CFP last date
22 April 2024
Reseach Article

Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation

by Fahad Layth Malallah, Sharifah Mumtazah Bt Syed Ahmad Abdul Rahman, Wan Azizun Bt. Wan Adnan, Salman Bin Yussof
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 4
Year of Publication: 2014
Authors: Fahad Layth Malallah, Sharifah Mumtazah Bt Syed Ahmad Abdul Rahman, Wan Azizun Bt. Wan Adnan, Salman Bin Yussof
10.5120/17169-7240

Fahad Layth Malallah, Sharifah Mumtazah Bt Syed Ahmad Abdul Rahman, Wan Azizun Bt. Wan Adnan, Salman Bin Yussof . Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation. International Journal of Computer Applications. 98, 4 ( July 2014), 4-17. DOI=10.5120/17169-7240

@article{ 10.5120/17169-7240,
author = { Fahad Layth Malallah, Sharifah Mumtazah Bt Syed Ahmad Abdul Rahman, Wan Azizun Bt. Wan Adnan, Salman Bin Yussof },
title = { Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 4 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number4/17169-7240/ },
doi = { 10.5120/17169-7240 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:57.063318+05:30
%A Fahad Layth Malallah
%A Sharifah Mumtazah Bt Syed Ahmad Abdul Rahman
%A Wan Azizun Bt. Wan Adnan
%A Salman Bin Yussof
%T Non-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 4
%P 4-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper describes a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. We propose a renewable-noninvertible transformation process named Bio-Trigono comprising two consecutive steps. First, a shuffling scheme is applied to a signature sample to attain the renewability property for template protection. This is followed by the deployment of a cosine function for which its periodic characteristic is exploited to achieve a much desired non-invertible property for additional security. The overall template protection scheme was tested rigorously on signature samples of a SIGMA database through an online signature verification system. Its verification utilized the Principal Component Analysis (PCA) for features' extraction and the Artificial Neural Network (ANN) for user reference modeling and classification processes. Results demonstrated an effective cancelable template protection scheme whereby the best averaged error rates were 10. 3, 10. 5 and 14. 1% for un-transformed first and second transformed signature templates, respectively.

