Cancelable Fingerprint Recognition based on Encrypted Convolution Kernel in Different Domains

Peoples’ biometrics, such as fingerprints, are unique , as a result it can be used in many evidence security requests, such as employees’ registration gate, crime investigation, and revealing smart phones. The security of fingerprints is very critical in protecting the peoples’ identity. In this research, a cancelable fingerprint recognition system is proposed. The proposed system is based on comprising four biometrics in a unified biometric template for each person using Discrete Cosine Transform (DCT) compression. This unified biometric template is encrypted with different convolution kernels produced by chaotic Baker map in different domains. The Integer Wavelet Transform (IWT) and the Discrete Wavelet Transform (DWT) are used to create different transformations of the fingerprint. In case a transformed fingerprint is compromised, the biometric fingerprint transformation is reorganized with another transformation. A comparative study between different transform-domains in the occurrence of attacks shows the authority of encryption in the DWT domain with different keys. Both Equal Error Rate (EER) and Area under Receiver Operating Characteristic (AROC) curve are used for performance evaluation revealing high performance of the proposed system.

[1]  Kannan Karthik,et al.  A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..

[2]  Fathi E. Abd El-Samie,et al.  Efficient implementation of chaotic image encryption in transform domains , 2014, J. Syst. Softw..

[3]  Arpita Sarkar,et al.  Cancelable biometric based key generation for symmetric cryptography , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).

[4]  Pritee Khanna,et al.  Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates , 2017 .

[5]  Jiankun Hu,et al.  Design of alignment-free cancelable fingerprint templates via curtailed circular convolution , 2014, Pattern Recognit..

[6]  Arpita Sarkar,et al.  Cryptographic Key Generation Scheme from Cancellable Biometrics , 2018 .

[7]  Jiankun Hu,et al.  A fingerprint and finger-vein based cancelable multi-biometric system , 2018, Pattern Recognit..

[8]  Ricardo López-Ruiz,et al.  Notions of Chaotic Cryptography: Sketch of a Chaos based Cryptosystem , 2012, ArXiv.

[9]  Arun Ross,et al.  An introduction to biometrics , 2008, ICPR 2008.

[10]  B. V. K. Vijaya Kumar,et al.  Correlation Pattern Recognition , 2002 .

[11]  Wei-Chao Liu,et al.  Occluded Fingerprint Recognition Algorithm Based on Multi Association Features Match , 2014, J. Multim..

[12]  Gaurav Bhatnagar,et al.  Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.

[13]  Zhe Jin,et al.  A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template , 2014, Pattern Recognit. Lett..

[14]  Jiankun Hu,et al.  A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations , 2017, Pattern Recognit..

[15]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[16]  Ayman Al Falou,et al.  Implementation of an all-optical image compression architecture based on Fourier transform which will be the core principle in the realisation of the DCT , 2005, SPIE OPTO-Ireland.

[17]  Charles L. Wilson,et al.  An empirical study of sample size in ROC-curve analysis of fingerprint data , 2006, SPIE Defense + Commercial Sensing.

[18]  José M. Amigó,et al.  Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.

[19]  Fathi E. Abd El-Samie,et al.  A double random phase encoding approach for cancelable iris recognition , 2018, Optical and Quantum Electronics.

[20]  Jiankun Hu,et al.  A blind system identification approach to cancelable fingerprint templates , 2016, Pattern Recognit..

[21]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..