1 Sanjyoti Lakhe, Student of ME (CSE), Government College of Engineering,Aurangabad, Dr.Babasaheb Ambedkar Marathwada University, Aurangabad.
More informationProviding Authentication by Merging Minutiae Template.
Providing Authentication by Merging Minutiae Template. Priya Raul *1, Sayali Surve* 2, Sushma Gilbile *3, Jasmine Hebbalkar *4, Prof J.L. Chaudhari #5, *B.E Students, #Assistant Professor, Department of
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationOn Mixing Fingerprints
260 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 1, JANUARY 2013 On Mixing Fingerprints Asem Othman and Arun Ross Abstract This work explores the possibility of mixing two different
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationImplementation of Fingerprint Matching Algorithm
RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationMultimodal Biometric Authentication using Face and Fingerprint
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationImplementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept
Implementation of Based Fingerprint Identification System using Crossing Number Concept Atul S. Chaudhari #1, Dr. Girish K. Patnaik* 2, Sandip S. Patil +3 #1 Research Scholar, * 2 Professor and Head, +3
More informationOptimized Minutiae Based Fingerprint Matching
Optimized Minutiae Based Fingerprint Matching Neeta Nain, Deepak B M, Dinesh Kumar, Manisha Baswal, and Biju Gautham Abstract We propose a new minutiae-based approach to match fingerprint images using
More informationLocal Correlation-based Fingerprint Matching
Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of
More informationA Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationFilterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah
Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationDevelopment of an Automated Fingerprint Verification System
Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical
More informationSecure and Private Identification through Biometric Systems
Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationAdaptive Fingerprint Image Enhancement with Minutiae Extraction
RESEARCH ARTICLE OPEN ACCESS Adaptive Fingerprint Image Enhancement with Minutiae Extraction 1 Arul Stella, A. Ajin Mol 2 1 I. Arul Stella. Author is currently pursuing M.Tech (Information Technology)
More informationFINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationA Full Analytical Review on Fingerprint Recognition using Neural Networks
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 45-49(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 A Full Analytical Review on Fingerprint Recognition
More informationImage Enhancement Techniques for Fingerprint Identification
March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement
More informationBiometric Template Security Attack: A Review
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 04-08 National Symposium on engineering and Research Biometric Template Security Attack: A Review Mrs.Swati A.Jadhav M.E.[computer]student,
More informationHybrid Multimodal Template Protection Technique Using Fuzzy Extractor And Random Projection
Hybrid Multimodal Template Protection Technique Using Fuzzy Extractor And Random Projection G. Karthi, M. Ezhilarasan Research scholar, Pondicherry Engineering College, Professor & Head, Department of
More informationComparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationBiometric Security Technique: A Review
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.
More informationI. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching
A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science
More informationFingerprint Recognition System for Low Quality Images
Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University
More informationAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme Shreya Mohan Karunya University Coimbatore, India Ephin M Karunya University Coimbatore, India Abstract: Fingerprint recognition has attracted
More informationwavelet packet transform
Research Journal of Engineering Sciences ISSN 2278 9472 Combining left and right palmprint for enhanced security using discrete wavelet packet transform Abstract Komal Kashyap * and Ekta Tamrakar Department
More informationSECURITY ACCESS FROM GLOBAL DATABASE USING BIOMETRIC
SECURITY ACCESS FROM GLOBAL DATABASE USING BIOMETRIC Srilekha.K 1, Jayakumar.S 2 1,2 Computer Science, SRM University, Chennai, Tamilnadu (India) ABSTRACT In today s society advances in technology have
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationMahmood Fathy Computer Engineering Department Iran University of science and technology Tehran, Iran
1 Alignment-Free Fingerprint Cryptosystem Based On Multiple Fuzzy Vault and Minutia Local Structures Ali Akbar Nasiri Computer Engineering Department Iran University of science and technology Tehran, Iran
More informationCryptosystem based Multimodal Biometrics Template Security
Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know
More informationA protection scheme for enhancing biometric template security and discriminability
A protection scheme for enhancing biometric template security and discriminability Marco GRASSI a,1, Marcos FAUNDEZ-ZANUY b,2 a D.I.B.E.T. Università Politecnica delle Marche, Ancona, Italy b Escola Universitària
More informationMinutia Cylindrical Code Based Approach for Fingerprint Matching
Minutia Cylindrical Code Based Approach for Fingerprint Matching Dilip Tamboli 1, Mr.Sandeep B Patil 2, Dr.G.R.Sinha 3 1 P.G. Scholar, Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India
More informationRobust biometric image watermarking for fingerprint and face template protection
Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,
More informationFusion of Hand Geometry and Palmprint Biometrics
(Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationImplementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept
Informatica Economică vol. 18, no. 1/2014 17 Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept Atul S. CHAUDHARI, Girish K. PATNAIK, Sandip S. PATIL Department
More informationFingerprint Recognition System
Fingerprint Recognition System Praveen Shukla 1, Rahul Abhishek 2, Chankit jain 3 M.Tech (Control & Automation), School of Electrical Engineering, VIT University, Vellore Abstract - Fingerprints are one
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA Shraddha S. Shinde 1 and Prof. Anagha P. Khedkar 2 1 P.G. Student, Department of Computer Engineering, MCERC, Nashik (M.S.), India. shraddhashinde@gmail.com
