Fuzzy Bio-Cryptography Key Generation

Size: px
Start display at page:

Download "Fuzzy Bio-Cryptography Key Generation"

Transcription

1 11 Fuzzy Bio-Cryptography Key Generation HanaaM. A. Salman Computer Science Department,University of Technology, Iraq Abstract:Strength of Cryptographic systems security depends mainly upon the security of the used key, which is leads to generate big key space that is result in forget them easily. One solution to this problem is by using Bio-Cryptography key generation. Bio-Cryptography is the integration between cryptography and biometrics that can function in key release mode or in key generation mode. Insipid of the sensed biometric means the result feature vector for the same person is varies each time. This paper addresses solution for various types of security problems by introducing a fuzzy bio-cryptography key generation in a general form consist of: 1. sensor, 2. feature extraction, 3. Key generator. The key is generating dynamically with the help of fingerprint based cubic spline, which is fast and secure. This key is useable for any type of cryptography. Keywords:Bio-Cryptography Fingerprint Fuzzy Cubic Spline Key Generation 1. Introduction Key generation modes is more secure but it is difficult to apply because of large intra-class variations in The incapability of human users to remember strong biometric data due to absorb the differences inherent in cryptographic keys has been main factor limiting the the measurement of biometric or biometric themselves, security of these systems. Usually users can remember while generating the same key over andover again. only short passwords. Consequently they tend to choose Generally, it requires a technique designed for passwords that are easily guessed by dictionary attacks. particular biometrics used. This constraint could be deal with in a wide range This paper presents a fuzzy bio-cryptographic key of applications by generating strong cryptographic keys generation, by using biometric fingerprint local feature. from biometric data, perhaps in conjunction with the The fuzzy key generation achieved after applying two entry of a password. The effectiveness of this approach stages fuzzy feature extraction followed by cubic spline lies in the fact that they do not require the user to key generation. Fuzzy feature extraction stage achieved remember and can represent a much stronger keys from by applying fuzzy pre-processing for the input passwords. These keys could then be used in a wide fingerprint, minutiae extraction, and post processing, variety of applications, which include access to virtual the key generation stage is achieved by applying cubic private networks, file encryption,and user spline followed by key generation.all the authentication. Bio-cryptography integrates cryptography and implementation work has been done in MATLAB. The biometrics to take advantage of the strengths of both developed system is evaluated on a database with fingerprints from different people. fields. Bio-cryptographic techniques protected secret key by using biometric feature or generating a key from biometric features. In such systems, some public information is stored. Both the secret key and the templates are hidden in public information. However, it is computationally impossible to extract the key or the templates from the public information directly. There are two subcategories of bio-cryptographic techniques [1] as depicted in Figure 1), these are: 1. Key binding: If public information derived from binding the secret key or templates, it is key binding, see [2, 3], and 2. Key generation: If public information generated from templates only, while the secret key comes from the public information, and query it is key generation see [4, 5, and 6]. Figure 1a-b).two modes of combining biometrics with cryptography:a): key release and b): key generation [7]

