SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
58
REVIEW OF DIFFERENT METHODS OF PROTECTING
PRIVACY USING FINGERPRINTS
Achut B. Gavhane
PG Student Electronics and Telecommunication Engineering Department,
TPCT’s College of Engineering, Osmanabad, (M.S.), India
Ravindra P. Shelkikar
Associate Professor, Electronics and Telecommunication Engineering Department,
TPCT’s College of Engineering, Osmanabad (M.S.) India
ABSTRACT
In authentication systems, protecting the privacy of the fingerprints becomes a very important
issue. Traditional encryption is not sufficient for privacy protection of fingerprint because before the
fingerprint matching decryption is required, which exposes the fingerprint to the attacker. Therefore,
in recent years, significant efforts have been put into developing specific protection techniques for
fingerprint. In this paper various methods for recognizing fingerprint has been surveyed. We have
introduced the idea of combining biometrics such that the combined biometric would not be a unique
identifier of the person, yet it could still be successfully used for authentication purposes.
Keywords: Biometrics, Fingerprint, Minutiae Extraction.
I. INTRODUCTION
Recently, fingerprint recognition is one of the leading biometric technologies based on
fingerprint distinctiveness, persistence and ease of attainment. Even though there are many real
applications utilizing this technology, its problems are still not completely solved, particularly in
poor quality fingerprint images and when low-cost acquisition devices with a small area are assumed
INTERNATIONAL JOURNAL OF ELECTRONICS AND
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 6, Issue 1, January (2015), pp. 58-64
© IAEME: http://www.iaeme.com/IJECET.asp
Journal Impact Factor (2015): 7.9817 (Calculated by GISI)
www.jifactor.com
IJECET
© I A E M E
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
59
Fig.1.1: Fingerprint Recognition process
The basic process of fingerprint recognition process is shown in the above figure 1. In
fingerprint recognition process, the significant step which involves on system accuracy is matching
between template and query fingerprint. In this process first pre-process the query fingerprint then
we extract the minutiae (two prominent local ridge characteristics) from the query fingerprint. This
extracted information and template stored in the database is matched then it will identifying
fingerprint. These matching algorithms may be classified into three types such as minutiae-based,
correlation-based and feature-based approaches. Still, based on analysis, the score of these
algorithms is not high (particularly in case fingerprints are of the same finger but they are rotated or
the intersection is moreover small). Consequently, it’s essential to design a model for standardized
fingerprint template so as to improve matching score. Exploring the possibility of generating a
template in the direction of conventional fingerprint approach represents a joint identity through a
mixing process. In particular, the digital identity has been created by combining the two fingerprints
of one person to generate a single fingerprint in turn defines the joint identity. Figure 2 refers to the
flow of ridge patterns of the fingerprint in the tip of the finger. Irregularities in local regions of the
fingertip have been exhibited, referred as minutiae positions. The distribution of these minutiae
positions, with the associated ridge structure, is considered to be different for each fingerprint.
Fig. 1.2: A design of mixing fingerprints of two different individuals to generate a combined
fingerprint representing their joint identity
To provide better verification and authentication various methods of fingerprint recognition
can be surveyed.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
60
II. METHODOLOGY
Teoh et al. [1] proposed a biohashing approach by computing the inner products between
the user’s fingerprint features and a pseudorandom number (i.e., the key). The accuracy of this
approach mainly depends on the key, which is assumed to be never stolen or shared. A. Kong
et al. [2] proposed the increasing demand for accurate and reliable personal authentication, biometric
recognition, a substitute for or complement to existing authentication technologies, has attracted
considerable attention. It has recently been reported that, along with its variants, Biohashing, a new
technique that combines biometric features and a tokenized (pseudo-) random number, has achieved
perfect accuracy, having zero EER for fingerprints, faces and palm prints. Ratha et al. [3] proposed
to generate cancelable fingerprint templates by applying noninvertible transforms on the
minutiae. The noninvertible transform is guided by a key, which will usually lead to a
reduction in matching accuracy. Demonstrate various methods to generate multiple cancelable
identifiers from fingerprint images to overcome these problems. In essence, a user can be given as
many biometric identifiers as needed by issuing a new transformation “key.” The identifiers can be
cancelled and replaced when compromised. S. Li and A. C. Kot et al. [5] proposed a novel data
hiding scheme for the thinned fingerprint template. During data embedding, this scheme does not
produce any boundary pixel in the thinned fingerprint. Thus, the abnormality caused by data hiding
is visually imperceptible in the thinned fingerprint. B. Yanikoglu and A. Kholmatov et al. [6]