More informationA Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and Anil K. Jain, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 103 A Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and
More informationAdvanced Bio-Crypto System with Smart Card
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-4 Issue-6, August 2015 Advanced Bio-Crypto System with Smart Card Ansi R R, Anusree L Abstract Biometric cryptosystems
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationFingerprint Recognition Using Gabor Filter And Frequency Domain Filtering
IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 6 (Sep-Oct 2012), PP 17-21 Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Increasing The Accuracy Of An Existing Fingerprint Recognition
More informationMultibiometric Template Security Using Fuzzy Vault
Multibiometric Template Security Using Fuzzy Vault Karthik Nandakumar and Anil K. Jain Abstract Template security is a critical issue in biometric systems because biometric templates cannot be easily revoked
More informationPCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationAdapting Biometric Representations for Cryptosystems
Adapting Biometric Representations for Cryptosystems Anil K. Jain With Abhishek Nagar & Karthik Nandakumar Department of Computer Science and Engineering Michigan State University http://biometrics.cse.msu.edu
More informationKeywords: Fingerprint, Minutia, Thinning, Edge Detection, Ridge, Bifurcation. Classification: GJCST Classification: I.5.4, I.4.6
Global Journal of Computer Science & Technology Volume 11 Issue 6 Version 1.0 April 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
More informationUser Identification by Hierarchical Fingerprint and Palmprint Matching
User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department
More informationBiometric Quality on Finger, Face and Iris Identification
Biometric Quality on Finger, Face and Iris Identification M.Chandrasekhar Reddy PG Scholar, Department of ECE, QIS College of Engineering & Technology, Ongole, Andhra Pradesh, India. Abstract: Most real-life
More informationarxiv: v1 [cs.ai] 7 Aug 2017
MULTIBIOMETRIC SECURE SYSTEM BASED ON DEEP LEARNING Veeru Talreja, Matthew C. Valenti, and Nasser M. Nasrabadi West Virginia University, Morgantown, USA arxiv:1708.02314v1 [cs.ai] 7 Aug 2017 ABSTRACT In
More informationAvailable online at ScienceDirect. Procedia Computer Science 58 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition
More informationReference Point Detection for Arch Type Fingerprints
Reference Point Detection for Arch Type Fingerprints H.K. Lam 1, Z. Hou 1, W.Y. Yau 1, T.P. Chen 1, J. Li 2, and K.Y. Sim 2 1 Computer Vision and Image Understanding Department Institute for Infocomm Research,
More informationRotation Invariant Finger Vein Recognition *
Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,
More informationStegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA Pravin M.Sonsare
More informationKeywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach
More informationVerifying Fingerprint Match by Local Correlation Methods
Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationKeywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationDesigning of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation
Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Navjot Kaur #1, Mr. Gagandeep Singh #2 #1 M. Tech:Computer Science Engineering, Punjab Technical University
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationCSE / 60537: Biometrics
CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?
More informationFingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 4 (February 2013) PP: 54-61 Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming
More informationGenetic Algorithm For Fingerprint Matching
Genetic Algorithm For Fingerprint Matching B. POORNA Department Of Computer Applications, Dr.M.G.R.Educational And Research Institute, Maduravoyal, Chennai 600095,TamilNadu INDIA. Abstract:- An efficient
More informationBiometric Palm vein Recognition using Local Tetra Pattern
Biometric Palm vein Recognition using Local Tetra Pattern [1] Miss. Prajakta Patil [1] PG Student Department of Electronics Engineering, P.V.P.I.T Budhgaon, Sangli, India [2] Prof. R. D. Patil [2] Associate
More informationFingerprint Recognition using Texture Features
Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient
More informationA Novel Approach to Improve the Biometric Security using Liveness Detection
Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric
More informationThis is the published version:
This is the published version: Youssif, A.A.A., Chowdhury, Morshed, Ray, Sid and Nafaa, H.Y. 2007, Fingerprint recognition system using hybrid matching techniques, in 6th IEEE/ACIS International Conference
More informationFingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask
Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More informationA STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS
A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS U. Latha and K. Ramesh Kumar Department of Information Technology, Dhaanish Ahmed College of Engineering, India E-mail: latha_umapathy@yahoo.co.in
More informationFingerprint Verification System using Minutiae Extraction Technique
Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on
More informationIndexing Fingerprints using Minutiae Quadruplets
Indexing Fingerprints using Minutiae Quadruplets Ogechukwu Iloanusi University of Nigeria, Nsukka oniloanusi@gmail.com Aglika Gyaourova and Arun Ross West Virginia University http://www.csee.wvu.edu/~ross
More informationPerformance Analysis of Fingerprint Identification Using Different Levels of DTCWT
2012 International Conference on Information and Computer Applications (ICICA 2012) IPCSIT vol. 24 (2012) (2012) IACSIT Press, Singapore Performance Analysis of Fingerprint Identification Using Different
More informationTemplate Protection and its Implementation in 3D Face Recognition Systems
Template Protection and its Implementation in 3D Face Recognition Systems Xuebing Zhou Fraunhofer IGD, Fraunhoferstr. 5, 64283 Darmstadt, Germany E-mail: xuebing.zhou@igd.fhg.de ABSTRACT As biometric recognition
More informationFingerprint Feature Extraction Using Hough Transform and Minutiae Extraction
International Journal of Computer Science & Management Studies, Vol. 13, Issue 05, July 2013 Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction Nitika 1, Dr. Nasib Singh Gill
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Biometric Based Attendance Management System Using Wi-Fi
More information