540 507
Full Length Article
Fusion: Practice and Applications
Volume 10 , Issue 2, PP: 08-24 , 2023 | Cite this article as | XML | Html |PDF

Title

Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics

  Mulikat B. Akanbi 1 * ,   Rasheed G. Jimoh 2 ,   Agbotiname L. Imoize 3 ,   Joseph B. Awotunde 4 ,   Olatunji S. Isiaka 5 ,   Shade B. Abdulrahaman 6

1  Computer Science Department, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin, Nigeria
    (akanbiforu@gmail.com)

2  Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin 240003, Nigeria
    (jimoh_rasheed@unilorin.edu.ng)

3  Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria; Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, 44801 Bochum, Germany
    (aimoize@unilag.edu.ng)

4  Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin 240003, Nigeria
    (awotunde.jb@unilorin.edu.ng)

5   Computer Science Department, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin, Nigeria
    (isiakaosalman2@gmail.com)

6   Computer Science Department, Institute of Information and Communication Technology, Kwara State Polytechnic, Ilorin, Nigeria
    (billy4us@gmail.com)


Doi   :   https://doi.org/10.54216/FPA.100201

Received: January 10, 2023 Accepted: March 15, 2023

Abstract :

Biometrics provides better authentication. Unprotected biometrics is open to attacks from intruders as stolen biometrics may not be revocable. Although there are several points where attacks can be launched on biometric systems, template databases are said to be the most frequently attacked. When a template database is attacked, attackers can add fresh templates, modify the existing ones, copy or steal templates and later construct a spoof from it or replay it back into the biometric system to impersonate a genuine user. Several template security systems have been presented in the literature to secure biometric templates. Fuzzy vault, as proposed by many researchers is, to some extent, one of the best algorithms to achieve template protection as it has good security. Fuzzy vault, however, lacks irreversibility, revocability, and diversity. To address these disadvantages and strengthen fuzzy vault, this study combines a noninvertible feature transformation template protection algorithm known as cuckoo hashing that possesses irreversibility, revocability, and diversity properties with a fuzzy vault for privacy. The study used fingerprint biometrics as it is widely used. The proposed algorithm was implemented in the MATLAB 2016a environment using FVC 2004 DB1 fingerprint public database. The proposed algorithm recorded a FAR of 0.01% and an FRR value of 0.09% with an EER of 0.05%.

Keywords :

Fingerprint; Template protection; Biocryptosystems; Fuzzy vault; Feature Transformation; Biometric system; Authentication; Template protection Revocability.

References :

[1]  Ogundokun, R. O., Awotunde, J. B., Adeniyi, E. A., & Ayo, F. E. (2021). Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia tools and applications, 80(21), 31705-31727.

[2]  Abikoye, O. C., Ojo, U. A.,  Awotunde, J. B., & Ogundokun, R. O. (2020). A safe and secured iris template using steganography and cryptography. Multimedia Tools and Applications, 79(31), 23483-23506.

[3]  Kavya, R., & George, A. (2018). Survey on encryption approaches for secure face biometrics. In IOP Conference Series: Materials Science and Engineering , 396(1), p. 012-028 . IOP Publishing.

[4]  Iloanusi, O. N., & Osuagwu, C.C (2008). Biometric Recognition: Overview and Applications, Nigerian Journal of Technology, 27(2), 36-45. 

[5]  Boucetta,  A.,  &  Boussaad,  L.  (2022).  Biometric  authentication  using  finger -vein  patterns  with  deeplearning and discriminant correlation analysis. International Journal of Image and Graphics, 22(01), 2250013

[6]  Oo,  A.K  &  Aung,  Z.L  (2019).  A  Robust  Fingerprint  Recognition  Technique  Applying  Minutiae Extractors  and  Neural  Network,  International  Journal  of  Engineering  Research  and  Advanced  Technology (IJERAT), 5( 3), 78-87.

[7]  Gaddam, S. V., & Lal, M. (2011). Development of bio-crypto key from fingerprints using cancelable templates. International Journal on Computer Science and Engineering,  3(2), 775-783.

[8]  Adeniyi,  A.  E.,  Abiodun,  K.  M.,  Awotunde,  J.  B.,  Olagunju,  M.,  Ojo,  O.  S.,  &  Edet,  N.  P.  (2023). Implementation  of  a  block  cipher  algorithm  for  medical  information  security  o n  cloud  environment:  using modified advanced encryption standard approach. Multimedia Tools and Applications, 1-15.