proposed a biometric authentication framework which uses two separate biometric features and
mixed to obtain a non-unique identifier of the individual, in order to address privacy concerns and
demonstrate a fingerprint verification system that uses dual fingerprints of the same individual for
protecting privacy. A combined biometric ID composed of two fingerprints is stored in the central
database, and imprints from both fingers are required in the verification process, lowering the risk of
misuse and privacy loss and demonstrate the performance of the proposed method on a small
fingerprint database collected from people.
Each person who enrolls into the system gives two fingerprints, A and B. The minutiae points
of these two fingerprints are found and superimposed so that their center of mass is aligned. The
obtained combined minutiae list becomes the biometric ID of the person and is stored in the central
database. Note that the combined ID can be generated by many different fingerprint pairs, as such, it
is not a unique identifier of the person. The enrollment process is shown in Fig. 1, with the combined
minutiae image being on the right. Note that in this figure we show the two parts of the combined
fingerprint with separate markers for clarity; in fact they should all be marked the same, since they
are indistinguishable in the combined list.
Figure 2.1: The combined fingerprint minutiae on the right is what is stored at the central
database. The source finger of minutiae points is actually lost; they are marked here with
special shapes for clarity
When a person is to be authenticated, s/he gives two fingerprint impressions (A0 and B0),
both of which is used to verify his/her identity. First, one of the fingerprints, say A0, is matched
against the combined biometric ID, as shown in Fig. 2.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
61
Figure 2.2: The combined minutiae list is on the left. The registration of the first fingerprint
A0, shown in blue circles, against the combined fingerprint is shown on the right. Circles and
squares are used here for clarity
Note that even though the minutiae positions are marked so as to indicate their source finger,
they are not kept in the combined ID. The matching is done by finding the correspondence between
the minutiae of the fingerprint and the combined minutiae list. Both the minutiae extraction and the
point correspondence algorithm are non-essential to the proposed method and any previously
developed minutiae detection or correspondence algorithms can be used. After this first match step,
the matched minutiae points are removed from the combined minutiae list, giving
AM + BM – A’M
where AM indicates the minutiae list of the fingerprint A, + indicates concatenation and ¡ indicates
deletion of matched points. Then, the second fingerprint B0 is matched against these remaining
minutiae points. The person is authenticated if the ratio of matched minutiae points to the remaining
minutiae points left from the combined list plus those from B0 is above a certain threshold:
| (AM + BM – A’M) ∩ B’M |
Score = 2 x (1)
| (AM + BM – A’M) + B’M |
In case A0 matches A perfectly and B0 matches B perfectly, the resulting score with this
metric is 100. If A0 was not successfully matched, it would be reflected in the final score since many
minutiae points would be left unmatched, making the denominator large. If B0 was not successfully
matched, the numerator would be small. Note that the match rate obtained in the first step is
significantly higher than if we just matched the corresponding fingerprints A and A0, since the
combined ID contains about twice as many minutiae points. In particular, fingerprints with few
minutiae points match to several combined fingerprints with large sets of minutiae points. This
makes it very difficult to search the combined database using a single fingerprint to find matching
records (identification), which is the intended result. On the other hand, it does not reduce the
effectiveness of the system: if minutiae from B are matched by A0, it will show in the final score if it
matters. If on the other hand A’s and B’s minutiae are nearby, then it does not matter whose minutiae
are matched.
III. EXPERIMENTAL RESULTS
We have demonstrated the concept of combined biometric ID using fingerprints. Four
fingerprints (two from one finger and two from another finger) are collected from each of the 96
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
62
people contributing to the database. Two of these fingerprints, one from each finger, are added to the
reference set: they are used to form the combined ID for the person. The remaining two fingerprints,
the second impressions of each finger, are added to the test set: they are used to authenticate the
person. Figure 3 shows a quadruple from the database: the top row is the reference set (A and B) and
the bottom row is the test set (A0 and B0), from left to right. Notice that the fingerprints have many
missed minutiae, either due to labeling mistakes, or due to the shifts and deformations in the taking
of the imprints. Once the data is collected, the minutiae points are found and matching of the
fingerprint pairs are done against the stored combined fingerprint, as explained in the previous
section. In this work, the minutiae points are marked manually, but the matching is done
automatically. However, note that manual labeling of the minutiae points is not essential: any
reasonably successful minutiae detection and matching algorithm can be used. The automatic
