Log in

A novel technique for fingerprint template security in biometric authentication systems

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

The deployment of biometrics spans over almost every application that incorporates user authentication. Fingerprint biometrics in particular is by far the most popular choice in biometric authentication systems. However, vulnerabilities such as database compromise, fingerprint reconstruction, and identity fraud have made it crucial to develop highly robust and privacy-preserving authentication systems. Although there have been considerable efforts in the area, security gaps such as dependency on singular point, scale variability and low user recognition performance limit the real-time application of these techniques. In this paper, we address these performance issues and put forth a novel technique for fingerprint template security. The secure templates generated by the proposed technique are computed using many-to-one mapped fully quantized features. A set of rotation and translation independent features are derived using minutiae triplets which makes the proposed secure fingerprint template an alignment-free user template. Each feature type is rotation and translation invariant making the templates free for scale anomalies. The technique essentially hides the true feature information of a fingerprint with the help of a non-invertible transformation function. This enables user identity verification in the transformed domain itself. An extensive result analysis using five fingerprint databases obtained from FVC2002 and FVC2004 has been carried out. The proposed technique delivers a superior performance compared to other noteworthy contributions and therefore proves to be fit for use in various applications involving fingerprint-based identity verification mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Abdellatef, E., Ismail, N.A., Abd Elrahman, S.E.S., Ismail, K.N., Rihan, M., El-Samie, A., Fathi, E.: Cancelable multi-biometric recognition system based on deep learning. The Visual Computer 36(6), 1097–1109 (2020)

    Article  Google Scholar 

  2. Ahmad, T., Hu, J., Wang, S.: Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44(10–11), 2555–2564 (2011)

    Article  Google Scholar 

  3. Ali, S.S., Prakash, S.: 3-Dimensional secured fingerprint shell. Pattern Recognition Letters 126, 68–77 (2019)

    Article  Google Scholar 

  4. Ali, S.S., Ganapathi, I.I., Prakash, S.: Robust technique for fingerprint template protection. IET Biometrics 7(6), 536–549 (2018)

    Article  Google Scholar 

  5. Ali, S.S., Baghel, V.S., Ganapathi, I.I., Prakash, S.: Robust biometric authentication system with a secure user template. Image and Vision Computing 104, 104004 (2020)

    Article  Google Scholar 

  6. Ali, S.S., Ganapathi, I.I., Prakash, S., Consul, P., Mahyo, S.: Securing biometric user template using modified minutiae attributes. Pattern Recognition Letters 129, 263–270 (2020)

    Article  Google Scholar 

  7. Ali, S.S., Ganapathi, I.I., Mahyo, S., Prakash, S.: Polynomial vault: A secure and robust fingerprint based authentication. IEEE Transactions on Emerging Topics in Computing 9, 612–625 (2021)

    Article  Google Scholar 

  8. Bedari, A., Wang, S., Yang, J.: A two-stage feature transformation-based fingerprint authentication system for privacy protection in iot. IEEE Transactions on Industrial Informatics 18(4), 2745–2752 (2021)

    Article  Google Scholar 

  9. Chen, Y., Wo, Y., **e, R., Wu, C., Han, G.: Deep secure quantization: On secure biometric hashing against similarity-based attacks. Signal Processing 154, 314–323 (2019)

    Article  Google Scholar 

  10. Chen, F., Zhou, J., Yang, C.: Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy. IEEE Transactions on Image Processing 18(7), 1665–1670 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  11. Dong, X., **, Z., **, A.T.B.: A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: Proc. of International Conference on Biometrics Theory, Applications and Systems (BTAS), IEEE, pp 1–8 (2019)

  12. Dwivedi, R., Dey, S., Sharma, M.A., Goel, A.: A fingerprint based crypto-biometric system for secure communication. Journal of Ambient Intelligence and Humanized Computing 11(4), 1495–1509 (2020)

    Article  Google Scholar 

  13. El-Hameed, H.A.A., Ramadan, N., El-Shafai, W., Khalaf, A.A., Ahmed, H.E.H., Elkhamy, S.E., El-Samie, F.E.A.: Cancelable biometric security system based on advanced chaotic maps. The Visual Computer pp 1–17 (2021)

