Skip to main content

Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures

  • Conference paper
Cyberspace Safety and Security (CSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8300))

Included in the following conference series:

Abstract

Security of biometric templates in a fingerprint authentication system is highly critical because the number of fingers of a person is limited and the raw fingerprints cannot be reset or replaced. A cancelable template is an efficient and powerful means to provide template protection. However, in most cancelable fingerprint templates, the many-to-one based non-invertible transformation acts on each single minutia, which may greatly decrease the discriminative capability of its feature representation, and more importantly, single minutia is more sensitive than a local structure to the non-linear distortion present in a fingerprint image. In this paper, we propose a cancelable template by utilizing some nice properties of Delaunay triangle-based local structures, e.g., excellent local structural stability, to achieve satisfactory performance. The non-invertible transformation is applied to each Delaunay triangle-based local structure rather than to each individual minutia so as to mitigate the influence of non-linear distortion and retain the discriminative power of the feature data after the many-to-one mapping. Experimental results on the publicly available databases demonstrate the validity of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xi, K., Ahmad, T., Han, F., Hu, J.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security and Communication Networks 4, 487–499 (2011)

    Article  Google Scholar 

  2. Yang, W., Hu, J., Wang, S.: A Finger-Vein Based Cancellable Bio-cryptosystem. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 784–790. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. Yang, W., Hu, J., Wang, S.: A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 66–70. IEEE (2012)

    Google Scholar 

  4. Li, P., Yang, X., Qiao, H., Cao, K., Liu, E., Tian, J.: An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, 6562–6574 (2011)

    Article  Google Scholar 

  5. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 561–572 (2007)

    Article  Google Scholar 

  6. Ahn, D., Kong, S.G., Chung, Y.-S., Moon, K.Y.: Matching with Secure Fingerprint Templates Using Non-invertible Transform. In: Congress on Image and Signal Processing, CISP 2008, pp. 29–33. IEEE (2008)

    Google Scholar 

  7. Teoh, A.B.J., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on BioHash. Pattern Recognition 41, 2034–2044 (2008)

    Article  Google Scholar 

  8. Jin, Z., Teoh, A., Ong, T., Tee, C.: A revocable fingerprint template for security and privacy preserving. KSII Transaction on Internet and Information System 4, 1327-1342 (2010)

    Google Scholar 

  9. Lee, C., Kim, J.: Cancelable fingerprint templates using minutiae-based bit-strings. Journal of Network and Computer Applications 33, 236–246 (2010)

    Article  Google Scholar 

  10. Chen, H.: A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognition Letters 32, 305–309 (2011)

    Article  Google Scholar 

  11. Jin, Z., Jin Teoh, A.B., Ong, T.S., Tee, C.: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. Expert Systems with Applications (2011)

    Google Scholar 

  12. Ahmad, T., Hu, J., Wang, S.: Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44, 2555–2564 (2011)

    Article  Google Scholar 

  13. Wang, S., Hu, J.: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recognition 45, 4129–4137 (2012)

    Article  MathSciNet  Google Scholar 

  14. Wang, Y., Hu, J., Phillips, D.: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 573–585 (2007)

    Article  Google Scholar 

  15. Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 72–87 (2011)

    Article  Google Scholar 

  16. Zhang, P., Hu, J., Li, C., Bennamoun, M., Bhagavatula, V.: A pitfall in fingerprint bio-cryptographic key generation. Computers & Security 30, 311–319 (2011)

    Article  Google Scholar 

  17. Abellanas, M., Hurtado, F., Ramos, P.A.: Structural tolerance and Delaunay triangulation. Information Processing Letters 71, 221–227 (1999)

    Article  MathSciNet  Google Scholar 

  18. Khanban, A.A., Edalat, A.: Computing Delaunay triangulation with imprecise input data. In: 15th Canadian Conference on Computational Geometry, pp. 94–97. Citeseer (2003)

    Google Scholar 

  19. Farooq, F., Bolle, R.M., Jea, T.Y., Ratha, N.: Anonymous and revocable fingerprint recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–7. IEEE (2007)

    Google Scholar 

  20. VeriFinger, S.D.K.: Neuro Technology (2010)

    Google Scholar 

  21. Sufi, F., Han, F., Khalil, I., Hu, J.: A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Security and Communication Networks 4, 515–524 (2011)

    Article  Google Scholar 

  22. Xi, K., Tang, Y., Hu, J.: Correlation keystroke verification scheme for user access control in cloud computing environment. The Computer Journal 54, 1632–1644 (2011)

    Article  Google Scholar 

  23. Li, C., Hu, J.: Attacks via record multiplicity on cancelable biometrics templates. Concurrency and Computation: Practice and Experience (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Yang, W., Hu, J., Wang, S., Yang, J. (2013). Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03584-0_7

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03583-3

  • Online ISBN: 978-3-319-03584-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics