Pattern recognition by embedded reduced number of angles fingerprint algorithm in biometric machines augments security

In this paper, a biometric machine with embedded RNA-FINNT reduced number of angles fingerprint hash algorithm with specifications is proposed. The essential objective is to propose a methodology for enhancement of security at all platforms where biometric identity authentication is implemented. For this purpose, existing algorithms and techniques are first introduced with their proposed methodology, drawbacks and results. Then RNA-FINNT implementation is discussed and compared with the existing algorithms and techniques, and the advantages and results of it are derived. Illustrative experiment and results are analysed to prove the augmentation of security in the biometric machines. In particular, the proposed method enhances the security and privacy for identity authentication through biometric machines.

[1]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Thomas Engel,et al.  Website fingerprinting in onion routing based anonymization networks , 2011, WPES.

[3]  Andrew P. Witkin,et al.  Analyzing Oriented Patterns , 1985, IJCAI.

[4]  Anil K. Jain,et al.  Combining multiple matchers for a high security fingerprint verification system , 1999, Pattern Recognit. Lett..

[5]  Chin-Chen Chang,et al.  An Improved Biometrics-based User Authentication Scheme without Concurrency System , 2010, International Journal of Intelligent Information Processing.

[6]  M. S. Kumbhar,et al.  An Identity-Authentication System Using Fingerprints , 2012 .

[7]  Wei-Chi Ku,et al.  Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .

[8]  G. Geetha,et al.  Implementing RNA-FINNT in Ideal Password Authentication Scheme results in Fortification of Transport Layer Security Protocol , 2012, IAIT 2012.

[9]  Rosalind W. Picard,et al.  Restoration and enhancement of fingerprint images using M-lattice-a novel nonlinear dynamical system , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).

[10]  Bahram Sadeghi Bigham,et al.  Fingerprint Matching Using an Onion Layer Algorithm of Computational Geometry Based on Level 3 Features , 2011, DICTAP.

[11]  Sharath Pankanti,et al.  Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .

[12]  Marc Joye,et al.  Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.

[13]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[14]  Anil K. Jain,et al.  A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[15]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[16]  Kee-Young Yoo,et al.  ID-based password authentication scheme using smart cards and fingerprints , 2003, OPSR.

[17]  Wilson S. Geisler,et al.  Multichannel Texture Analysis Using Localized Spatial Filters , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Miguel A. Patricio,et al.  Privacy and Legal Requirements for Developing Biometric Identification Software in Context-Based Applications 13 , 2010 .

[19]  Craig I. Watson,et al.  PCASYS- A Pattern-Level Classification Automation System for Fingerprints | NIST , 1995 .

[20]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[21]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[22]  J. K. Lee,et al.  Fingerprint-based remote user authentication scheme using smart cards , 2002 .

[23]  Gang Qu,et al.  Fingerprint - Iris Fusion Based Identification System Using a Single Hamming Distance Matcher , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.

[24]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[25]  Qiang Tong,et al.  Research of improved gabor based on fingerprint image enhanced algorithm in wavelet domain , 2012, 2012 International Conference on Computational Problem-Solving (ICCP).

[26]  Younghwa An,et al.  Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.

[27]  Akio Tojo,et al.  Fingerprint pattern classification , 1984, Pattern Recognit..

[28]  Ramesh C. Jain,et al.  Computerized Flow Field Analysis: Oriented Texture Fields , 1992, IEEE Trans. Pattern Anal. Mach. Intell..

[29]  Bryanna Hahn Fox,et al.  Federal Bureau of Investigation (FBI) , 2015 .

[30]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[31]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[32]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[33]  Ali Mohades,et al.  Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry , 2007 .

[34]  Kevin W. Bowyer,et al.  Combination of Multiple Classifiers Using Local Accuracy Estimates , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[35]  A. R. Rao,et al.  A Taxonomy for Texture Description and Identification , 1990, Springer Series in Perception Engineering.

[36]  Anil K. Jain,et al.  Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..

[37]  G. Aguilar,et al.  Multimodal biometric system using fingerprint , 2007, 2007 International Conference on Intelligent and Advanced Systems.

[38]  Steven Gold,et al.  A Graduated Assignment Algorithm for Graph Matching , 1996, IEEE Trans. Pattern Anal. Mach. Intell..

[39]  Ashok Kumar Das,et al.  Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..

[40]  Qiang Wang,et al.  Structural fingerprint based hierarchical filtering in song identification , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[41]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[42]  Michael Scott,et al.  Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints , 2004, OPSR.

[43]  Babu M. Mehtre,et al.  Segmentation of fingerprint images using the directional image , 1987, Pattern Recognit..

[44]  M. Omair Ahmad,et al.  A multilevel structural technique for fingerprint representation and matching , 2013, Signal Process..

[45]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[46]  Dario Maio,et al.  Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[47]  M. Ramakrishnan,et al.  A NEW APPROACH OF ALTERED FINGERPRINTS DETECTION ON THE ALTERED AND NORMAL FINGERPRINT DATABASE , 2013 .

[48]  B. Sherlock,et al.  Fingerprint enhancement by directional Fourier filtering , 1994 .

[49]  Safwat G. Zaky,et al.  Fingerprint identification using graph matching , 1986, Pattern Recognit..

[50]  Muhammad Khurram Khan,et al.  An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.

[51]  K. Kaur,et al.  Fortification of Transport Layer Security Protocol , 2011 .

[52]  Kuljeet Kaur,et al.  Fortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters , 2012 .

[53]  Sharath Pankanti,et al.  Fingerprint enhancement , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[54]  Quan-Sen Sun,et al.  Fingerprint matching using local alignment based on multiple pairs of reference minutiae , 2009, J. Electronic Imaging.

[55]  Anil K. Jain,et al.  Unsupervised texture segmentation using Gabor filters , 1990, 1990 IEEE International Conference on Systems, Man, and Cybernetics Conference Proceedings.

[56]  James A. McHugh,et al.  Automated fingerprint recognition using structural matching , 1990, Pattern Recognit..

[57]  John Berry,et al.  History and Development of Fingerprinting , 2001 .

[58]  Geetha Ganesan,et al.  Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security , 2013 .

[59]  Lawrence O'Gorman,et al.  An approach to fingerprint filter design , 1989, Pattern Recognit..

[60]  Johan Wiklund,et al.  Multidimensional Orientation Estimation with Applications to Texture Analysis and Optical Flow , 1991, IEEE Trans. Pattern Anal. Mach. Intell..

[61]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[62]  Craig I. Watson,et al.  Neural Network Fingerprint Classification , 1994 .