Securing Fingerprint Based Biometric System

International Journal of Electronics and Communication Engineering
© 2016 by SSRG - IJECE Journal
Volume 3 Issue 10
Year of Publication : 2016
Authors : Disha Lobo, Anoop C. V. and Mahesha Y
pdf
How to Cite?

Disha Lobo, Anoop C. V. and Mahesha Y, "Securing Fingerprint Based Biometric System," SSRG International Journal of Electronics and Communication Engineering, vol. 3,  no. 10, pp. 1-8, 2016. Crossref, https://doi.org/10.14445/23488549/IJECE-V3I10P102

Abstract:

Nowadays biometric systems are in great demand. Biometric security systems are used to authenticate and provide access to a facility depending on the individual’s physical characteristics. These characteristics which are stored in the database can be prone to theft. Hence there is a need to secure this identity which is stored in the database. Therefore in order to obtain a secure biometric system, two stages have been brought up. First stage is the enrollment stage, where two different fingerprints are taken and then two different features from each of these fingerprints are extracted. These two features are then fused to form a combined template and are stored in the database. In the authentication stage, the two query fingerprints are matched against the combined template which is produced in the enrollment. It is seen that the combined template is more secured and less prone to attacks.

Keywords:

Biometric database security; combined template; Minutiae; Matching; Orientation.

References:

[1] Sheng Li and Alex C. Kot, “Fingerprint Combination for Privacy Protection” IEEE Trans. Information Forensics and Security, vol. 8, no. 2, pp. 350-360, Feb. 2013.
[2] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004.
[3] K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprintbased fuzzy vault: Implementation and performance,” IEEE Trans. Inf. ForensicsSecurity, vol. 2, no. 4, pp. 744–57, Dec. 2007.
[4] S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011.
[5] A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
[6] L. Hong, Y. F. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 20, no. 8, pp. 777–789, Aug. 1998.
[7] S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform..Forensics and Security (WIFS), Foz doIguacu, Brazil, Nov. 29–Dec. 2, 2011.
[8] A. Ross and A. Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
[9] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., vol. 29, no. 4, pp. 561–72, Apr. 2007.
[10] S. Chikkerur and N. Ratha, “Impact of singular point detection on fingerprint matching performance,” in Proc. Fourth IEEE Workshop on Automat. Identification Advanced Technologies, Oct. 2005, pp. 207–212.