Limits...
A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH

Related in: MedlinePlus

The comparison of four fingerprint templates in three different authentication experiments using different r. (a) Three transformed templates with the same fingerprint when r = 2. (b) Three transformed templates with the same fingerprint when r = 4. (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4385657&req=5

fig8: The comparison of four fingerprint templates in three different authentication experiments using different r. (a) Three transformed templates with the same fingerprint when r = 2. (b) Three transformed templates with the same fingerprint when r = 4. (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.

Mentions: The value of M is fatal to the local smoothness property. Let the maximum element of M be max⁡ (mij) = r. Figures 8(a) and 8(b) show the comparison among the four fingerprint templates from three different authentication experiments (there will be difference among the authentication processing) and the registered fingerprint template when their r have different values. Figures 8(b) and 8(d) show the distance between minutiae and the orientation difference from transformed and original templates. According to Figure 8, if r = 2, the three fingerprint templates transformed from the same fingerprint in three different experiments are almost coincident with each other. The distance between minutiae of these three templates and the registered template is less than 8 pixels, and the orientation difference is less than 5°. If r = 4, the distance between minutiae of these three templates and the registered template is less than 14 pixels, and the orientation difference is less than 9°. According to Table 5, with the increasing of r, the distance between minutiae and the orientation difference will be increased linearly. Let r ≤ 2; then, the average distance of minutiae between two templates is no more than 5.4 pixels, which is less than the box matcher threshold (8 pixels). This can ensure that the legal user can pass the authentication processing using the tolerance box matching algorithm.


A fingerprint encryption scheme based on irreversible function and secure authentication.

Yang Y, Yu J, Zhang P, Wang S - Comput Math Methods Med (2015)

The comparison of four fingerprint templates in three different authentication experiments using different r. (a) Three transformed templates with the same fingerprint when r = 2. (b) Three transformed templates with the same fingerprint when r = 4. (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4385657&req=5

fig8: The comparison of four fingerprint templates in three different authentication experiments using different r. (a) Three transformed templates with the same fingerprint when r = 2. (b) Three transformed templates with the same fingerprint when r = 4. (c) The distance between transformed and original templates. (d) The orientation difference between transformed and original templates.
Mentions: The value of M is fatal to the local smoothness property. Let the maximum element of M be max⁡ (mij) = r. Figures 8(a) and 8(b) show the comparison among the four fingerprint templates from three different authentication experiments (there will be difference among the authentication processing) and the registered fingerprint template when their r have different values. Figures 8(b) and 8(d) show the distance between minutiae and the orientation difference from transformed and original templates. According to Figure 8, if r = 2, the three fingerprint templates transformed from the same fingerprint in three different experiments are almost coincident with each other. The distance between minutiae of these three templates and the registered template is less than 8 pixels, and the orientation difference is less than 5°. If r = 4, the distance between minutiae of these three templates and the registered template is less than 14 pixels, and the orientation difference is less than 9°. According to Table 5, with the increasing of r, the distance between minutiae and the orientation difference will be increased linearly. Let r ≤ 2; then, the average distance of minutiae between two templates is no more than 5.4 pixels, which is less than the box matcher threshold (8 pixels). This can ensure that the legal user can pass the authentication processing using the tolerance box matching algorithm.

Bottom Line: A fingerprint encryption scheme based on irreversible function has been designed in this paper.Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features.The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

View Article: PubMed Central - PubMed

Affiliation: ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China.

ABSTRACT
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

Show MeSH
Related in: MedlinePlus