matching is done via a simple matching algorithm that aligned two point sets by finding the best
alignment over all translations and rotations, allowing for some elastic deformation of the fingerprint
(accepting two points as matching if they are within a small threshold in this alignment). Since the
aim of this paper was to introduce the idea of a combined biometric ID, we only needed to show that
the resulting combined ID is non-unique, but that it can still be used to authenticate a person. Hence,
minutiae detection and matching were assumed to be given or were simply implemented. Using the
proposed method explained in Section 2 and the collected data, there was a 2.1% false accept rate
(FRR). In other words, 2 out of 96 people in the database were not authorized using their second set
of fingerprints (A0 and B0). On the other hand when each of these fingerprint pairs were used as a
forgery for all other people (for a total of 9120=96*95 data points), only 2.1% were falsely accepted
(FAR). The 2.1% point is the equal error rate (EER) where
Figure 3.1: Sample quadruple fingerprints from the database. Top row shows fingerprints A
and B; bottom row shows fingerprints A0 and B0, left to right
FAR and FRR, which are inversely proportional, are equal. In order to test how much error is
introduced to the authentication scheme, by the use of two fingerprints instead of one, we have
calculated the error rate of matching the fingerprints one by one, using the same minutiae detection
and matching algorithms. The matching score used was the ratio of the number of matching points
over the total number of points in the matched and the reference fingerprints. For instance, for the A
set, it was:
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
63
| AM ∩ A’M |
Score = 2 x (2)
| AM + A’M |
In this task, the FRR was found to be 3.1%: in other words, only 6 fingerprints were falsely
rejected out of 192 fingerprints (96x2). When each fingerprint was used as forgery for all the others,
the FAR for this test was 2%. Hence, the combined biometric scheme introduced no additional
errors, in fact, it reduced the error rate. This should in fact be the case, since we are given more
identifying information about the person, however the test have shown that the proposed
combination scheme did not hinder verification. The thresholds to decide where to authorize a
fingerprint or fingerprints were set on the test set, for both tasks, in order to give the EER.
Figure 3.2: The combined minutiae from 3 different people
Most of the errors were due to fingerprints that had significant stretching between two
instances, as these are not well matched using our simple matching algorithm. Other biggest source
of error is fingerprints that have missing left or right parts, due to pressure being applied to one side
of the finger while taking the imprint.
IV. CONCLUSION
We have demonstrated such a system using fingerprints and showed that the authentication
error rate is very small, even with very simple underlying algorithms for minutiae detection and
matching. Given that there was actually a decrease in the verification error using the combined
biometric, compared to our simple fingerprint verification system, we can say that the proposed
scheme can be used to increase privacy without hindering the verification process. In the future, one
can further look into how to best combine two biometrics, so as to hide most unique features of a
fingerprint. A combined biometric ID composed of two fingerprints is stored in the central database,
and imprints from both fingers are required in the verification process, lowering the risk of misuse
and privacy loss.
V. REFERENCES
[1] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor Authentication
featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37,
no. 11, pp. 2245–2255, 2004.
[2] A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing
and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368, 2006.
[3] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating Cancelable
fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4,
pp. 561–72, Apr. 2007.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME
64
[4] A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: A
security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security,
San Jose, Jan. 2010.
[5] S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process.
Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011.
[6] B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in
Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug. 2004.
[7] A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc.
19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
[8] A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in E Int.
Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec.
2, 2011.
[9] E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using
fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9, 2008.
[10] Soukaena H. Hashem, Abeer T. Maolod and Anmar A. Mohammad, “Proposal to Enhance
Fingerprint Recognition System”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 3, 2013, pp. 10 - 22, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[11] Shekhar R Suralkar and Prof (Dr) Pradeep M. Patil, “Fingerprint Verification using
Steerable Filters”, International Journal of Electronics and Communication Engineering
&Technology (IJECET), Volume 4, Issue 2, 2013, pp. 264 - 268, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.

