Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem

Main Article Content

N. Lalithamani
M. Sabrigiriraj


Keywords : multimodal biometric cryptosystems, biometric template security, palm vein feature extraction, face feature extraction, fuzzy vault, secret key
Abstract
Template security of biometric systems is a vital issue and needs critical focus. The importance lies in the fact that unlike passwords, stolen biometric templates cannot be revoked. Hence, the biometric templates cannot be stored in plain format and needs strong protection against any forgery. In this paper, we present a technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Here, initially the input images are pre-processed using various processes to make images fit for further processing. In our proposed method, the features are extracted from the processed face and palm vein images by finding out unique common points. The chaff points are added to the already extracted points to obtain the combined feature vector. The secret key points which are generated based on the user key input (by using proposed method) are added to the combined feature vector to have the fuzzy vault. For decoding, the multi-modal biometric template from palm vein and face image is constructed and is combined with the stored fuzzy vault to generate the final key. Finally, the experimentation is conducted using the palm vein and face database available in the CASIA and JAFFE database. The evaluation metrics employed are FMR (False Match Ratio) and GMR (Genuine Match Ratio). From the metric values obtained for the proposed system, we can infer that the system has performed well.

Article Details

How to Cite
Lalithamani, N., & Sabrigiriraj, M. (2014). Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem. Machine Graphics and Vision, 23(1/2), 97–114. https://doi.org/10.22630/MGV.2014.23.1.6
References

A. Juels and M. Wattenberg, A fuzzy commitment scheme, 6th ACM Conference on Computer and Communications Security New York, pp.28-36, 1999. (Crossref)

C. Han, H. Cheng, C. Lin and K. Fan, Personal authentication using palm-print features, Pattern Recognition, 36, pp. 371-381, 2003. (Crossref)

D. Zhang, W. Kong, J. You and M. Wong, Online palmprint identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25, pp. 1041-1050, 2003. (Crossref)

C. L. Lin and K. C. Fan, Biometric Verification Using Thermal Images of Palm-Dorsa Vein Patterns, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 2, pp. 199-213, 2004 (Crossref)

U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: issues and challenges, Proc. of the IEEE, vol. 92, no. 6, pp. 948-960, 2004. (Crossref)

R. Dhamija and J. D. Tygar, The battle against phishing: Dynamic security skins, In Proceedings of the Symposium on Usable Privacy and Security ACM Press, pp. 77-88, 2005. (Crossref)

Shenglin Yang and Ingrid Verbauwhede, Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme, In Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609-612, 2005.

Umut Uludag, Sharath Pankanti, and Anil K. Jain, Fuzzy Vault for Fingerprints, Lecture Notes in Computer Science, Vol. 3546, pp. 310-319, 2005. (Crossref)

Yuhang Ding, Dayan Zhuang and Kejun Wang, A Study of Hand Vein Recognition Method, In Proceedings of the IEEE International Conference on Mechatronics & Automation, pp. 2106-2110, 2005.

Lingyu Wang and Graham Leedham, Near- and Far- Infrared Imaging for Vein Pattern Biometrics, In Proceeding of IEEE International Conference on Video and Signal Based Surveillance, pp. 52, 2006. (Crossref)

P. H. Hennings-Yeomans, B. V. K. Kumar, and M. Savvides, Palmprint classification using multiple advanced correlation filters and palm-specific segmentation, IEEE Transactions on Information Forensics and Security, 2, pp. 613-622, 2007. (Crossref)

D. Hu, G. Feng, and Z. Zhou, Two-dimensional locality preserving projections (2DLPP) with its application to palmprint recognition, Pattern Recognition, 40, pp. 339-342, 2007. (Crossref)

Karthik Nandakumar, Anil K. Jain and Sharath Pankanti, Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, pp. 744-757, 2007. (Crossref)

Yi-Bo Zhang, Qin Li, Jane You and Prabir Bhattacharya, Palm Vein Extraction and Matching for Personal Authentication, Advances in Visual Information Systems, vol. 4781, pp. 154-164, 2007. (Crossref)

Ying Hao, Zhenan Sun, Tieniu Tan and Chao Ren, Multispectral Palm Image Fusion For Accurate Contact-Free Palmprint Recognition, In proceedings of IEEE International Conference on Image Processing, pp. 281-284, 2008. (Crossref)

Bashir Mohammed Ghandi, Ramachandran Nagarajan and Hazry Desa, Classification of Facial Emotions using Guided Particle Swarm Optimization I, International Journal Computer and Communication Technology, Vol. 1, No. 1, pp. 36-46, 2009. (Crossref)

Su, C. (a), Palm extraction and identification, Expert Systems with Applications, 36, pp. 1082-1091, 2009. (Crossref)

Su, C. (b), Palm-print recognition by matrix discriminator, Expert Systems with Applications, 36, pp. 10259-10265, 2009. (Crossref)

Zhenhua Guo, Wangmeng Zuo, Lei Zhang and David Zhang, palmprint verification, Neurocomputing, vol. 73, no. 4-6, pp. 944-950, 2010. (Crossref)

David Zhang, Zhenhua Guo, Guangming Lu, Lei Zhang, Yahui Liu and Wangmeng Zuo, Online joint palmprint and palmvein verification, Expert Systems with Applications, 2010. (Crossref)

K. Nandakumar, A fingerprint cryptosystem based on minutiae phase spectrum, IEEE International Workshop on Information Forensics and Security, pp. 1-6, 2010. (Crossref)

Maleika Heenaye-Mamode Khan, Naushad Mamode Khan and Raja K. Subramanian, Feature Extraction of Dorsal Hand Vein Pattern using a fast modified PCA algorithm based on Cholesky decomposition and Lanczos technique, World Academy of Science, Engineering and Technology, vol. 61, 2010.

Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang and Jie Tian, An alignment-free fingerprint cryptosystem based on fuzzyvaultscheme, Journal of Network and Computer Applications, vol. 33, no. 3, pp. 207-220, 2010. (Crossref)

Xiangqian Wu, Enying Gao, Youbao Tang and Kuanquan Wang, A Novel Biometric System Based on Hand Vein, In proceedings of 5th International Conference on Frontier of Computer Science and Technology (FCST), pp. 522-526, 2010.

Yiding Wang, Kefeng Li and Jiali Cui, Hand-dorsa vein recognition based on partition Local Binary Pattern, In Proceeding of IEEE 10th International Conference on Signal Processing, pp. 1671-1674, 2010. (Crossref)

Abhilasha Bhargav, Anna Squicciarini, Elisa Bertino, Xiangwei Kong and Weike Zhang, Biometrics-Based Identifiers for Digital Identity Management, In Proceedings of the 9th Symposium on Identity and Trust, pp. 84-96, 2010.

Christopher Alvino, Christian Kohler, Frederick Barrett, Raquel E. Gurb, Ruben C. Gurb and Ragini Verma, Study of the Changing Trends in Facial Expression Recognition, International Journal of Computer Applications, Vol 21, No. 5, pp. 0975-8887, May 2011. (Crossref)

Zhenhua Guo, David Zhang, Lei Zhang, Wangmeng Zuo and Guangming Lu, Empirical study of light source selection for palmprint recognition, Pattern Recognition Letters, vol. 32, no. 2, pp. 120-126, 2011. (Crossref)

Palm print database. Online: http://www.idealtest.org .

Face database. Online: http://www.kasrl.org/jaffe.html .

Statistics

Downloads

Download data is not yet available.
Recommend Articles