2 2. Fingerprint Principals The surface of the finger formed so-called a fingerprint, which is formed of set of associated curves represents ridges dark curves) and the valleys bright curves), as depicted in Figure 2). The points on the finger surface where the ridges end or bifurcate formed so-called the Minutiae, as depicted in Figure 3), which is most common, and distinctive representation, from fingerprint local feature for each individual. a) Ending b) Bifurcation Figure 3 a-b). The Ridge [8] 3. Bio-Cryptography Key Generation Biometric based cryptographic key generation transform biometric features to a unique key that it is impossible to be regenerate from biometric features by imposters. The general framework of the Bio- Cryptographic key generation is composed of two phases as depicted in Figure 4). We extract the minutiae points from the offline fingerprint image and used that set of points for generating bio-cryptographic key. The database provided by FVC2004 Fingerprint Verification Competition 2004) [9], is used as a source to the input fingerprint, so no acquisition stage is used. The major steps involved in each phase are presented in the following sub sections. 3.1Biometric Phase The input isfingerprint image passesinthree main steps, for each step has other sub steps to form a biometric feature vector. The sub steps involved in each step are in the following sub section and these are [9]: 1. Pre-processing: a. Histogram Equalization b. Image Binarization c. Image Segmentation 2. Minutiae extraction: a. Image Thinning b. Minutiae Extraction c. Singularity Detection 3. Post processing: a. False minutiae Reduction Fingerprint Image pre-processing a: Histogram Equalization The first step in the minutiae extraction stage is fingerprint image enhancement, which it increases the contrast between ridges and furrows and connects the some of the false broken points of ridges due to insufficient amount of ink or poor quality of sensor input [10]. In this paper, a fuzzy image enhancement is used as presented in algorithm 1) [8], followed by the results as depicted in Figure 5). Figure 2. Fingerprint image [1] [8] Sensed Image Biometric Phase Key Generation Phase Bio-cryptographic key Figure 4. Bio-cryptographic key generation The input to the biometric phase is the sensed image, and the output is the biometric feature vector, while the input to the key generation phase is the biometric feature vector, and the output is the biocryptographic key. Algorithm 1): Fuzzy Image Enhancement Input: fingerprint image Output: enhanced fingerprint image. Process: Step1: Taking image and set membership function for each gray level as: Step1.1: Where L=max gray level Step 1.2: f x, y) = any gray level. Step 1.3: s =variance between gray values Step2: Get new membership function by putting: Step2.1: v x, y) = 2* µx, y)) 2 if µ x, y) 0.5 Step 2.2: v x, y ) = 1-2* 1 - µ x, y )) 2 if 0.5 µx, y) 1 Step3: Get new im age by s etting th e method as: gx,y)=l-s 2log vx, y) Step4: End

3 15 l t ch block, use roximation of = sk. win g fo rm loc k direc ) the same a s the wa y illustrated b a [10]. = w dicar ed n th )+ + ) ) 688

4 O ut: Minutia pointes P cess: Ste 1: calculate inter rid ge dista nce D = )) 689

5 17, ith [10 slate pect t o rota t e M a c al or ding t, n and T [10]: x y θ = gin 690

6 7. Conclusion 1. In this paper we have considered the fuzzy biocryptographic key generation. We have demonstrated the solution to the primary difficulty of variations inherent in measuring biometrics, or in the biometrics themselves, while generating the same key over and over again, which faced the most effective approach from the security point of view initialled biocryptographic key generation, which represents the most effective solution to the difficulty remembering the user's secret key. 2. We have proposed the fuzzy filter concept to overcome the difficulty of intra classes vibration. We have extracted the content based minutiae features using three main stage fuzzy filter pre-processing minutia extractions, postpre-processing. We have generated the key by using locations in the fingerprint image of the content based feature vector of the fingerprint locale feature, and then we have used the Fuzzy cubic spline to draw carved. The control pointes of the Fuzzy cubic spline are sending as a key generation. 3. This approach has eliminated the variations in intra classes variations inherent in measuring biometrics, or in the biometrics themselves, which result in capability of generating the same key over and over again. Acknowledgements The author s would like to thank the International Arab Conference on Information Technology, and CCIS, Zarqa University, Jordan for supporting this publication. References [1] Peter Stavroulakis, Mark Stamp: Handbook of Information and Communication Security. Springer 2010, ISBN [2] A. Juels, M. Wallenberg: A Fuzzy Commitment Scheme, Proc. 6th ACM Conference on Computer and Communications Security, Singapore 1999) pp [3] A. Juels, M. Sudan: A Fuzzy Vault Scheme, Proc. IEEE Int. Symposium on Information Theory, Lau-sanne 2002) p. 408 [4] Y.-J. Chang, W. Zhang, T. Chen: Biometrics Based Cryptographic Key Generation, Proc. IEEE Conference on Multimedia and Expo, Taipei, Vol ) pp [5] C. Vielhauer, R. Stcinmctz, A. Maycrhofcr: Biomctric Hash Based on Statistical Features of Online Signatures, Proc. 16th Int. Conference on Pattern Recognition, Quebec, Vol ) pp [6] Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Technical Report 235, Cryptology eprint Archive February 2006) [7] G Margarov, M Tolba, Biometrics based secret sharing using fuzzy vault. 7th IntConf on Computer Science and Information Technologies CSIT'09) 2009) [8] Pravesh Kumar Use of Fuzzy Set and Neural Network to Extract Fingerprint. Minutiae Points and Location, thesis, [9] [10] kushal veer singh, application of neural networks in fingerprint identification,2010,thesis [11] Maria Cristina Floreno, Giovanni Novelli, Implementing fuzzy polynomial interpolation FPI) and fuzzy linear regression LFR) ticle/view/426 Associate Prof. Dr. Hanaa M. A. Salman awarded her MSc and her PhD from University of technology Iraq in 2002, 2006 respectively. Currently she is a senior lecturer in computer science and a member of the scientific Committee and Promotion Committee in the Department of Computer Science. Dr. Hanaa has more than 15 years of experience and she supervise of graduate students and preliminary,her research interests include Cryptography, Computer Security, Biometrics, image processing, and Computer graphics. Prof. Dr. Hilal Hadi Saleh awarded his PhD in Information system from Higher Institute in Sofia, Bulgaria in1981. Currently he is a senior lecturer in computer science Department of Computer Science. Dr. Hilal has more than 40 years of experience and he supervise of graduate students and preliminary,his research interests include Cryptography, information system, image processing, and Computer graphics,sstatistics

