PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Technique to generate a face and palm vein-based fuzzy vault for a multi-biometric cryptosystem

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed face and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and face image is constructed and is combined with the stored fuzzy vault to generate the final key. Finally, the experimentation is conducted using the palm vein and face database available in the CASIA and JAFFE database. The evaluation metrics employed are FMR (False Match Ratio) and GMR (Genuine Match Ratio). From the metric values obtained for the proposed system, we can infer that the system has performed well.
Rocznik
Strony
97--114
Opis fizyczny
Bibliogr. 30 poz., il., tab., wykr.
Twórcy
  • Assistant Professor(SG), Amrita School of Engineering Amrita Vishwa Vidyapeetham, Amritanagar(PO), Ettimadai, Coimbatore - 641 112
  • Department,Department of Computer Science and Engineering SVS College of Engineering, Coimbatore - 642 109
Bibliografia
  • [1] A. Juels and M. Wattenberg, A fuzzy commitment scheme, 6th ACM Conference on Computer and Communications Security New York, pp.28-36, 1999.
  • [2] Han, C., Cheng, H., Lin, C., & Fan, K, Personal authentication using palm-print features, Pattern Recognition, 36, pp. 371-381, 2003.
  • [3] Zhang, D., Kong,W., You, J., & Wong, M., Online palmprint identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25, pp. 1041-1050, 2003.
  • [4] C.L. Lin and K.C. Fan, Biometric Verification Using Thermal Images of Palm-Dorsa Vein Patterns, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 2, pp. 199-213, 2004.
  • [5] Uludag, U.; Pankanti, S.; Prabhakar, S.; Jain, A.K.;, Biometric cryptosystems: issues and challenges, Proc. of the IEEE, vol.92, no.6, pp. 948- 960, 2004.
  • [6] R. Dhamija and J. D. Tygar, ”The battle against phishing: Dynamic security skins” In Proceedings of the Symposium on Usable Privacy and Security ACM Press, pp. 77-88, 2005.
  • [7] Shenglin Yang and Ingrid Verbauwhede, Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme, In Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609-612, 2005.
  • [8] Umut Uludag, Sharath Pankanti, and Anil K. Jain, Fuzzy Vault for Fingerprints, Lecture Notes in Computer Science, Vol. 3546, pp. 310.319, 2005.
  • [9] Yuhang Ding, Dayan Zhuang and Kejun Wang, A Study of Hand Vein Recognition Method, In Proceedings of the IEEE International Conference on Mechatronics & Automation, pp. 2106-2110, 2005.
  • [10] Lingyu Wang and Graham Leedham, Near- and Far- Infrared Imaging for Vein Pattern Biometrics, In Proceeding of IEEE International Conference on Video and Signal Based Surve illance, pp. 52, 2006.
  • [11] Hennings-Yeomans, P. H., Kumar, B. V. K., & Savvides, M., Palmprint classification using multiple advanced correlation filters and palm-specific segmentation, IEEE Transactions on Information Forensics and Security, 2, pp. 613-622, 2007.
  • [12] ] Hu, D., Feng, G., & Zhou, Z, Two-dimensional locality preserving projections (2DLPP) with its application to palmprint recognition, Pattern Recognition, 40, pp. 339-342, 2007.
  • [13] Karthik Nandakumar, Anil K. Jain and Sharath Pankanti, Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, pp.744-757, 2007.
  • [14] Yi-Bo Zhang, Qin Li, Jane You and Prabir Bhattacharya, Palm Vein Extraction and Matching for Personal Authentication, Advances in Visual Information Systems, vol. 4781, pp. 154-164, 2007.
  • [15] Ying Hao, Zhenan Sun, Tieniu Tan and Chao Ren, Multispectral Palm Image Fusion For Accurate Contact-Free Palmprint Recognition, In proceedings of IEEE International Conference on Image Processing, pp.281-284, 2008.
  • [16] Bashir Mohammed Ghandi,Ramachandran Nagarajan and Hazry Desa,Classification of Facial Emotions using Guided Particle Swarm Optimization I, International Journal Computer and Communication Technology, Vol. 1, No. 1,pp.36-46, 2009.
  • [17] Su, C. (a), Palm extraction and identification, Expert Systems with Applications, 36, pp. 1082-1091, 2009.
  • [18] Su, C. (b), Palm-print recognition by matrix discriminator, Expert Systems with Applications, 36, pp. 10259-10265, 2009.
  • [19] Zhenhua Guo, Wangmeng Zuo, Lei Zhang and David Zhang, palmprint verification, Neurocomputing, vol. 73, no. 4-6, pp. 944-950, 2010.
  • [20] David Zhang, Zhenhua Guo, Guangming Lu, Lei Zhang, Yahui Liu and Wangmeng Zuo, Online joint palmprint and palmvein verification, Expert Systems with Applications, 2010.
  • [21] K. Nandakumar, A fingerprint cryptosystem based on minutiae phase spectrum, IEEE International Workshop on Information Forensics and Security, pp. 1-6, 2010.
  • [22] Maleika Heenaye- Mamode Khan, Naushad Mamode Khan and Raja K.Subramanian, Feature Extraction of Dorsal Hand Vein Pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique, World Academy of Science, Engineering and Technology, vol. 61, 2010.
  • [23] Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang and Jie Tian, An alignment-free fingerprint cryptosystem based on fuzzyvaultscheme, Journal of Network and Computer Applications, vol. 33, no. 3, pp. 207-220, 2010.
  • [24] Xiangqian Wu, Enying Gao, Youbao Tang and Kuanquan Wang, A Novel Biometric System Based on Hand Vein, In proceedings of 5th International Conference on Frontier of Computer Science and Technology (FCST), pp. 522-526, 2010.
  • [25] Yiding Wang, Kefeng Li and Jiali Cui, Hand-dorsa vein recognition based on partition Local Binary Pattern, In Proceeding of IEEE 10th International Conference on Signal Processing, pp. 1671-1674, 2010.
  • [26] Abhilasha Bhargav, Anna Squicciarini, Elisa Bertino, Xiangwei Kong and Weike Zhang, Biometrics-Based Identifiers for Digital Identity Management, In Proceedings of the 9th Symposium on Identity and Trust, pp. 84-96, 2010.
  • [27] Christopher Alvino,Christian Kohler, Frederick Barrett, Raquel E. Gurb, Ruben C. Gurb and Ragini Verma,Study of the Changing Trends in Facial Expression Recognition, International Journal of Computer Applications,Vol 21,No.5,pp. 0975 - 8887,May 2011.
  • [28] Zhenhua Guo, David Zhang, Lei Zhang, Wangmeng Zuo and Guangming Lu, Empirical study of light source selection for palmprint recognition, Pattern Recognition Letters, vol. 32, no. 2, pp. 120-126, 2011.
  • [29] Palm print database from http://www.idealtest.org.
  • [30] Face database from http://www.kasrl.org/jaffe.html.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3451274d-0826-4748-ba3f-7a43f15f315d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.