Integrated Biometric Template Security using Random Rectangular Hashing

1
Madhavi Gudavalli
Madhavi Gudavalli
2
Dr. D.Srinivasa Kumar
Dr. D.Srinivasa Kumar
3
Dr. S.Viswanadha Raju
Dr. S.Viswanadha Raju
1 JNTU KAKINADA

Send Message

To: Author

GJCST Volume 14 Issue E7

Article Fingerprint

ReserarchID

CSTNWS2406W

Integrated Biometric Template Security using Random Rectangular Hashing Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Large centralized biometric databases, accessible over networks in real time are especially used for identification purposes. Multimodal biometric systems which are more robust and accurate in human identification require multiple templates storage of the same user analogous to individual biometric sources. This may raises concern about their usage and security when these stored templates are compromised since each person is believed to have a unique biometric trait. Unlike passwords, the biometric templates cannot be revoked and switch to another set of uncompromised identifiers when compromised. Therefore, fool-proof techniques satisfying the requirements of diversity, revocability, security and performance are required to protect stored templates such that both the security of the application and the users’ privacy are not compromised by the impostor attacks. Thus, this paper proposes a template protection scheme coined as random rectangular hashing to strengthen the multimodal biometric system. The performance of the proposed template protection scheme is measured using the fingerprint FVC2004 and PolyU palmprint databases.

19 Cites in Articles

References

  1. K Anil,Patrick Jain,Arun Flynn,Ross (2007). Handbook of Biometrics.
  2. Dr Madhavi Gudavalli,Dr Viswanadha Raju,Dr Vinaya Babu,Srinivasa Kumar (2012). MultiModal Biometrics-Sources, Architecture & Fusion Techniques: An Overview.
  3. C Sanderson,K Paliwal (2003). Information Fusion and Person Verification Using Speech and Face Information.
  4. Karthik Nandakumar (2008). Multibiometric Systems: Fusion Strategies and Template Security.
  5. K Anil,Karthik Jain,Abhishek Nandakumar,Nagar (2008). Biometric Template Security.
  6. Madhavi Gudavalli,S Raju,K Kumar (2012). A template protection scheme for multimodal biometric system with fingerprint, palmprint, iris and retinal traits.
  7. U Uludag,S Pankanti,S Prabhakar,K Anil (2004). Biometric Cryptosystems: Issues and Challenges.
  8. C Roberge,A Stoianov,R Gilroy,B Kumar (1999). Biometric encryption.
  9. Nalini Ratha,Sharat Chikkerur,Jonathan Connell,Ruud Bolle (2007). Generating Cancelable Fingerprint Templates.
  10. A Teoh,D Ngo,A Goh (2004). BioHashing: Two factor authentication featuring fingerprint data and tokenised random number.
  11. Ileana Buhan,Jeroen Doumen,Pieter Hartel,Raymond Veldhuis (2007). Fuzzy extractors for continuous distributions.
  12. Arathi Arakala,Jason Jeffers,K Horadam (2007). Fuzzy Extractors for Minutiae-Based Fingerprint Authentication.
  13. Yevgeniy Dodis,Leonid Reyzin,Adam Smith (2006). Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
  14. Q Li,E Chang (2006). Robust, Short and Sensitive Authentication Tags Using Secure Sketch.
  15. Yagiz Sutcu,Qiming Li,Nasir Memon (2007). Protecting Biometric Templates With Sketch: Theory and Practice.
  16. Y Sutcu,Q Li,N Memon (2007). Secure Biometric Templates from Fingerprint-Face Features.
  17. N Ratha,S Chikkerur,J Connell,R Bolle (2007). Generating Cancelable Fingerprint Templates.
  18. Loris Nanni,Dario Maio (2006). Combination of different fingerprint systems: a case study FVC2004.
  19. PolyU Palmprint Database.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Madhavi Gudavalli. 2014. \u201cIntegrated Biometric Template Security using Random Rectangular Hashing\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E7): .

Download Citation

Issue Cover
GJCST Volume 14 Issue E7
Pg. 33- 37
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Classification
Not Found
Version of record

v1.2

Issue date

November 12, 2014

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8323
Total Downloads: 2214
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Large centralized biometric databases, accessible over networks in real time are especially used for identification purposes. Multimodal biometric systems which are more robust and accurate in human identification require multiple templates storage of the same user analogous to individual biometric sources. This may raises concern about their usage and security when these stored templates are compromised since each person is believed to have a unique biometric trait. Unlike passwords, the biometric templates cannot be revoked and switch to another set of uncompromised identifiers when compromised. Therefore, fool-proof techniques satisfying the requirements of diversity, revocability, security and performance are required to protect stored templates such that both the security of the application and the users’ privacy are not compromised by the impostor attacks. Thus, this paper proposes a template protection scheme coined as random rectangular hashing to strengthen the multimodal biometric system. The performance of the proposed template protection scheme is measured using the fingerprint FVC2004 and PolyU palmprint databases.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Integrated Biometric Template Security using Random Rectangular Hashing

Madhavi Gudavalli
Madhavi Gudavalli JNTU KAKINADA
Dr. D.Srinivasa Kumar
Dr. D.Srinivasa Kumar
Dr. S.Viswanadha Raju
Dr. S.Viswanadha Raju

Research Journals