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

CSE / 60537: Biometrics

CSE / 60537: Biometrics CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 5 / Final Review 115 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/

More information

Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask

Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu

More information

Encryption of Text Using Fingerprints

Encryption of Text Using Fingerprints Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,

More information

Development of an Automated Fingerprint Verification System

Development of an Automated Fingerprint Verification System Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical

More information

Minutiae Based Fingerprint Authentication System

Minutiae Based Fingerprint Authentication System Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising

More information

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini

More information

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each

More information

CSE / 60537: Biometrics

CSE / 60537: Biometrics CSE 40537 / 60537: Biometrics * ** * * ** * * Template Protection 3 62 The Course Instructor Feedback (CIF) survey window for biometrics opens tomorrow December 1st - 13th https://cif.nd.edu/ How'm I doin'?

More information

Biometric Cryptosystem Using Online Signatures

Biometric Cryptosystem Using Online Signatures Biometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci University Faculty of Engineering and Natural Sciences Istanbul 34956, Turkey alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Fingerprint Identification System Based On Neural Network

Fingerprint Identification System Based On Neural Network Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India

More information

Keywords Fingerprint recognition system, Fingerprint, Identification, Verification, Fingerprint Image Enhancement, FFT, ROI.

Keywords Fingerprint recognition system, Fingerprint, Identification, Verification, Fingerprint Image Enhancement, FFT, ROI. Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Approach

More information

Local Correlation-based Fingerprint Matching

Local Correlation-based Fingerprint Matching Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of

More information

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Fingerprint Image Enhancement Algorithm and Performance Evaluation Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

A Remote Biometric Authentication Protocol for Online Banking

A Remote Biometric Authentication Protocol for Online Banking International Journal of Electrical Energy, Vol. 1, No. 4, December 2013 A Remote Biometric Authentication Protocol for Online Banking Anongporn Salaiwarakul Department of Computer Science and Information

More information

Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation

Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation Biometric Cryptography: Key Generation Using Feature and Parametric Aggregation Christopher Ralph Costanzo School of Engineering and Applied Sciences Department of Computer Science The George Washington

More information

Fingerprint Verification System using Minutiae Extraction Technique

Fingerprint Verification System using Minutiae Extraction Technique Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on

More information

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018.

