CFP last date
22 July 2024
Reseach Article

Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints

by K. Kanagalakshmi, E. Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 20
Year of Publication: 2014
Authors: K. Kanagalakshmi, E. Chandra

K. Kanagalakshmi, E. Chandra . Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints. International Journal of Computer Applications. 89, 20 ( March 2014), 41-53. DOI=10.5120/15751-4708

@article{ 10.5120/15751-4708,
author = { K. Kanagalakshmi, E. Chandra },
title = { Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 20 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 41-53 },
numpages = {9},
url = { },
doi = { 10.5120/15751-4708 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:09:48.066436+05:30
%A K. Kanagalakshmi
%A E. Chandra
%T Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 20
%P 41-53
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Cancelable biometrics expresses multiplicity. Now-a-days conventional authentications and identifications are advanced with biometrics. Since biometrics is unique in nature of a person, he/she must be aware on tracking the original features and also the cross matching of the same when his/her biometrics is used in different applications; and once the biometrics is compromised, those cannot be reset again. These problems are addressed by our proposed novel approach called "Shift-Phase Transformation". It is designed for irrevocable and cancellable biometric template generation. In this paper, the proposed method is used to generate a cancelable and irrevocable biometric template for fingerprint. Series of experiments are followed to test the performance of the proposed method. The factors considered for performance evaluation are the cross matching rate through ROC (using GAR and FAR), Cancelability, Irrevocability, Security, Average time of template generation and matching and also space complexity. The experimental results show the efficiency of proposed method and also show that it is a best method.

