Documente Academic
Documente Profesional
Documente Cultură
several proposed methods like polar, Cartesian and surface reveals that none of the template security scheme satisfies all
folding transformation methods of minutiae representations the properties of an ideal scheme and are prone to various
of the fingerprint. The authors have also presented the types of attacks through which the original information of the
approximate analysis of the various used method strengths. fingerprint is recovered. In order to overcome such
Further, the authors have concluded that surface folding limitations of the present cancellable template security
transformation shows better results than other two proposed schemes there is a need of development of much more
transformation-based schemes [9]. transformation based schemes with powerful non-invertible
functions. This is a very big challenge in front of the research
Fenq Quan et.al have proposed three methods to recover the community now-a-days. The researchers need to address
original information from the Ratha’s template. These three these types of limitations and continue to work for securing
methods or attacks are ARM attack, Brute-Force attack and the important information of the user by developing more
solving equation attack. The authors have recovered original and more non-invertible as well as salting based methods.
information from the Ratha’s secured template by finding the
vulnerable points in the Ratha’s secured template strategy. Table 1: Summary of fingerprint cancellable methods
The Ratha has used many-to-one mapping for the non-
invertible transformation of the fingerprint but F.Quan et.al
Cancellable
Biometrics
Reference
Proposed
EER (%)
Mapping
Function
Methods
found that the many-to-one function is vulnerable at some
Type of
points and found the original feature values with the help of
three proposed attacking methods[10].
The left hand and right hand fingerprint minutiae points A. Pseudocode of Proposed multi-instance fingerprint
are represented by FV1 and FV2 respectively. technique
From these minutiae points of both the fingerprints, the The pseudocode of the proposed MIF technique is shown in
keys are generated and are given in equation 1 and 2 table II.
respectively:
Table 2: The pseudocode of proposed MIF
K1= Concatenate (xi, yi, 𝛳i)
(1) Pseudocode of MIF
K2= Concatenate (xj, yj, 𝛳j) Input: Two fingerprint templates FV1 and FV2
(2) Output: Secured fused template T1
FV1 = (xi, yi, 𝛳i)n
The division method is used to form the secure fused FV2 = (xj, yj, 𝛳j)m
template T1 and is given in equation 3: Where n, m represents the number of minutiae points in
each fingerprint
T1= K1 mod K2 (3) If n = m then
For i= 1 to n
The final secured template T1 formed by division method K1 = Concatenate (xi, yi, 𝛳i)
is finally, stored into the database. K2 = Concatenate (xi, yi, 𝛳i)
T1[i] = K1 mod K2
End for
Left Fingerprint Right Fingerprint
Minutiae Points Else if n < m
Minutiae Points
(FP1) A=m–n
(FP2)
A1[] = original feature values – A
For i = 1 to n
K1 = Concatenate (xi, yi, 𝛳i)
K2 = Concatenate (A1xi, A1yi, A1𝛳i)
Key Generation Key Generation T1[i] = K1 mod K2
(K1) (K2) End for
Else
A=n–m
A1[] = original feature values – A
For i = 1 to n
K1 = Concatenate (xi, yi, 𝛳i)
Division Method K2 = Concatenate (A1xi, A1yi, A1𝛳i)
T1[i] = K1 mod K2
End for
End if
Type of Mapping EER (%) Reference To provide security to the important feature points of a
Function fingerprint, cancellable biometrics play an important role. In
Many-to-one 5.19 [13] this paper, it has been noticed that all of the fingerprint
cancellable template security schemes are developed for uni-
K-plets-to-one 4.98 [8] biometrics. So, in order to overcome the scalability problem
- 3 [7] in these techniques, a multi-instance fingerprint framework
Many-to-one 2.87 Proposed and its security algorithm has been introduced. It has been
MIF found that due to the presence of various vulnerable points in
many-to-one mapping functions, there is a need of
developing more and more non-invertible many-to-one
mapping functions by taking the vulnerable points of that
function into the consideration so that original information of
the fingerprint’s, are not recovered back. The proposed MIF
technique shows better results for EER than other fingerprint
security schemes.
REFERENCES
Authors Profile
Sheikh Imroza Manzoor is presently pursuing master of
technology in Computer Science and Technology from
Central University of Jammu, Jammu-181143. She has
completed her Bachelor of Engineering in computer Science
from Model Institute of Engineering and Technology,
Kotbhalwal, Jammu. Her area of interest includes
information security, Algorithms, IOT, wireless sensor
networks and soft computing techniques.