Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4936
Title: | Securing fingerprint template using noninvertible ridge feature transformation |
Authors: | Dey, Somnath |
Keywords: | Computer applications;Data privacy;Feature extraction;Imaging techniques;Alignment-free;Cancelable biometrics;Fingerprint;Minutiae;Security;Biometrics |
Issue Date: | 2018 |
Publisher: | SPIE |
Citation: | Dwivedi, R., & Dey, S. (2018). Securing fingerprint template using noninvertible ridge feature transformation. Journal of Electronic Imaging, 27(5) doi:10.1117/1.JEI.27.5.053031 |
Abstract: | In a biometric verification system, leakage of biometric data leads to permanent identity loss since original biometric data are inherently linked to a user. Further, various types of attacks on a biometric system may reveal the original template and utilize in other applications. To address these security and privacy concerns, cancelable biometric has been introduced. Cancelable biometric derives a protected template from the original biometric template using transformation functions and performs comparison between templates in the transformed domain. Recent approaches toward cancelable fingerprint generation either rely on aligning minutiae points with respect to singular points (core/delta) or utilize the absolute coordinate positions of minutiae points. We propose a noninvertible ridge feature transformation method to protect the original fingerprint template information. The proposed method partitions the fingerprint region into a number of sectors with reference to each minutia point employing a ridge-based co-ordinate system. The nearest-neighbor minutiae points in each sector are identified, and ridge-based features are computed. Further, a cancelable template is generated by applying the Cantor pairing function followed by random projection. We have evaluated our method with FVC2002, FVC2004, and FVC2006 databases. It is evident from the experimental results that the proposed method outperforms existing methods in the literature. Moreover, the security analysis demonstrates that the proposed method fulfills the necessary requirements of noninvertibility, revocability, and diversity with a minor performance degradation caused due to cancelable transformation. © 2018 SPIE and IS & T. |
URI: | https://doi.org/10.1117/1.JEI.27.5.053031 https://dspace.iiti.ac.in/handle/123456789/4936 |
ISSN: | 1017-9909 |
Type of Material: | Journal Article |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: