Mathematical Model of the Biometric System of Fingerprint Authentication for Modern Web-Services

This paper considers mathematical models of biometric fingerprint images, as well as basic computational procedures for fingerprinting. The main stages of processing dactyloscopic portraits based on the selection of local features, their filtering and digital processing are investigated. The developed software implements the transformation of fingerprint images with the subsequent formation of a cryptographically strong password sequence based on them. This allows you to simulate a dactyloscopic authentication system for the purpose of studying certain of its properties, estimating probabilistic performance indicators (error probabilities of the first and second kind), and so on.

[1]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[2]  Sergii Kavun,et al.  Code-based cryptosystems from NIST PQC , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[3]  Nishant Doshi,et al.  A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[4]  Alexandr Kuznetsov,et al.  Improved Method of Determining the Alternative Set of Numbers in Residue Number System , 2018 .

[5]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[6]  Venu Govindaraju,et al.  A chaincode based scheme for fingerprint feature extraction , 2006, Pattern Recognit. Lett..

[7]  Zilong Chen,et al.  Fingerprint Image Enhancement Method based on Adaptive Median Filter , 2018, 2018 24th Asia-Pacific Conference on Communications (APCC).

[8]  Driss Aboutajdine,et al.  Application of new alteration attack on biometric authentication systems , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).

[9]  Zulfiqar Ali Memon,et al.  Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[10]  Jacqueline Speir,et al.  Frequency filtering to suppress background noise in fingerprint evidence: quantifying the fidelity of digitally enhanced fingerprint images. , 2014, Forensic science international.

[11]  Shi-Qiong Xi,et al.  Fast Algorithm of Fingerprint Singularity Region Enhancement , 2018, 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC).

[12]  R. D. Hughes Probability Theory and Mathematical Statistics for Engineers , 1985 .

[13]  Archana S. Shinde,et al.  An Embedded Fingerprint Authentication System , 2015, 2015 International Conference on Computing Communication Control and Automation.

[14]  Liu Wei,et al.  Fingerprint Based Identity Authentication for Online Examination System , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[15]  Duncan J. McCarthy,et al.  Expertise in Fingerprint Identification , 2013, Journal of forensic sciences.

[16]  Aloysius George,et al.  FBFET: Fuzzy based fingerprint enhancement technique based on adaptive thresholding , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[17]  S. Patil Sandip,et al.  Selective review of fingerprint enhancement, classification and matching techniques , 2015, 2015 IEEE Bombay Section Symposium (IBSS).

[18]  Frans M. J. Willems,et al.  Privacy-leakage codes for biometric authentication systems , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  A. Kuznetsov,et al.  NIST PQC: CODE-BASED CRYPTOSYSTEMS , 2018, Telecommunications and Radio Engineering.

[20]  Alexandru-Cosmin Grivei Touch based biometric authentication for Android devices , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[21]  Christoph Busch,et al.  A novel approach used for measuring fingerprint orientation of arch fingerprint , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[22]  Alexandr Kuznetsov,et al.  Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[24]  Alexandr Kuznetsov,et al.  New Code Based Fuzzy Extractor for Biometric Cryptography , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[25]  K. Prasanth,et al.  Fingerprint based authentication system with keystroke dynamics for realistic user , 2014, Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014.

[26]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[27]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[28]  Pang Liaojun,et al.  A Novel Biometric-Based Authentication Scheme with Privacy Protection , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[29]  Alexandr Kuznetsov,et al.  Experimental Studies Of The Modern Symmetric Stream Ciphers , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).

[30]  K Madhavi,et al.  Rectification of distortion in single rolled fingerprint , 2016, 2016 International Conference on Circuits, Controls, Communications and Computing (I4C).

[31]  Michael D. Garris,et al.  Characterization of Latent Print Lights-Out Modes for Automated Fingerprint Identification Systems (AFIS) | NIST , 2014 .

[32]  Alexandr Kuznetsov,et al.  Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).

[33]  Anil K. Jain,et al.  Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations , 2017, IEEE Transactions on Information Forensics and Security.

[34]  Alexandr Kuznetsov,et al.  Code-based electronic digital signature , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).