References
  1. L. O'Gorman, "Comparing passwords, tokens, and biometrics for user authentication", in Proc. IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2021–2040.
  2. N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Syst. J. , vol. 40, no. 3, pp. 614–634, 2001.
  3. Y. Sutcu, H. T. Sencar and N. Memon, "A Secure biometric authentication scheme based on robust hashing", in Proc. 7th workshop on Multimedia and security (MM-Sec'05), New York, USA, Aug. 2005, pp. 111-116.
  4. L. Beaugé and A. Drygajlo, "Fully featured secure biometric smart card device for fingerprint-based authentication and identification", in Proc. 12th ACM workshop on Multimedia and security(MM&Sec'10), Roma, Italy, Sept. 2010, pp. 181-186.
  5. P. Briggs and P. Olivier, "Biometric daemons: authentication via electronic pets", in Proc. CHI, Florence, Italy, 2008.
  6. S. M. S. Ahmad, B. M. Ali and W. A. W. Adnan ,"Technical issues and challenges of biometric applications as access control tools of information security", International journal of innovative computing, information and control, vol. 8, vo. 11, pp. 7983-7999 Nov. 2012.
  7. M. Faundez-Zanuy, "Signature recognition state-of-the-art", IEEE aerospace and electronic systems magazine , vol. 20, no. 7, pp. 28–32, Jul. 2005.
  8. S. G. Kanade, D. Petrovska-Delacr´ etaz, and B. Dorizzi, "Cancelable biometrics for better security and privacy in biometric systems", Springer-Verlag Berlin Heidelberg, Part III, CCIS 192, pp. 20–34, 2011.
  9. E. Maiorana, "Biometric template protection for signature based authentication systems", PhD dissertation, University Roma Tre, Rome, Italy, 2009.
  10. A. K. Jain, K. Nandakumaand A. Nagar, "Biometric template security", EURASIP J. Adv. Signal Process," vol. 2008, no. 1, pp. 1-17, 2008.
  11. C. Vielhauer, R. Steinmetza and A. Mayerhofer, "Biometric hash based on statistical features of online signatures", in Proc. International conference on pattern recognition (ICPR), vol. 1, 2002. pp. 123–126.
  12. H. Feng, C. C. Wah, "Private key generation from on-line handwritten signatures", Information management and computer security, vol. 10, no. 4, pp: 159–164, 2002.
  13. M. Freire-Santos, J. Fierrez-Aguilara and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature", in Proc. Biometric technologies for human identification III, Orlando, FL, vol. 6202, Apr. 2006, pp. 225–231.
  14. W. J. Scheirer and T. E. Boult, "Cracking fuzzy vault and biometric encryption", in Proc. IEEE Biometric Symp. , 2007, pp. 1–6.
  15. W. K. Yip, A. Goh, D. C. L. Ngo, and A. B. J. Teoh, "Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures", International Conference in Biometrics (ICB06), Hong Kong, China, January 5-7, 2006, pp. 509–515.
  16. M. R. Freire, J. Fierrez and J. Ortega-Garcia, "Dynamic signature verification with template protection using helper data", in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2008, pp. 1713-1716.
  17. M. Purser, "Introduction to error correcting codes", Artech House, Boston,MA,1995.
  18. E. Maiorana and P. Campisi, "Fuzzy commitment for function based signature template protection", IEEE signal process. Lett. , vol. 17, no. 3, pp. 249–252, Mar. 2010.
  19. A. Juels and M. Wattenberg, "A fuzzy commitment scheme", in Proc. ACM Conf. computer and communications security (ACM CCS '99), Singapore, Nov. 1999. pp. 28–36.
  20. E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia and A. Neri, "Cancelable templates for sequence-based biometrics with application to on-line signature Recognition", IEEE Transaction on system, man and cybernetics-part A: system and human, vol. 40, no. 3, pp. 525–538, May. 2010.
  21. E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia and A. Neri, "Template Protection for HMM-based On-line Signature Authentication", in Proc. IEEE conference on computer vision and pattern recognition workshops (CVPRW), Anchorage, USA, June 2008, pp. 1-6.
  22. E. Maiorana, P. Campisi, J. Ortega-Garcia, and A. Neri, "Cancelable biometrics for HMM-based signature recognition", in Proc. 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems, (BTAS) Washington, DC, 2008. pp. 1–6.
  23. A. Cichocki and S. Amari, "Adaptive blind signal and image processing", Wiley, New York, 2002.
  24. E. A. Rúa, E. Maiorana, J. L. A. Castro and P. Campisi, "Biometric template protection using universal background mode: an application to online signature", IEEE transaction on information forensics and security, vol. 7, no. 1, pp. 269- 282, Feb, 2012.
  25. M. Martinez-Diaz, J. Fierrez, J. Ortega-Garcia ,"Universal Background Models for Dynamic Signature Verification", in Proc. IEEE, BTA, Crystal City, USA, Sept. 2007 pp. 1 – 6.