Contenu connexe

Tendances

Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
Editor IJARCET
 

Tendances (9)

An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
Effective Implementation techniques in Offline Signature Verification
Effective Implementation techniques in Offline Signature  VerificationEffective Implementation techniques in Offline Signature  Verification
Effective Implementation techniques in Offline Signature Verification
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Ijcet 06 08_005
Ijcet 06 08_005Ijcet 06 08_005
Ijcet 06 08_005
 
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHINGTHE LORE OF SPECULATION AND ANALYSIS USING  MACHINE LEARNING AND IMAGE MATCHING
THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
20320130406009
2032013040600920320130406009
20320130406009
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 

En vedette

Sri hari goud -Resume
Sri hari goud -ResumeSri hari goud -Resume
Sri hari goud -Resume
Srihari Goud
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
Piyush Mittal
 

En vedette (16)

Unconstrained fingerprint recognition fully touchless 3 d system ieee
Unconstrained fingerprint recognition  fully touchless 3 d system ieeeUnconstrained fingerprint recognition  fully touchless 3 d system ieee
Unconstrained fingerprint recognition fully touchless 3 d system ieee
 
Service discovery with communication fingerprints
Service discovery with communication fingerprintsService discovery with communication fingerprints
Service discovery with communication fingerprints
 
beagle c.v. 2014
beagle c.v. 2014beagle c.v. 2014
beagle c.v. 2014
 
Sri hari goud -Resume
Sri hari goud -ResumeSri hari goud -Resume
Sri hari goud -Resume
 
CV_Ritika
CV_RitikaCV_Ritika
CV_Ritika
 
Reciente
RecienteReciente
Reciente
 
Trayecto académico
Trayecto académico Trayecto académico
Trayecto académico
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
 
Tubuh manusia
Tubuh manusiaTubuh manusia
Tubuh manusia
 
Semiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memoriesSemiconductor memories and auxiliary memories
Semiconductor memories and auxiliary memories
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
CSR OF ADTIYA BIRLA GROUP
CSR OF ADTIYA BIRLA GROUPCSR OF ADTIYA BIRLA GROUP
CSR OF ADTIYA BIRLA GROUP
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
WTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx versionWTF - Why the Future Is Up to Us - pptx version
WTF - Why the Future Is Up to Us - pptx version
 

Similaire à Review of different methods of protecting privacy using finger prints

Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
Iaetsd Iaetsd
 

Similaire à Review of different methods of protecting privacy using finger prints (20)

Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
K017257578
K017257578K017257578
K017257578
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
IRJET- Finger Vein Presentation Attack Detection using Total Variation Decomp...
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 

Plus de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Review of different methods of protecting privacy using finger prints