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018. MULTI-VISUAL CRYPTOGRAPHY FOR BIOMETRICS(FINGERPRINT & IRIS) USING LION OPTIMIZATION ALGORITHM Mr. S. Rajesh, Assistant Professor, Department of CSE, Avvaiyar College of Engineering & Technology for Women,

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

Template Protection and its Implementation in 3D Face Recognition Systems

Template Protection and its Implementation in 3D Face Recognition Systems Template Protection and its Implementation in 3D Face Recognition Systems Xuebing Zhou Fraunhofer IGD, Fraunhoferstr. 5, 64283 Darmstadt, Germany E-mail: xuebing.zhou@igd.fhg.de ABSTRACT As biometric recognition

More information

A Fuzzy Implementation of Biometrics With Five Factor Authentication System For Secured Banking

A Fuzzy Implementation of Biometrics With Five Factor Authentication System For Secured Banking ` A Fuzzy Implementation of Biometrics With Five Factor Authentication System For Secured Banking S. Hemamalini & M. L. Alphin Ezhil Manuel Department of Computer Science and Engineering, Alpha College

More information

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.

Keywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm

More information

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching

I. INTRODUCTION. Image Acquisition. Denoising in Wavelet Domain. Enhancement. Binarization. Thinning. Feature Extraction. Matching A Comparative Analysis on Fingerprint Binarization Techniques K Sasirekha Department of Computer Science Periyar University Salem, Tamilnadu Ksasirekha7@gmail.com K Thangavel Department of Computer Science

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

Personal Information in Strategic Data Sharing and Communication Protocols

Personal Information in Strategic Data Sharing and Communication Protocols Personal Information in Strategic Data Sharing and Communication Protocols Lidia Ogiela and Marek R. Ogiela Cryptography and Cognitive Informatics Research Group, AGH University of Science and Technology,

More information

Digital Signature Generation using Fingerprint, Password and Smart Card

Digital Signature Generation using Fingerprint, Password and Smart Card Digital Signature Generation using Fingerprint, Password and Smart Card FAWAD AHMED and MOHAMMED YAKOOB SIYAL School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang

More information

Biometrics- Fingerprint Recognition

Biometrics- Fingerprint Recognition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint

More information

Mahmood Fathy Computer Engineering Department Iran University of science and technology Tehran, Iran

Mahmood Fathy Computer Engineering Department Iran University of science and technology Tehran, Iran 1 Alignment-Free Fingerprint Cryptosystem Based On Multiple Fuzzy Vault and Minutia Local Structures Ali Akbar Nasiri Computer Engineering Department Iran University of science and technology Tehran, Iran

More information

Multimodal Biometric Authentication using Face and Fingerprint

Multimodal Biometric Authentication using Face and Fingerprint IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Increasing The Accuracy Of An Existing Fingerprint Recognition

More information

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach

More information

Template Protection for PCA-LDA-based 3D Face Recognition Systems

Template Protection for PCA-LDA-based 3D Face Recognition Systems Template Protection for PCA-LDA-based 3D Face Recognition Systems Daniel Hartung Email: hartung.dani@gmail.com Abstract: Authentication based on biometrics became significantly important over the last

More information

MINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION

MINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION MINUTIA FINGERPRINT RECOGNITION BASED SECURED MONEY EXTRACTION USING ADVANCED WIRELESS COMMUNICATION 1 S.NITHYA, 2 K.VELMURUGAN 1 P.G Scholar, Oxford Engineering College, Trichy. 2 M.E., Assistant Professor,

More information

Security Analysis of Key Binding Biometric Cryptosystems

Security Analysis of Key Binding Biometric Cryptosystems Security Analysis of Key Binding Biometric Cryptosystems Maryam Lafkih 1, Mounia Mikram 1,2, Sanaa Ghouzali 1,3, and Mohamed El Haziti 4 1 LRIT, Faculty of Sciences, Mohammed V University, Rabat, Morocco

