Coset decomposition method for storing and decoding fingerprint data

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.


  • Keywords


    Biometrics; Coset Decomposition; Fingerprints Matching; Syndrome Decoding.

  • References


      [1] D. Blackburn, C. Miles and B. Wing, “National Science and Technology Council (NSTC), Subcommittee on Biometrics”, 2006.

      [2] S.C. Draper, A. Khisti, E. Martinian, A. Vetro and J.S. Yedidia, “Secure Storage of Fingerprint Biometrics using Slepian-Wolf Codes”, in Information Theory and Applications Work, UCSD, San Diego, CA, 2007.

      [3] A. Jain and S. Aggarwal, “Multimodal Biometric System: A Survey”, International Journal of Applied Science and Advance Technology, vol. 1, no. 1, pp. 58–63, 2012.

      [4] D. Maltoni, A.K. Jain and S. Prabhakar, “Handbook of Fingerprint Recognition”, Springer: New York, 2005.

      [5] E. Martinian, S. Yekhanin and J.S. Yedidia, “Secure Biometrics via Syndromes”, Technical Report 112, Mitsubishi Electric Research Laboratories, 2005.

      [6] F.L. Podio and J.S. Dunn, “Biometric Authentication Technology: From the Movies to Your Desktop”, NIST, 100 Bureau Drive, Stop 1070, Gaithersburg, MD20899-1070 [US Department of Commerce, 1401 Constitution Avenue, NW, Washington DC 20230], 2005.

      [7] V.K. Raina, “Integration of Biometric Authentication Procedure in Customer Oriented Payment System in Trusted Mobile Devices”, International Journal of Information Technology Convergence and Services, vol. 1, no. 6, pp. 15–25, 2011. http://dx.doi.org/10.5121/ijitcs.2011.1602.

      [8] V.K. Raina and U.S. Pandey, “Biometric and ID Based User Authentication Mechanism Using Smart Cards for Multi-server Environment”, INDIACom-2011, 5th National Conference on 'Computing for Nation Development' on 10-11 March, 2011 at BVICAM, New Delhi, 2011.

      [9] N.K. Ratha and R.M. Bolle, “Automatic Fingerprint Recognition Systems”, Springer: New York, 2004. http://dx.doi.org/10.1007/b97425.

      [10] N.K. Ratha, J.H. Connell, R.M. Bolle and S. Chikkerur, “Cancelable Biometrics: A Case Study in Fingerprints”, in International Conference on Pattern Recognition, pp. 370–373, 2006.

      [11] N.K. Ratha, S. Chikkerur, J.H. Connell and R.M. Bolle, “Generating Cancelable Fingerprint Templates”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007. http://dx.doi.org/10.1109/TPAMI.2007.1004.

      [12] K. Sakata, T. Maeda, M. Matsushita, K. Sasakawa and H. Tamaki, “Fingerprint Authentication Based on Matching Scores with Other Data”, in Lecture Notes in Computer Science, ser. LNCS, vol. 3832, pp. 280–286, 2005.

      [13] M. Sayed, “Coset Decomposition Method for Decoding Linear Codes”, Int. J. Algebra, vol. 5, no. 28, pp. 1395–1404, 2011.

      [14] M. Sayed. and F. Jradi, “Biometrics: Effectiveness and Applications within the Blended Learning Environment”, Journal of Computer Engineering and Intelligent Systems (CEIS), vol. 5, no. 5, pp. 1–8, 2014.

      [15] Y. Sutcu, S. Rane, J.S. Yedidia, S.C. Draper and A. Vetro, “Feature Transformation for a Slepian-Wolf Biometric System based on Error Correcting Codes”, in Computer Vision and Pattern Recognition (CVPR) Biometrics Workshop, Anchorage, AL, pp. 1–6, 2008.

      [16] A. Teoh, A. Gho and D. Ngo, “Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892–1901, 2006. http://dx.doi.org/10.1109/TPAMI.2006.250.

      [17] J.R. Vacca, “Biometric Technologies and Verification Systems”, Elsevier Science & Technology, 2007.

      [18] A. Vetro, S.C. Draper, S. Rane and J.S. Yedidia, “Securing Biometric Data”, in Distributed Source Coding, P.L. Dragotti and M. Gastpar Eds., Academic Press, 2009. http://dx.doi.org/10.1016/B978-0-12-374485-2.00016-0.

      [19] J.L. Wayman, A.K. Jain, D. Maltoni and D. Maio, “Biometric Systems Technology, Design and Performance Evaluation”, London: Springer, 2005.

      [20] J. Yang, “Biometric Verification Techniques Combing with Digital Signature for Multimodal Biometrics Payment Systems”, IEEE International Conference on Management of e-Commerce and e-Government, pp. 405–410, 2010.


 

View

Download

Article ID: 3958
 
DOI: 10.14419/jacst.v4i1.3958




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.