New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization

Abstract An effective fusion method for combining information from single modality system requires Multimodal biometric crypto system. Fuzzy vault has been widely used for providing security, but the disadvantage is that the biometric data are easily visible and chaff points generated randomly can be easily found, so that there is a chance for the data to be hacked by the attackers. In order to improve the security by hiding the secret key within the biometric data, a new chaff point based fuzzy vault is proposed. For the generation of the secret key in the fuzzy vault, grouped feature vectors are generated by combining the extracted shape and texture feature vectors with the new chaff point feature vectors. With the help of the locations of the extracted feature vector points, x and y co-ordinate chaff matrixes are generated. New chaff points can be made, by picking best locations from the feature vectors. The optimal locations are found out by using particle swarm optimization (PSO) algorithm. In PSO, extracted feature locations are considered particles and from these locations, best location for generating the chaff feature point is selected based on the fitness value. The experimentation of the proposed work is done on Yale face and IIT Delhi ear databases and its performance are evaluated using the measures such as Jaccard coefficient (JC), Genuine Acceptance Rate (GAR), False Matching Rate (FMR), Dice Coefficient (DC) and False Non Matching Rate (FNMR). The results of the implementation give better recognition of person by facilitating 90% recognition result.

[1]  Mohammed Bennamoun,et al.  Multibiometric human recognition using 3D ear and face features , 2013, Pattern Recognit..

[2]  Mohamed Khalil Hani,et al.  Securing cryptographic key with fuzzy vault based on a new chaff generation method , 2010, 2010 International Conference on High Performance Computing & Simulation.

[3]  Chenye Wu,et al.  Automated human identification using ear imaging , 2012, Pattern Recognit..

[4]  Tjark Vandommele Biometric authentication today , 2010 .

[5]  L. Durlofsky,et al.  Application of a particle swarm optimization algorithm for determining optimum well location and type , 2010 .

[6]  Renfa Li,et al.  A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[7]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Khalid M. Amin,et al.  A new Optimization-Based Image Segmentation method By Particle Swarm Optimization , 2011 .

[9]  Lifang Wu,et al.  A Face Based Fuzzy Vault Scheme for Secure Online Authentication , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.

[10]  Debnath Bhattacharyya,et al.  Biometric Authentication: A Review , 2009 .

[11]  Enrique Argones-Rúa,et al.  Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.

[12]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[13]  Pingzhi Fan,et al.  Performance evaluation of score level fusion in multimodal biometric systems , 2010, Pattern Recognit..

[14]  Lucas D. Introna,et al.  Facial Recognition Technology A Survey of Policy and Implementation Issues , 2009 .

[15]  Lu Leng,et al.  Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..

[16]  Christophe Rosenberger,et al.  Hybrid template update system for unimodal biometric systems , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[17]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[18]  Sowkarthika Securing Iris Templates using Double Encryption Method , 2012 .

[19]  Dacheng Xu,et al.  A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence , 2010, 2010 IEEE International Conference on Mechatronics and Automation.

[20]  Liping Chen,et al.  A robust face and ear based multimodal biometric system using sparse representation , 2013, Pattern Recognit..

[21]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[22]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[23]  Muhammad Khurram Khan,et al.  Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .

[24]  G. Padmavathi,et al.  Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .

[25]  Yajun Ha,et al.  Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..

[26]  Qinghai Bai,et al.  Analysis of Particle Swarm Optimization Algorithm , 2010, Comput. Inf. Sci..