More information

An approach for Fingerprint Recognition based on Minutia Points

An approach for Fingerprint Recognition based on Minutia Points An approach for Fingerprint Recognition based on Minutia Points Vidita Patel 1, Kajal Thacker 2, Ass. Prof. Vatsal Shah 3 1 Information and Technology Department, BVM Engineering College, patelvidita05@gmail.com

More information

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification

More information

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,

More information

A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates

A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates Yagiz Sutcu a, Husrev T. Sencar b and Nasir Memon b a Polytechnic University, Electrical & Computer Engineering Dept., Brooklyn,

More information

FUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION. Yongjin Wang, K.N. Plataniotis

FUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION. Yongjin Wang, K.N. Plataniotis FUZZY VAULT FOR FACE BASED CRYPTOGRAPHIC KEY GENERATION Yongjin Wang, K.N. Plataniotis The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, 1 King s College

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint

More information

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction

Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction International Journal of Computer Science & Management Studies, Vol. 13, Issue 05, July 2013 Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction Nitika 1, Dr. Nasib Singh Gill

More information

Chapter 3: User Authentication

Chapter 3: User Authentication Chapter 3: User Authentication Comp Sci 3600 Security Outline 1 2 3 4 Outline 1 2 3 4 User Authentication NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines user as: The process

More information

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Navjot Kaur #1, Mr. Gagandeep Singh #2 #1 M. Tech:Computer Science Engineering, Punjab Technical University

More information

Multibiometric Template Security Using Fuzzy Vault

Multibiometric Template Security Using Fuzzy Vault Multibiometric Template Security Using Fuzzy Vault Karthik Nandakumar and Anil K. Jain Abstract Template security is a critical issue in biometric systems because biometric templates cannot be easily revoked

More information

Random Password Generation of OTP System using Changed Location and Angle of Fingerprint Features

Random Password Generation of OTP System using Changed Location and Angle of Fingerprint Features Random Password Generation of OTP System using Changed Location and Angle of Fingerprint Features ByungRae Cha*, KyungJun Kim, HyunShik Na** Dept. of Computer Eng.*, Dept. of Radio Mobile Communication

More information

Fingerprint Recognition using Texture Features

Fingerprint Recognition using Texture Features Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient

More information

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology An Approach to Demonstrate the Fallacies of Current Fingerprint Technology Pinaki Satpathy 1, Banibrata Bag 1, Akinchan Das 1, Raj Kumar Maity 1, Moumita Jana 1 Assistant Professor in Electronics & Comm.

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research  e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Multi-Purpose Key Generation Using Combination of Fingerprints Sharda Singh

More information

Mechanism-based PKI - A real-time key generation from fingerprints -

Mechanism-based PKI - A real-time key generation from fingerprints - Mechanism-based PKI - A real-time key generation from fingerprints - Yoichi Shibata Graduate School of Science and Engineering Shizuoka University Hamamatsu-shi, Shizuoka, JAPAN cs9042@s.inf.shizuoka.

More information

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key

A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri

More information

On the Security of a Certificateless Public-Key Encryption

On the Security of a Certificateless Public-Key Encryption On the Security of a Certificateless Public-Key Encryption Zhenfeng Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080,

More information

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept Implementation of Based Fingerprint Identification System using Crossing Number Concept Atul S. Chaudhari #1, Dr. Girish K. Patnaik* 2, Sandip S. Patil +3 #1 Research Scholar, * 2 Professor and Head, +3

More information

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Scientific Coordinator, PhD. Prof. Eng. Tiberiu Ștefan Leția Chapter

More information

Biometric Security Technique: A Review

Biometric Security Technique: A Review ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.