  1. Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions and Pattern Analysis and Machine Intelligence, Vol. 29, No. 4, April 2007.
  2. T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, Impact of Artificial Gummy Fingers on Fingerprint Systems, Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, Vol. 4677, pp. 275-289, 2002.
  3. Younhee Gil, Dosung ahn, Sungbum Pan, and Yongwha Chung, Access Control System with High Level Security using fingerprints, Proc. Of the 32nd Applied Imagery Pattern Recognition Workshop (AIPR'03), 2003, IEEE.
  4. Ruud M. Bolle, Jonathan H. Connell, Nalini K. Ratha, Pattern Recognition, Vol. 35, 2727-2738, 2002, Elsevier.
  5. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, pp. 301-307, Springer.
  6. Sharath Pankanti, Salil Prbhakar, and Anil K. Jain, On the Individuality of Fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, N0. 8, 2002.
  7. E. Chandra and K. Kanagalakshmi, Cancelable Biometric Template Generation of Protection Schemes: a Review, Proceedings of ICECT -2011, Third International Conference on Electronics Computer Technology, Vol. 5, pp. 15-20, E-ISBN: 978-1-4244-8679-3, Published by IEEE
  8. C. Soutar, D. Roberge,Astoinav,A. Gilroy, and B. V. K. Kumar, Biometric Encryption using image processing, Proc. SPIE, vol. 3314, pp174-188, 1998.
  9. A. Juels and M. Wattenberg, " A fuzzy commitment schemes", Proceedings of 6th ACM Conference on Computer and Communication Security, pp. 28-36, Singapore, November 1999.
  10. F. Monrose, M. K. Reiter, and S. Wetzel, " Password hardening based on keystroke dynamics", proceedings of the 6th ACM Conference on Computer and Communication security, pp. 73-82, Singapore, November 1999.
  11. F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key-generation from voice", Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, pp. 202-123, USA, May 2001.
  12. C. Viellhauer, R. Steinmetz, and A. Mayyerhofer, " Biometric hash based on statistical features of online signatures", Proceedings of the International conference on Pattern Recognition, Vol. 1, pp. 10123-10126, Canada, August 2002.
  13. A. Goh and D. L. Ngo, Computation of Cryptographic Keys from Face Biometrics, Proc. IFIP: Int'l Federation for information processing, pp. 1-13, 2003.
  14. J. P. Linnartz and P. Tuyls, NewSheilding Functions to enhance privacy and prevent misuse of biometric templates, Proc. Fourth Int'l cong. Audio and Video-based biometric person authentication, pp. 393-402, 2003.
  15. M. Savvides,B. V. K. Vijayakumar, and P. K. Khosla, Cancelable biometric filters for face recognition, Proc. Int'l Conf. Pattern Recognition, pp. 922-925,2004.
  16. A. B. J Teoh, D. C. L. Ngo, and A. Goh, Biohashing: Two factor authentication featuring fingerprint data an tokenized random number, Pattern Recognition, Vol. 37, No,11, pp. 2245-2255, 2004
  17. U. Uludag, S. Pankati, S. Prabhakar and A. K. Jain, "Biometric Crypto systems: issues and challenges", Proceedings of the IEEE, Vol. 92, no. 6, pp. 984-960
  18. Y. Dodis, L. Reuzin, and A. Smith, " Fuzzy extractor: how to generate strong keys from biometrics and other noisy data", Proceedings of International Conference of the Theory and Applications of cryptographic Techniques: Advances in Cryptology, vol. 3027 of Lecture Notes in Computer Science, pp. 523-540, Switzerland, May 2004.
  19. T. Connie,A. B. J. Teoh, M. K. O. Goh, and DC. L. Ngo, Palm Hashing: A Novel approach for cancelable biometrics, Information Processing Letters, Vol. 93, no. 1, pp. 1-5, 2005.
  20. R. Ang, R. Safav-Naini, and L. McAven, Cancelable Key-based Fingerprint Templates, Proc. 10th Australian Conf, Information Security and Privacy, pp. 242-252, 2005.
  21. Y. Sutcu, H. T. Sencar, and N. Memon, "A secure biometric authentication scheme based on robust hashing," in Proc. 7th Workshop Multimedia and Security, New York, 2005, pp. 111– 116.
  22. P. Tuyls,A. H. Makkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, " Practical biometric authentication with template protection", ", Proceedings of the 5th International Conference on Audio and Video based biometric person authentication, Vol. 3546 of Lecture Notes in Computer Science, pp. 436-446,USA,July 2005.
  23. F. Hao,R. Anderson, and J. Daugman, " Combining crypto with biometrics effectively", IEEE Transactions on Computers, Vol. 55, no. 99, pp. 1081-1088, 2006.
  24. Chun-I Fan ane Yi-Hui Lin, "Provably secure remote truly three-factor authentication scheme with privacy Protection on biometrics", IEEE Transactions on Information Forensics and Security Vol. 4, Issue 4, Pages: 933-945, December 2009.
  25. Bian Yang and Christoph Busch, "Parameterized geometric alignment for minutiae-based fingerprint template protection", Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems,Washington, DC, USA, pp. 340-345 , 2009.
  26. Abhishek Nagar, Karthik Nandakumar, and Anil K. Jain, "A hybrid biometric cryptosystem for securing fingerprint minutiae templates", Pattern Recognition Letters, Elsevier Science ,Vol. 31 , Issue 8 , pages 733-741, June 2010.
  27. Feng Hao, Ross Anderson and John Daugman, Combinig Crypto with Biometrics effectively, IEEE Transactions on Computers, Vol. 55, No. 9, 2006.
  28. K. Kanagalakshmi and E. Chandra, 2011. Performance Evaluation of Filters in Noise Removal of Fingerprint Image, Proceedings of ICECT-2011, 3rd International Conference on Electronics and Computer Technology, pp vol. 1: 117-123, ISBN: 978-1-4244-8677-9, Published by IEEE,
  29. E. Chandra and K. Kanagalakshmi, Noise Elimination in Fingerprint Images using Median Filter, Int. Journal of Advanced Networking and Applications, Vol. 02, Issue:06, pp:950-955, 2011.
  30. E. Chandra and K. Kanagalakshmi, Noise Suppression Scheme using Median Filer in Gray and Binary Images, International Journal of Computer Applications, Volume 26– No. 1, pp. 49-57, 2011.
  31. E. Chandra and K. Kanagalakshmi, Frequency Domain Enhancement Filters for Fingerprint Images: A Performance Evaluation", CIIT International Journal of Digital Image Processing, Vol. 3, No. 16, 2011.
  32. K. Kanagalakshmi, and E. Chandra, Frequency Domain Enhancement algorithm based on Log-Gabor Filter in FFT Domain, European Journal of Scientific Research, Vol. 74, No. 4, pp. 563-573, 2012.
  33. JianJiang Feng, Combining minutiae descriptors for fingerprint matching, Pattern Recognition, Vol. vol. 41: 342-352, 2008, Elsevier.
  34. Sardt C. Dass, Yongfang zhu, Anil K. Jain, Validating a biometric authentication systems sample size requirements, IEEE Transactions on pattern analysis and machine intelligence, Vol. 28, No. 12, 2006
  35. Tanya Ignatenko, and Frans M. J. Willems, Biometric Systems: Privacy and Secrecy Aspects, IEEE Transactions on Information Forensics and security, Vol. 4, No. 4, 2009.
  36. Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, Biometric Template Security, EURASIP Journal on Advances in Signal Processing, Special issue on Biometrics, Jan. 2008.
  37. Salil Prbhakar, Sharath Pankanti, and Anil K. Jain, Biometric Recognition: Security and Privacy concerns, IEEE Security and Privacy, Vol. 1 no. 2, pp. 33-42, 2003.
Index Terms

Computer Science
Information Sciences


Bit-shifting Cancellable template Chaff Points Irrevocability Phase