[9]  Khodadoust, J., Medina-Pérez, M. A., Monroy, R., Khodadoust, A. M., & Mirkamali, S. S. (2021). A multibiometric system based on the  fusion of fingerprint, finger-vein, and finger-knuckle-print. Expert Systems with Applications, 176, 114687.

[10]  Nandakumar, K., &   Jain, A.K (2015). Biometric Template Protection: Bridging the performance Gap Between  Theory  and  Practice,  IEEE  Signal  Processing  Magazine.  88-100. https://doi.org/10.1109/MSP.2015.2427849.

[11]  Mwema, J., Kimwele, M., & Kimani, S. (2015). A Simple Review of Biometric Template Protection Schemes  Used  in  Preventing  Adversary  Attacks  on  Biometric  Fingerprint  Templates,  International  Journal  of Computer Trends and Technology (IJCTT), 20 (1) 12-18.

[12]  Nandakumar, K., Nagar A., & Jain A.K. (2007). Hardening Fingerprint Fuzzy Vault Using Password. In: Lee SW., Li S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_97.

[13]  Habibu,  T.,  &  Sam,  A.  E. (2018).  Assessment  of  vulnerabilities  of  the  biometric  template  protection mechanism. International Journal of Advanced Technology and Engineering Exploration, 5(45), 243-254.

[14]  Awotunde, J. B., Abiodun, K. M., Adeniyi, E. A., Folorunso, S. O., & Jimoh, R. G. (2021, November). A  Deep  Learning-Based  Intrusion  Detection  Technique  for  a  Secured  IoMT  System.  Communications  in Computer and Information Science, 2022, 1547 CCIS, pp. 50–62.

[15]  Awotunde, J. B., Chakraborty, C., & Adeniyi, A. E. (2021). Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wireless Communications and Mobile Computing, 2021, 2021, 7154587.

[16]  Gavrilova, M., Luchak, I., Sudhakar, T., & Tumpa, S. N. (2022). Artificial Intelligence in Biometrics: Uncovering Intricacies of Human Body and Mind. In Advances in Selected Artificial Intelligence Areas (pp. 123-169). Springer, Cham.

[17]  Dong, X., Jin, Z., Zhao, L., & Guo, Z. (2021, August). BioCanCrypto: An LDPC coded bio-cryptosystem on fingerprint cancellable template. In 2021 IEEE International Joint Conference on Biometrics (IJCB) (pp. 1-8). IEEE.

[18]  Awotunde, J. B., Jimoh, R. G., Folorunso, S. O., Adeniyi, E. A., Abiodun, K. M., & Banjo, O. O. (2021). Privacy and security concerns in IoT-based healthcare systems. Internet of Things, 2021, pp. 105–134.

[19]  Ashiba, H.I, & Abd El-Samie, F.E (2020). Implementation face based cancelable multi-biometric system, Multimedia Tools and Applications, 79, 30813–30838.

[20]  Panwar, A., Singla, P., & Kaur, M. (2018). Techniques for enhancing the security of fuzzy vault: a review Progress in Intelligent Computing Techniques: Theory, Practice, and Applications ( 205-213): Springer.

[21]  Awotunde, J. B., Fatai, O. W., Akanbi, M. B., Abdulkadir, S. I., & Idepefo, O. F. (2014). A Hybrid Fingerprint  Identification  System  for  Immigration  Control  Using  the  Minutiae  and  Correlation  Methods.  The Journal of Computer Science and its Applications, 21( 2), 97-108.

[22]  Bedari, A., Wang, S., & Yang, W. (2021). Design of cancelable MCC-based fingerprint templates using Dyno-key model. Pattern Recognition, 119, 108074.

[23]  Xi, K., Ahmad, T., Han, F., & Hu, J. (2011). A fingerprint based bio‐cryptographic security protocol designed  for  client/server  authentication  in  mobile  computing  environment. Security  and  communication networks, 4(5), 487-499.

[24]  Mahendran, R. K., & Velusamy, P. (2020). A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Computer Communications, 153, 545-552.

[25]  Ponce-Hernandez,  W.,  Blanco-Gonzalo,R.,  Liu-Jimenez,J.  &  Sanchez-Reillo,  R.  (2020).  Fuzzy  Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification, IEEE Access, 8, 11152 -11164.

[26]  Machado, S., D'silva, P., D'mello, S., Solaskar, S., & Chaudhari,  P. (2018). Securing ATM  Pins and Passwords  Using  Fingerprint  Based  Fuzzy  Vault  System.  Paper  presented  at  the  2018  Fourth  International Conference on Computing Communication Control and Automation (ICCUBEA).