More information

Secure Biometrics Via Syndromes

Secure Biometrics Via Syndromes Secure Biometrics Via Syndromes Emin Martinian, Sergey Yekhanin, Jonathan S. Yedidia Mitsubishi Electric Research Labs Cambridge, MA 02139 {martinian,yedidia}@merl.com, yekhanin@mit.edu Abstract We consider

More information

Bipartite Biotokens: Definition, Implementation, and Analysis

Bipartite Biotokens: Definition, Implementation, and Analysis Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer 2,1, and T.E. Boult 1,2,, 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO - 80918 2 Securics Inc, Colorado Springs,

More information

User Identification by Hierarchical Fingerprint and Palmprint Matching

User Identification by Hierarchical Fingerprint and Palmprint Matching User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

Efficient Rectification of Malformation Fingerprints

Efficient Rectification of Malformation Fingerprints Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Zodiac Max OPERATOR GUIDE

Zodiac Max OPERATOR GUIDE Zodiac Max OPERATOR GUIDE February 2015 Table of Contents INTRODUCTION... 5 PC Requirements... 6 USB Driver Installation... 7 ZODIAC SINGLE-STATION SOFTWARE... 8 Software Installation... 8 Communications

More information

Fingerprint Deformation Models Using Minutiae Locations and Orientations

Fingerprint Deformation Models Using Minutiae Locations and Orientations Fingerprint Deformation Models Using Minutiae Locations and Orientations Yi Chen, Sarat Dass, Arun Ross, and Anil Jain Department of Computer Science and Engineering Michigan State University East Lansing,

More information

Available online at ScienceDirect. Procedia Computer Science 58 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 58 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition

More information

Application of Biometrics to Obtain High Entropy Cryptographic Keys

Application of Biometrics to Obtain High Entropy Cryptographic Keys 1 Application of Biometrics to Obtain High Entropy Cryptographic Keys Sanjay Kanade, Danielle Camara, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi Abstract In this paper, a two factor scheme is

More information

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors

More information

A protection scheme for enhancing biometric template security and discriminability

A protection scheme for enhancing biometric template security and discriminability A protection scheme for enhancing biometric template security and discriminability Marco GRASSI a,1, Marcos FAUNDEZ-ZANUY b,2 a D.I.B.E.T. Università Politecnica delle Marche, Ancona, Italy b Escola Universitària

More information

c Springer Verlag. The copyright for this contribution is held by Springer Verlag. The original publication is available at

c Springer Verlag. The copyright for this contribution is held by Springer Verlag. The original publication is available at Christian Rathgeb and Andreas Uhl, Systematic Construction of Iris-Based Fuzzy Commitment Schemes, In M. Tistarelli, M.S. Nixon, editors, Proceedings of the 3rd International Conference on Biometrics 2009

More information

Performance Improvement in Binarization for Fingerprint Recognition

Performance Improvement in Binarization for Fingerprint Recognition IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. II (May.-June. 2017), PP 68-74 www.iosrjournals.org Performance Improvement in Binarization

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs A schema for cryptographic keys generation using hybrid biometrics Conference Item How to cite:

More information

Fingerprint Recognition using Fuzzy based image Enhancement

Fingerprint Recognition using Fuzzy based image Enhancement Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India

More information

Implementation of Fingerprint Matching Algorithm

Implementation of Fingerprint Matching Algorithm RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan

More information

A Full Analytical Review on Fingerprint Recognition using Neural Networks

A Full Analytical Review on Fingerprint Recognition using Neural Networks e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 45-49(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 A Full Analytical Review on Fingerprint Recognition

More information

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Rintu Boro Sumantra Dutta Roy Department of Electrical Engineering, IIT Bombay, Powai, Mumbai - 400 076, INDIA {rintu, sumantra}@ee.iitb.ac.in

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

Fingerprint Verification applying Invariant Moments

Fingerprint Verification applying Invariant Moments Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National

More information

Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher

Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming Distance Matcher International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 4 (February 2013) PP: 54-61 Fingerprint-Iris Fusion Based Multimodal Biometric System Using Single Hamming

More information

Fingerprint Recognition System for Low Quality Images

Fingerprint Recognition System for Low Quality Images Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University

More information

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification

ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification ICT 6541 Applied Cryptography Lecture 8 Entity Authentication/Identification Hossen Asiful Mustafa Introduction Entity Authentication is a technique designed to let one party prove the identity of another

More information

Image Segmentation Based on Watershed and Edge Detection Techniques

Image Segmentation Based on Watershed and Edge Detection Techniques 0 The International Arab Journal of Information Technology, Vol., No., April 00 Image Segmentation Based on Watershed and Edge Detection Techniques Nassir Salman Computer Science Department, Zarqa Private

More information

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION

IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION IMPROVED FUZZY VAULT SCHEME FOR FINGERPRINT VERIFICATION C. Örencik, T. B. Pedersen, E. Savaş and M. Keskinoz Faculty of Engineering & Natural Sciences, Sabanci University, Istanbul, 34956, Turkey {cengizo@su.,

More information

Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack

Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack 14 Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack Rajeswari Mukesh Dept of Computer Science & Engg Easwari Engineering College Chennai- 600 089 A.Damodaram Vice

More information

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel. Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations

More information

A Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and Anil K. Jain, Fellow, IEEE

A Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and Anil K. Jain, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010 103 A Hybrid Approach for Generating Secure and Discriminating Face Template Yi C. Feng, Pong C. Yuen, Member, IEEE, and

More information

Security analysis for fingerprint fuzzy vaults

Security analysis for fingerprint fuzzy vaults Security analysis for fingerprint fuzzy vaults Jesse Hartloff, Maxwell Bileschi, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju Dept. of Computer Sc. and Eng., University at Buffalo, Buffalo,

More information

Intelligent fingerprint recognition system. for Comprehensive Student Information Using MATlab

Intelligent fingerprint recognition system. for Comprehensive Student Information Using MATlab Intelligent Fingerprint Recognition System for Comprehensive Student Information Using MATlab Shwetha Signal Processing, Siddaganga Institute of Technology, Tumkur, India Sangeetha.B.P Digital Communication

More information

Cryptosystem based Multimodal Biometrics Template Security

Cryptosystem based Multimodal Biometrics Template Security Cryptosystem based Multimodal Biometrics Template Security Ashish P. Palandurkar Student M.E. WCC, AGPCE, Pragati N. Patil Asst. Prof. AGPCE, Yogesh C. Bhute Asst. Prof, AGPCE, ABSTRACT As we all know

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 9: Authentication Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Definition of entity authentication Solutions password-based

More information

Fingerprint Feature Extraction Using Midpoint ridge Contour method and Neural Network

Fingerprint Feature Extraction Using Midpoint ridge Contour method and Neural Network IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 99 Fingerprint Feature Extraction Using Midpoint ridge Contour method and Neural Network Bhupesh Gour Asst.

More information

A Novel Image Alignment and a Fast Efficient Localized Euclidean Distance Minutia Matching Algorithm for Fingerprint Recognition System

A Novel Image Alignment and a Fast Efficient Localized Euclidean Distance Minutia Matching Algorithm for Fingerprint Recognition System Ridge ings Ridge bifurcation The International Arab Journal of Information Technology Vol. 13, No. 6B, 2016 1061 A Novel Image Alignment and a Fast Efficient Localized Euclidean Distance Minutia Matching

More information

Security analysis of a fingerprint-secured USB drive

Security analysis of a fingerprint-secured USB drive James Madison University JMU Scholarly Commons Masters Theses The Graduate School Summer 2010 Security analysis of a fingerprint-secured USB drive Benjamin David Rodes James Madison University Follow this

More information

arxiv:cs/ v2 [cs.cr] 27 Aug 2006

arxiv:cs/ v2 [cs.cr] 27 Aug 2006 On the security of the Yen-Guo s domino signal encryption algorithm (DSEA) arxiv:cs/0501013v2 [cs.cr] 27 Aug 2006 Chengqing Li a, Shujun Li b, Der-Chyuan Lou c and Dan Zhang d a Department of Mathematics,

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information