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 58 REVIEW OF DIFFERENT METHODS OF PROTECTING PRIVACY USING FINGERPRINTS Achut B. Gavhane PG Student Electronics and Telecommunication Engineering Department, TPCT’s College of Engineering, Osmanabad, (M.S.), India Ravindra P. Shelkikar Associate Professor, Electronics and Telecommunication Engineering Department, TPCT’s College of Engineering, Osmanabad (M.S.) India ABSTRACT In authentication systems, protecting the privacy of the fingerprints becomes a very important issue. Traditional encryption is not sufficient for privacy protection of fingerprint because before the fingerprint matching decryption is required, which exposes the fingerprint to the attacker. Therefore, in recent years, significant efforts have been put into developing specific protection techniques for fingerprint. In this paper various methods for recognizing fingerprint has been surveyed. We have introduced the idea of combining biometrics such that the combined biometric would not be a unique identifier of the person, yet it could still be successfully used for authentication purposes. Keywords: Biometrics, Fingerprint, Minutiae Extraction. I. INTRODUCTION Recently, fingerprint recognition is one of the leading biometric technologies based on fingerprint distinctiveness, persistence and ease of attainment. Even though there are many real applications utilizing this technology, its problems are still not completely solved, particularly in poor quality fingerprint images and when low-cost acquisition devices with a small area are assumed INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2015): 7.9817 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 59 Fig.1.1: Fingerprint Recognition process The basic process of fingerprint recognition process is shown in the above figure 1. In fingerprint recognition process, the significant step which involves on system accuracy is matching between template and query fingerprint. In this process first pre-process the query fingerprint then we extract the minutiae (two prominent local ridge characteristics) from the query fingerprint. This extracted information and template stored in the database is matched then it will identifying fingerprint. These matching algorithms may be classified into three types such as minutiae-based, correlation-based and feature-based approaches. Still, based on analysis, the score of these algorithms is not high (particularly in case fingerprints are of the same finger but they are rotated or the intersection is moreover small). Consequently, it’s essential to design a model for standardized fingerprint template so as to improve matching score. Exploring the possibility of generating a template in the direction of conventional fingerprint approach represents a joint identity through a mixing process. In particular, the digital identity has been created by combining the two fingerprints of one person to generate a single fingerprint in turn defines the joint identity. Figure 2 refers to the flow of ridge patterns of the fingerprint in the tip of the finger. Irregularities in local regions of the fingertip have been exhibited, referred as minutiae positions. The distribution of these minutiae positions, with the associated ridge structure, is considered to be different for each fingerprint. Fig. 1.2: A design of mixing fingerprints of two different individuals to generate a combined fingerprint representing their joint identity To provide better verification and authentication various methods of fingerprint recognition can be surveyed.
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 60 II. METHODOLOGY Teoh et al. [1] proposed a biohashing approach by computing the inner products between the user’s fingerprint features and a pseudorandom number (i.e., the key). The accuracy of this approach mainly depends on the key, which is assumed to be never stolen or shared. A. Kong et al. [2] proposed the increasing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, Biohashing, a new technique that combines biometric features and a tokenized (pseudo-) random number, has achieved perfect accuracy, having zero EER for fingerprints, faces and palm prints. Ratha et al. [3] proposed to generate cancelable fingerprint templates by applying noninvertible transforms on the minutiae. The noninvertible transform is guided by a key, which will usually lead to a reduction in matching accuracy. Demonstrate various methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation “key.” The identifiers can be cancelled and replaced when compromised. S. Li and A. C. Kot et al. [5] proposed a novel data hiding scheme for the thinned fingerprint template. During data embedding, this scheme does not produce any boundary pixel in the thinned fingerprint. Thus, the abnormality caused by data hiding is visually imperceptible in the thinned fingerprint. B. Yanikoglu and A. Kholmatov et al. [6] proposed a biometric authentication framework which uses two separate biometric features and mixed to obtain a non-unique identifier of the individual, in order to address privacy concerns and demonstrate a fingerprint verification system that uses dual fingerprints of the same individual for