Finger vein secure biometric template generation based on deep learning

Leakage of unprotected biometric authentication data has become a high-risk threat for many applications. Lots of researchers are investigating and designing novel authentication schemes to prevent such attacks. However, the biggest challenge is how to protect biometric data while keeping the practical performance of identity verification systems. For the sake of tackling this problem, this paper presents a novel finger vein recognition algorithm by using secure biometric template scheme based on deep learning and random projections, named FVR-DLRP. FVR-DLRP preserves the core biometric information even with the user’s password cracked, whereas the original biometric information is still safe. The results of experiment show that the algorithm FVR-DLRP can maintain the accuracy of biometric identification while enhancing the uncertainty of the transformation, which provides better protection for biometric authentication.

[1]  David Zhang,et al.  Three measures for secure palmprint identification , 2008, Pattern Recognit..

[2]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[4]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[5]  Yuhui Zheng,et al.  Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..

[6]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jie Yuan,et al.  A twice face recognition algorithm , 2016, Soft Comput..

[8]  Yilong Yin,et al.  Finger vein recognition with manifold learning , 2010, J. Netw. Comput. Appl..

[9]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[10]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[11]  Ling Shao,et al.  A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..

[12]  Enrique Argones-Rúa,et al.  Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Li Xueyan,et al.  Vein Pattern Recognitions by Moment Invariants , 2007, 2007 1st International Conference on Bioinformatics and Biomedical Engineering.

[14]  Loris Nanni,et al.  Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.

[15]  Terry L. Huston,et al.  Is telemedicine a practical reality? , 2000, CACM.

[16]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[17]  Qiang Tang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[18]  Bin Gu,et al.  Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[19]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[20]  Fei Wu,et al.  Determining Image Base of Firmware Files for ARM Devices , 2016, IEICE Trans. Inf. Syst..

[21]  Su Fei,et al.  Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.

[22]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[23]  Geoffrey E. Hinton A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.

[24]  Bin Liang,et al.  High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia , 2016, Soft Comput..

[25]  Jie Yuan,et al.  A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation , 2015, Journal of Ambient Intelligence and Humanized Computing.

[26]  Wang Ke Finger Vein Recognition Based on Wavelet Moment Fused with PCA Transform , 2007 .

[27]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[28]  Emanuele Maiorana,et al.  Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..

[29]  Yuanzhang Li,et al.  Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..

[30]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[31]  Yu-an Tan,et al.  An Effective RAID Data Layout for Object-Based De-duplication Backup System , 2016 .

[32]  Andrew Beng Jin Teoh,et al.  An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..