  14. Feng, J., Jain, A.K.: Fingerprint Reconstruction: From Minutiae to Phase. IEEE Transactions on Pattern Analysis and Machine Intelligence 33(2), 209–223 (2011)

    Article  Google Scholar 

  15. Ferrara, M., Maltoni, D., Cappelli, R.: Noninvertible Minutia Cylinder-Code Representation. IEEE Transactions on Information Forensics and Security 7(6), 1727–1737 (2012)

    Article  Google Scholar 

  16. Ferrara, M., Maltoni, D., Cappelli, R.: A two-factor protection scheme for mcc fingerprint templates. In: Proc. of International Conference of the Biometrics Special Interest Group (BIOSIG), IEEE, pp 1–8 (2014)

  17. Fingerprint Verification Competition-2002 Database, http://bias.csr.unibo.it/fvc2002/default.asp. Last accessed: December (2021)

  18. Fingerprint Verification Competition-2004 Database, http://bias.csr.unibo.it/fvc2004/databases.asp. Last accessed: December (2021)

  19. Gupta, K., Walia, G.S., Sharma, K.: Novel approach for multimodal feature fusion to generate cancelable biometric. The Visual Computer 37(6), 1401–1413 (2021)

    Article  Google Scholar 

  20. Jiang, W., Ma, J.: Fingerprint feature data matching algorithm based on distributed computing. Journal of Ambient Intelligence and Humanized Computing pp 1–10 (2021). https://doi.org/10.1007/s12652-020-02811-4

  21. **, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Systems With Applications 39(6), 6157–6167 (2012)

    Article  Google Scholar 

  22. **, Z., Lim, M.H., Teoh, A.B.J., Goi, B.M.: A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template. Pattern Recognition Letters 42, 137–147 (2014)

    Article  Google Scholar 

  23. Joseph, T., Kalaiselvan, S., Aswathy, S., Radhakrishnan, R., Shamna, A.: A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. Journal of Ambient Intelligence and Humanized Computing 12(6), 6141–6149 (2021)

    Article  Google Scholar 

  24. Kumari, P., Seeja, K.: A novel periocular biometrics solution for authentication during Covid-19 pandemic situation. Journal of Ambient Intelligence and Humanized Computing pp 1–17 (2021). https://doi.org/10.1007/s12652-020-02814-1

  25. Lahmidi, A., Minaoui, K., Moujahdi, C., Rziza, M.: Fingerprint template protection using irreversible minutiae tetrahedrons. The Computer Journal (2021). https://doi.org/10.1093/comjnl/bxab111

  26. Lahmidi, A., Moujahdi, C., Minaoui, K., Rziza, M.: On the methodology of fingerprint template protection schemes conception: meditations on the reliability. EURASIP Journal on Information Security 2022(1), 1–13 (2022)

    Article  Google Scholar 

  27. Li, X., Wang, K., Shen, J., Kumari, S., Wu, F., Hu, Y.: An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. Journal of Ambient Intelligence and Humanized Computing 7(3), 427–443 (2016)

    Article  Google Scholar 

  28. Moujahdi, C., Bebis, G., Ghouzali, S., Rziza, M.: Fingerprint shell: Secure representation of fingerprint template. Pattern Recognition Letters 45, 189–196 (2014)

    Article  Google Scholar 

  29. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  Google Scholar 

  30. Patel, V.M., Ratha, N.K., Chellappa, R.: Cancelable biometrics: A review. IEEE Signal Processing Magazine 32(5), 54–65 (2015)

    Article  Google Scholar 

  31. Paul, P.P., Gavrilova, M., Klimenko, S.: Situation awareness of cancelable biometric system. The Visual Computer 30(9), 1059–1067 (2014)

    Article  Google Scholar 

  32. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  33. Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security 2011(1), 1–25 (2011)

    Article  Google Scholar 

  34. Ross, A., Shah, J., Jain, A.K.: From Template to Image: Reconstructing Fingerprints from Minutiae Points. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 544–560 (2007)