protecting privacy. A combined biometric ID composed of two fingerprints is stored in the central database, and imprints from both fingers are required in the verification process, lowering the risk of misuse and privacy loss and demonstrate the performance of the proposed method on a small fingerprint database collected from people. Each person who enrolls into the system gives two fingerprints, A and B. The minutiae points of these two fingerprints are found and superimposed so that their center of mass is aligned. The obtained combined minutiae list becomes the biometric ID of the person and is stored in the central database. Note that the combined ID can be generated by many different fingerprint pairs, as such, it is not a unique identifier of the person. The enrollment process is shown in Fig. 1, with the combined minutiae image being on the right. Note that in this figure we show the two parts of the combined fingerprint with separate markers for clarity; in fact they should all be marked the same, since they are indistinguishable in the combined list. Figure 2.1: The combined fingerprint minutiae on the right is what is stored at the central database. The source finger of minutiae points is actually lost; they are marked here with special shapes for clarity When a person is to be authenticated, s/he gives two fingerprint impressions (A0 and B0), both of which is used to verify his/her identity. First, one of the fingerprints, say A0, is matched against the combined biometric ID, as shown in Fig. 2.
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 61 Figure 2.2: The combined minutiae list is on the left. The registration of the first fingerprint A0, shown in blue circles, against the combined fingerprint is shown on the right. Circles and squares are used here for clarity Note that even though the minutiae positions are marked so as to indicate their source finger, they are not kept in the combined ID. The matching is done by finding the correspondence between the minutiae of the fingerprint and the combined minutiae list. Both the minutiae extraction and the point correspondence algorithm are non-essential to the proposed method and any previously developed minutiae detection or correspondence algorithms can be used. After this first match step, the matched minutiae points are removed from the combined minutiae list, giving AM + BM – A’M where AM indicates the minutiae list of the fingerprint A, + indicates concatenation and ¡ indicates deletion of matched points. Then, the second fingerprint B0 is matched against these remaining minutiae points. The person is authenticated if the ratio of matched minutiae points to the remaining minutiae points left from the combined list plus those from B0 is above a certain threshold: | (AM + BM – A’M) ∩ B’M | Score = 2 x (1) | (AM + BM – A’M) + B’M | In case A0 matches A perfectly and B0 matches B perfectly, the resulting score with this metric is 100. If A0 was not successfully matched, it would be reflected in the final score since many minutiae points would be left unmatched, making the denominator large. If B0 was not successfully matched, the numerator would be small. Note that the match rate obtained in the first step is significantly higher than if we just matched the corresponding fingerprints A and A0, since the combined ID contains about twice as many minutiae points. In particular, fingerprints with few minutiae points match to several combined fingerprints with large sets of minutiae points. This makes it very difficult to search the combined database using a single fingerprint to find matching records (identification), which is the intended result. On the other hand, it does not reduce the effectiveness of the system: if minutiae from B are matched by A0, it will show in the final score if it matters. If on the other hand A’s and B’s minutiae are nearby, then it does not matter whose minutiae are matched. III. EXPERIMENTAL RESULTS We have demonstrated the concept of combined biometric ID using fingerprints. Four fingerprints (two from one finger and two from another finger) are collected from each of the 96
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 62 people contributing to the database. Two of these fingerprints, one from each finger, are added to the reference set: they are used to form the combined ID for the person. The remaining two fingerprints, the second impressions of each finger, are added to the test set: they are used to authenticate the person. Figure 3 shows a quadruple from the database: the top row is the reference set (A and B) and the bottom row is the test set (A0 and B0), from left to right. Notice that the fingerprints have many missed minutiae, either due to labeling mistakes, or due to the shifts and deformations in the taking of the imprints. Once the data is collected, the minutiae points are found and matching of the fingerprint pairs are done against the stored combined fingerprint, as explained in the previous section. In this work, the minutiae points are marked manually, but the matching is done automatically. However, note that manual labeling of the minutiae points is not essential: any reasonably successful minutiae detection and matching algorithm can