[27]  Morampudi, M. K., Prasad, M. V., & Raju, U. S. N. (2020). Privacy-preserving iris authentication using fully homomorphic encryption. Multimedia Tools and Applications, 79(27), 19215-19237.

[28]  Loukhaoukha, K., Refaey, A., Zebbiche, K., & Shami, A. (2018). Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimedia Tools and Applications, 77(8), 9325 -9339.

[29]  Kaur,  M.,  &  Sofat,  S.  (2016).  Secure  fingerprint  fuzzy  vault  using  hadamard  transformation  to  defy correlation  attack.  In 2016  Sixth  International  Symposium  on  Embedded  Computing  and  System  Design (ISED) (pp. 122-126). IEEE.

[30]  Li, H., Qiu, J., & Teoh, A.B.J (2020) Palmprint template protection scheme based on randomized Cuckoo hashing and MinHash, Multimedia Tools and Applications,79(17-18) 11947-11971.

[31]  Ghammam, L., Barbier, M., & Rosenberger, C. (2018). Enhancing the security of transformation based biometric template protection schemes. In 2018  International Conference on Cyberworlds (CW) (pp. 316-323). IEEE.

[32]  Joshi, M., Mazumdar, B., & Dey, S. (2020). A Comprehensive Security Analysis of Match -in-Database Fingerprint Biometric System, Pattern Recognition Letters, 138,247-264.

[33]  Chitra, D., & Sujitha, V. (2018). Security analysis of prealigned fingerprint template using fuzzy vault scheme. Cluster Computing, 22(5), 12817-12825. 

[34]  Debnath, R., Nandi, S., & Majumder, S. (2021). Fingerprint Authentication System for BaaS Protocol. In Applications of Internet of Things (pp. 39-48). Springer, Singapore.

[35]  Saputra,  J.,  &  Sukarno,  P.  (2019).  Improving  The  Accuracy  of  Fuzzy  Vault  Scheme  in  Fingerprint Biometric. In 2019 7th International Conference on Information and Communication Technology (ICoICT)  (pp. 1-8). IEEE.

[36]  S.  A  &  AnilKumar,  K.S.  (2020)  Iris  Template  Protection  using  Double  Bloom  Filter  Based  Feature Transformation, Computers & Security 97, 1-15.

[37]  Prasad, M. V., Anugu, J. R., & Rao, C. (2016). Fingerprint template protection using multiple spiral curves. Paper presented at the Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics.

[38]  Kim, J., & Teoh, A. B. J. (2018). One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication. Paper presented at the 2018 24th International Conference on Pattern Recognition (ICPR).

[39]  Wang,  N.,  Li,  Q.,  Han,  Q.,  Abd  El-Latif,  A.  A.,  &  Niu,  X.  (2011,  October).  A  novel  multi-division template  protection  (mdtp)  scheme  for  iris  recognition  based  on  fuz zy  vault.  In 2011  Seventh  International Conference  on  Intelligent  Information  Hiding  and  Multimedia  Signal  Processing (pp.  101-104).  IEEE.   doi: 10.1109/IIHMSP.2011.66.

[40]  Sharma,  D.,  &  Selwal,  A.  (2020,  May).  A  Novel  Transformation  Based  Security  Scheme  for  Multiinstance  Fingerprint  Biometric  System.  In International  Conference  on  Information,  Communication  and Computing Technology (pp. 147-159). Springer, Singapore.

[41]  Dabbah, M. A., Dlay, S. S., & Woo, W. L. (2008, April). PCA authentication of facial biometric in the secure randomized mapping domain. In 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications (pp. 1-5). IEEE.


Cite this Article as :
Style #
MLA Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman. "Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics." Fusion: Practice and Applications, Vol. 10, No. 2, 2023 ,PP. 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)
APA Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman. (2023). Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics. Journal of Fusion: Practice and Applications, 10 ( 2 ), 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)
Chicago Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman. "Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics." Journal of Fusion: Practice and Applications, 10 no. 2 (2023): 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)
Harvard Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman. (2023). Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics. Journal of Fusion: Practice and Applications, 10 ( 2 ), 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)
Vancouver Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman. Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics. Journal of Fusion: Practice and Applications, (2023); 10 ( 2 ): 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)
IEEE Mulikat B. Akanbi, Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, Olatunji S. Isiaka, Shade B. Abdulrahaman, Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics, Journal of Fusion: Practice and Applications, Vol. 10 , No. 2 , (2023) : 08-24 (Doi   :  https://doi.org/10.54216/FPA.100201)