  26. E. Maiorana, D. Blasi, P. Campisi, "Biometric template protection using turbo codes and modulation constellations", in Proc. information forensics and security (WIFS), Tenerife, Spain, Dec. 2012, pp. 25-30.
  27. F. L. Malallah, S. M. Syed Ahmad, S. Yussof, W. A. Wan Adnan, V. Iranmanesh and O. A. Arigbabu, "A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application", International Review on Computers and Software (I. RE. CO. S. ), Vol. 8, n. 12, Dec. 2013.
  28. F. L. Malallah, S. M. S. Ahmad, W. A. W. Adnan, V. Iranmanesh, S. Yussof, "Online signature template protection by shuffling and one time pad schemes with neural network verification", in Proc. 2nd International conference on computer science & computational mathematics (ICCSCM). Kuala Lumpur, Malaysia, 2013, pp. 43-50.
  29. J. Wen, M. Severa, W. Zeng M. H. Luttrell and W. Jin, "A Format-compliant configurable encryption framework for access control of video", IEEE Transaction on circuit and system for video technology, vol. 12, no. 6, pp. 545-557, June, 2002.
  30. S. Kanade, D. Petrovska-Delacrétaz, and B. Dorizzi,"Multi-biometrics based crypto-biometric session key generation and sharing protocol", in Proc. 13th ACM multimedia workshop on Multimedia and security (MM&Sec '11), New York, NY, USA 2011, Pp. 109-114.
  31. R. M. Bolle, J. H. Connell and N. K. Ratha, "Biometric perils and patches", Pattern recognition, vol. 35, no. 12, pp. 2727 – 2738, 2002.
  32. Davey Alba , "China's tianhe-2 caps top 10 supercomputers", IEEE Spectrum, Retrieved June 19, 2013, (Accessed 27 August, 2013).
  33. J. Fortuna and D. Capson, " Improved support vector classification using PCA and ICA feature space modification", Pattern Recognit. , vol. 37, no. 4, pp. 1117 – 1129, 2004.
  34. C. M. Bishop, "Pattern recognition and machine learning", in Information Science and Statistics, Springer, 2006. pp. 225-233.
  35. J. Mohamad-Saleh and B. S. Hoyle ,"Improved neural network performance using principal component analysis on Matlab", International journal of the computer, the internet and Management vol. 16, no. 2, pp. 1-8, May, 2008.
  36. H. Demuth, M. Beale and M. Hagan ," Neural Network Toolbox™ 6 User's Guide", by The MathWorks, Inc. , 2009.
  37. H. Krishna, J. An and L. Zheng ,"A Neural network approach to classify inversion regions of high mobility ultralong channel single walled carbon nanotube field-effect transistors for sensing applications," in Proc. IEEE 5th International nanoelectronics conference (INEC), 2013, pp. 85-88.
  38. C. Pratola, F. D. Frate, G. Schiavon and D. Solimini ,"Toward fully automatic detection of changes in suburban areas from VHR SAR images by combining multiple neural-network models", IEEE Transaction on geosciences and remote sensing, vol. 51, no. 4, pp. 2055-2066, April, 2013.
  39. N. Kamaruddin and A. Wahab ," Emulating human cognitive approach for speech emotion using MLP and GenSofNN", in Proc. IEEE 5th International conference on information and communication technology for the Muslim world (ICT4M), Rabat, 2013, pp. 1–5.
  40. M. R. G. Meireles, P. E. M. Almeida and M. G. Simõe ," A comprehensive review for industrial applicability of artificial neural networks", IEEE Trans Ind Electron, vol. 50, no. 3, pp. 585-601, Jun. 2003.
  41. M. F. Moller , "A scaled conjugate gradient algorithm for fast supervised learning", Neural networks, vol. 6, no. 4, pp. 525-533, 1993.
  42. T. Munakata, "Fundamentals of the new artificial intelligence—beyond traditional paradigms", Berlin, Germany: Springer-Verlag, 1998.
  43. M. Adya and and F. Collopy ,"How effective are neural networks at forecasting and prediction a review and evaluation", Journal of Forecasting, vol. 17, issues 5-6, pp. 481-495,Dec. 1998.
  44. S. M. Syed Ahmad, A. Shakil, A. R. Ahmad, M. A. M. Balbed and R. Md. Anwar, " SIGMA – A Malaysian signature's database", in Proc. AICCSA 2008, IEEE/ACS International conference on computer systems and applications, Doha, Qatar, 31 March – 4 Mar. 2008, pp. 919-920.
  45. V. Iranmanesh, S. M. Syed Ahmad, Adnan W. A. W. and F. L. Malallah, "Online signature verification using neural network and pearson correlation features", IEEE Conference on Open Systems (ICOS), Kuching, Malaysia, 2013, pp. 18–21.
  46. J. Wang and N. Zheng ," A novel fractal image compression scheme with block classification and sorting based on pearson's correlation coefficient ", IEEE Transaction on image processing, vol. 22, no. 9, pp. 3690- 3702, Sept. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Artificial neural network authentication biometrics cancelable biometrics principal components analysis security signature verification template protection.