be used. The automatic matching is done via a simple matching algorithm that aligned two point sets by finding the best alignment over all translations and rotations, allowing for some elastic deformation of the fingerprint (accepting two points as matching if they are within a small threshold in this alignment). Since the aim of this paper was to introduce the idea of a combined biometric ID, we only needed to show that the resulting combined ID is non-unique, but that it can still be used to authenticate a person. Hence, minutiae detection and matching were assumed to be given or were simply implemented. Using the proposed method explained in Section 2 and the collected data, there was a 2.1% false accept rate (FRR). In other words, 2 out of 96 people in the database were not authorized using their second set of fingerprints (A0 and B0). On the other hand when each of these fingerprint pairs were used as a forgery for all other people (for a total of 9120=96*95 data points), only 2.1% were falsely accepted (FAR). The 2.1% point is the equal error rate (EER) where Figure 3.1: Sample quadruple fingerprints from the database. Top row shows fingerprints A and B; bottom row shows fingerprints A0 and B0, left to right FAR and FRR, which are inversely proportional, are equal. In order to test how much error is introduced to the authentication scheme, by the use of two fingerprints instead of one, we have calculated the error rate of matching the fingerprints one by one, using the same minutiae detection and matching algorithms. The matching score used was the ratio of the number of matching points over the total number of points in the matched and the reference fingerprints. For instance, for the A set, it was:
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 63 | AM ∩ A’M | Score = 2 x (2) | AM + A’M | In this task, the FRR was found to be 3.1%: in other words, only 6 fingerprints were falsely rejected out of 192 fingerprints (96x2). When each fingerprint was used as forgery for all the others, the FAR for this test was 2%. Hence, the combined biometric scheme introduced no additional errors, in fact, it reduced the error rate. This should in fact be the case, since we are given more identifying information about the person, however the test have shown that the proposed combination scheme did not hinder verification. The thresholds to decide where to authorize a fingerprint or fingerprints were set on the test set, for both tasks, in order to give the EER. Figure 3.2: The combined minutiae from 3 different people Most of the errors were due to fingerprints that had significant stretching between two instances, as these are not well matched using our simple matching algorithm. Other biggest source of error is fingerprints that have missing left or right parts, due to pressure being applied to one side of the finger while taking the imprint. IV. CONCLUSION We have demonstrated such a system using fingerprints and showed that the authentication error rate is very small, even with very simple underlying algorithms for minutiae detection and matching. Given that there was actually a decrease in the verification error using the combined biometric, compared to our simple fingerprint verification system, we can say that the proposed scheme can be used to increase privacy without hindering the verification process. In the future, one can further look into how to best combine two biometrics, so as to hide most unique features of a fingerprint. A combined biometric ID composed of two fingerprints is stored in the central database, and imprints from both fingers are required in the verification process, lowering the risk of misuse and privacy loss. V. REFERENCES [1] B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor Authentication featuring fingerprint data and tokenised random number,” Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004. [2] A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368, 2006. [3] N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating Cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–72, Apr. 2007.
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 58-64 © IAEME 64 [4] A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transformation: A security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010. [5] S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011. [6] B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug. 2004. [7] A. Ross and A. Othman, “Mixing fingerprints for template security and privacy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011. [8] A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in E Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011. [9] E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9, 2008. [10] Soukaena H. Hashem, Abeer T. Maolod and Anmar A. Mohammad, “Proposal to Enhance Fingerprint Recognition System”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 10 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] Shekhar R Suralkar and Prof (Dr) Pradeep M. Patil, “Fingerprint Verification using Steerable Filters”, International Journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 264 - 268, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.