Open Access Open Access  Restricted Access Subscription or Fee Access

Template Security: Symmetric Angle Hash Algorithm

Aparna Sharma, Manvjeet Kaur

Abstract


The templates are the pivotal element of the biometric system. Once templates are intruded then authenticity of the biometric systems is at stake, as the original biometric can be replaced by the imposter’s template or the original template can be used to access personal information, account details, health records etc or the original template can be spoiled so that the authenticated user of the system does not possess access or the template could be used to do replay attack. An algorithm which works progressively without decreasing the performance of system for fingerprint biometric templates and help in escalating the issues of templates theft is proposed and named Symmetric angle hash algorithm which is robust enough to secure the fingerprints and help in verifying the fingerprint scans. The preliminary approach involves extracting minutiae’s, global features and angle computations from the fingerprint and storing them.Followed with the comparisons on distance metrics and consequently give authentication and verification. The testing is done on a standard database FVC 2002. The experimental results predict this algorithm is suitable for securing templates with effective trade-off between FAR and FRR values.


Keywords


Core and Delta Points, Fingerprint Verification, Minutiae Extraction and Symmetric Angle Hash Algorithm.

Full Text:

PDF

References


Anil K.Jain,Karthik Nandakumar and Abhishek Nagar, “ Review Article Biometric Template Security”, EURASIP Journal on Advances in Signal Processing, Volume 2008, Article ID 579416.

David Maltoni,Dario Maio,Anil K .Jain ,Salil Prabhakar Handbook On fingerprint Recognition, Springer 2003.

Sergey Tulyakov, Faisal Farooq and Venu Govindaraju, “ Symmetric Hash Function for Minutiae”.ICAPR’05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis-Volume Part II, Springer-Verlag Berlin.

Abhishek Nagar, Anil K. Jain, “On the Security of Non Invertible Fingerprint template transforms ”, First IEEE international workshop on Information Forensics and Security,2009.

Chul-Hyun Park, Joon-Jae Lee, Mark J.T. Smitha, Kil-Houm Park, “Singular point detection by shape analysis of directional fields in fingerprints”, Pattern Recognition 39 (2006) 839 – 855,Elsevier.

M. P. Dubuisson, and A.K.Jain,. “A modified Hausdorff distance for object matching,”,Proceedings of the International Conference on Pattern Recognition (ICPR94), 566-568.

Raymond Thai, “Fingerprint Image Enhancement and Minutiae Extraction”, Thesis report, submitted at University of Western Australia, 2003.

A.K.Jain,A.Ross and S.Pankanti, “Biometrics :A tool for information security,” IEEE Transactions on Information Forensics and Security,June 2006.

Chris Roberts, “Biometric attack vectors and defences”,Conference on Computer and Security,New Zealand, Elsevier,2006.

Manish Manoria, Ajit Kumar Shrivastava, Satyendra Singh Thakur, Debu Sinha, “Secure Biometric cryptosystem for distributed system”, International Journal of Communication Network and Security (IJCNS-2011)ISSN: 2231-1882 Volume. 1, Issue 2, 2011.

Mayank Goyal,Thesis on “Generation of Hash Functions from hashes”, submitted at IIT Guhwati,2010

Ruifang Wang, Xin Yang, Xia Liu, “A Novel Fingerprint Template Protection Scheme Based on Distance Projection Coding”, International conference on Pattern Recognition,2010

H B Kekre, “Fingerprint Core Point Detection Algorithm Using Orientation Field Based Multiple Features”, International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15

Ewa Matusiak, “Noninvertible Gabor Transforms”, IEEE Transactions On Signal Processing, VOL. 58, NO. 5, May 2010.

Atipat Julasayvake and Somsak Choomchuay, “An algorithm for fingerprint core point detection”,9th International Symposium on Signal Processing and Its Applications, 2007. ISSPA 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.