Coset decomposition method for storing and decoding fingerprint data

  • Authors

    • Mohamed Sayed Arab Open UniversityFaculty of Computer Studies
    2014-12-26
    https://doi.org/10.14419/jacst.v4i1.3958
  • Biometrics, Coset Decomposition, Fingerprints Matching, Syndrome Decoding.
  • Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.

  • References

    1. [1] D. Blackburn, C. Miles and B. Wing, “National Science and Technology Council (NSTC), Subcommittee on Biometricsâ€, 2006.

      [2] S.C. Draper, A. Khisti, E. Martinian, A. Vetro and J.S. Yedidia, “Secure Storage of Fingerprint Biometrics using Slepian-Wolf Codesâ€, in Information Theory and Applications Work, UCSD, San Diego, CA, 2007.

      [3] A. Jain and S. Aggarwal, “Multimodal Biometric System: A Surveyâ€, International Journal of Applied Science and Advance Technology, vol. 1, no. 1, pp. 58–63, 2012.

      [4] D. Maltoni, A.K. Jain and S. Prabhakar, “Handbook of Fingerprint Recognitionâ€, Springer: New York, 2005.

      [5] E. Martinian, S. Yekhanin and J.S. Yedidia, “Secure Biometrics via Syndromesâ€, Technical Report 112, Mitsubishi Electric Research Laboratories, 2005.

      [6] F.L. Podio and J.S. Dunn, “Biometric Authentication Technology: From the Movies to Your Desktopâ€, NIST, 100 Bureau Drive, Stop 1070, Gaithersburg, MD20899-1070 [US Department of Commerce, 1401 Constitution Avenue, NW, Washington DC 20230], 2005.

      [7] V.K. Raina, “Integration of Biometric Authentication Procedure in Customer Oriented Payment System in Trusted Mobile Devicesâ€, International Journal of Information Technology Convergence and Services, vol. 1, no. 6, pp. 15–25, 2011. http://dx.doi.org/10.5121/ijitcs.2011.1602.

      [8] V.K. Raina and U.S. Pandey, “Biometric and ID Based User Authentication Mechanism Using Smart Cards for Multi-server Environmentâ€, INDIACom-2011, 5th National Conference on 'Computing for Nation Development' on 10-11 March, 2011 at BVICAM, New Delhi, 2011.

      [9] N.K. Ratha and R.M. Bolle, “Automatic Fingerprint Recognition Systemsâ€, Springer: New York, 2004. http://dx.doi.org/10.1007/b97425.

      [10] N.K. Ratha, J.H. Connell, R.M. Bolle and S. Chikkerur, “Cancelable Biometrics: A Case Study in Fingerprintsâ€, in International Conference on Pattern Recognition, pp. 370–373, 2006.

      [11] N.K. Ratha, S. Chikkerur, J.H. Connell and R.M. Bolle, “Generating Cancelable Fingerprint Templatesâ€, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007. http://dx.doi.org/10.1109/TPAMI.2007.1004.

      [12] K. Sakata, T. Maeda, M. Matsushita, K. Sasakawa and H. Tamaki, “Fingerprint Authentication Based on Matching Scores with Other Dataâ€, in Lecture Notes in Computer Science, ser. LNCS, vol. 3832, pp. 280–286, 2005.

      [13] M. Sayed, “Coset Decomposition Method for Decoding Linear Codesâ€, Int. J. Algebra, vol. 5, no. 28, pp. 1395–1404, 2011.

      [14] M. Sayed. and F. Jradi, “Biometrics: Effectiveness and Applications within the Blended Learning Environmentâ€, Journal of Computer Engineering and Intelligent Systems (CEIS), vol. 5, no. 5, pp. 1–8, 2014.

      [15] Y. Sutcu, S. Rane, J.S. Yedidia, S.C. Draper and A. Vetro, “Feature Transformation for a Slepian-Wolf Biometric System based on Error Correcting Codesâ€, in Computer Vision and Pattern Recognition (CVPR) Biometrics Workshop, Anchorage, AL, pp. 1–6, 2008.

      [16] A. Teoh, A. Gho and D. Ngo, “Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputsâ€, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892–1901, 2006. http://dx.doi.org/10.1109/TPAMI.2006.250.

      [17] J.R. Vacca, “Biometric Technologies and Verification Systemsâ€, Elsevier Science & Technology, 2007.

      [18] A. Vetro, S.C. Draper, S. Rane and J.S. Yedidia, “Securing Biometric Dataâ€, in Distributed Source Coding, P.L. Dragotti and M. Gastpar Eds., Academic Press, 2009. http://dx.doi.org/10.1016/B978-0-12-374485-2.00016-0.

      [19] J.L. Wayman, A.K. Jain, D. Maltoni and D. Maio, “Biometric Systems Technology, Design and Performance Evaluationâ€, London: Springer, 2005.

      [20] J. Yang, “Biometric Verification Techniques Combing with Digital Signature for Multimodal Biometrics Payment Systemsâ€, IEEE International Conference on Management of e-Commerce and e-Government, pp. 405–410, 2010.

  • Downloads

  • How to Cite

    Sayed, M. (2014). Coset decomposition method for storing and decoding fingerprint data. Journal of Advanced Computer Science & Technology, 4(1), 6-11. https://doi.org/10.14419/jacst.v4i1.3958