    Article  Google Scholar 

  35. Ryabko, B.Y., Stognienko, V.S., Shokin, Y.I.: A new test for randomness and its application to some cryptographic problems. Journal of Statistical Planning and Inference 123(2), 365–376 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  36. Sandhya, M., Prasad, M.V.N.K.: K-Nearest Neighborhood Structure (K-NNS) based alignment-free method for fingerprint template protection. In: Proc. of International Conference on Biometrics (ICB), IEEE, pp 386–393 (2015)

  37. Sandhya, M., Prasad, M.V.N.K.: Securing fingerprint templates using fused structures. IET Biometrics 6(3), 173–182 (2017)

    Article  Google Scholar 

  38. Sandhya, M., Prasad, M.V.N.K., Chillarige, R.R.: Generating cancellable fingerprint templates based on Delaunay triangle feature set construction. IET Biometrics 5(2), 131–139 (2016)

    Article  Google Scholar 

  39. Sandhya, M., Morampudi, M.K., Pruthweraaj, I., Garepally, P.S.: Multi-instance cancelable iris authentication system using triplet loss for deep learning models. The Visual Computer pp 1–11 (2022)

  40. Trivedi, A.K., Thounaojam, D.M., Pal, S.: Non-invertible cancellable fingerprint template for fingerprint biometric. Computers & Security 90, 101690 (2020)

    Article  Google Scholar 

  41. Ushmaev, O., Sinitsyn, I.: Multimodal biometrics: Empirical study of performance-throughput trade-off. Pattern Recognition and Image Analysis 21(4), 754–758 (2011)

    Article  Google Scholar 

  42. Vaidya, S.P.: Fingerprint-based robust medical image watermarking in hybrid transform. The Visual Computer pp 1–16 (2022)

  43. Wang, S., Hu, J.: Alignment-free cancelable fingerprint template design: A densely infinite-to-one map** (ditom) approach. Pattern Recognition 45(12), 4129–4137 (2012)

    Article  Google Scholar 

  44. Wang, S., Hu, J.: A blind system identification approach to cancelable fingerprint templates. Pattern Recognition 54, 14–22 (2016)

    Article  Google Scholar 

  45. Wilcox, R.: Kolmogorov Smirnov test. Encyclopedia of biostatistics 4 (2005)

  46. Wong, W., Wong, M.D., Kho, Y.: Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics. Journal of Central South University 20(5), 1292–1297 (2013)

    Article  Google Scholar 

  47. Yaman, D., Eyiokur, F.I., Ekenel, H.K.: Multimodal soft biometrics: combining ear and face biometrics for age and gender classification. Multimedia Tools and Applications 81(16), 22695–22713 (2022)

    Article  Google Scholar 

  48. Yang, W., Hu, J., Wang, S., Yang, J.: Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. In: Proc. of International Symposium on Cyberspace Safety and Security, pp 81–91 (2013)

  49. Yang, W., Hu, J., Wang, S., Stojmenovic, M.: An alignment-free fingerprint bio-cryptosystem based on modified voronoi neighbor structures. Pattern Recognition 47(3), 1309–1320 (2014)

    Article  Google Scholar 

  50. Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C.: A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognition 78, 242–251 (2018)

    Article  Google Scholar 

  51. Yang, W., Wang, S., Yu, K., Kang, J.J., Johnstone, M.N.: Secure fingerprint authentication with homomorphic encryption. In: 2020 Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp 1–6 (2020)

  52. Yang, W., Wang, S., Shahzad, M., Zhou, W.: A cancelable biometric authentication system based on feature-adaptive random projection. Journal of Information Security and Applications 58, 102704 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Afeeza Ali.

Ethics declarations

Conflict of Interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ali, A., Baghel, V.S. & Prakash, S. A novel technique for fingerprint template security in biometric authentication systems. Vis Comput 39, 6249–6263 (2023). https://doi.org/10.1007/s00371-022-02726-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-022-02726-5

Keywords

Navigation