Volume 10 , Issue 2 , PP: 08-24, 2023 | Cite this article as | XML | Html | PDF | Full Length Article
Mulikat B. Akanbi 1 * , Rasheed G. Jimoh 2 , Agbotiname L. Imoize 3 , Joseph B. Awotunde 4 , Olatunji S. Isiaka 5 , Shade B. Abdulrahaman 6
Doi: https://doi.org/10.54216/FPA.100201
Biometrics provides better authentication. Unprotected biometrics is open to attacks from intruders as stolen biometrics may not be revocable. Although there are several points where attacks can be launched on biometric systems, template databases are said to be the most frequently attacked. When a template database is attacked, attackers can add fresh templates, modify the existing ones, copy or steal templates and later construct a spoof from it or replay it back into the biometric system to impersonate a genuine user. Several template security systems have been presented in the literature to secure biometric templates. Fuzzy vault, as proposed by many researchers is, to some extent, one of the best algorithms to achieve template protection as it has good security. Fuzzy vault, however, lacks irreversibility, revocability, and diversity. To address these disadvantages and strengthen fuzzy vault, this study combines a noninvertible feature transformation template protection algorithm known as cuckoo hashing that possesses irreversibility, revocability, and diversity properties with a fuzzy vault for privacy. The study used fingerprint biometrics as it is widely used. The proposed algorithm was implemented in the MATLAB 2016a environment using FVC 2004 DB1 fingerprint public database. The proposed algorithm recorded a FAR of 0.01% and an FRR value of 0.09% with an EER of 0.05%.
Fingerprint , Template protection , Biocryptosystems , Fuzzy vault , Feature Transformation , Biometric system , Authentication , Template protection Revocability.
[1] Ogundokun, R. O., Awotunde, J. B., Adeniyi, E. A., & Ayo, F. E. (2021). Crypto-Stegno based model for securing medical information on IOMT platform. Multimedia tools and applications, 80(21), 31705-31727.
[2] Abikoye, O. C., Ojo, U. A., Awotunde, J. B., & Ogundokun, R. O. (2020). A safe and secured iris template using steganography and cryptography. Multimedia Tools and Applications, 79(31), 23483-23506.
[3] Kavya, R., & George, A. (2018). Survey on encryption approaches for secure face biometrics. In IOP Conference Series: Materials Science and Engineering , 396(1), p. 012-028 . IOP Publishing.
[4] Iloanusi, O. N., & Osuagwu, C.C (2008). Biometric Recognition: Overview and Applications, Nigerian Journal of Technology, 27(2), 36-45.
[5] Boucetta, A., & Boussaad, L. (2022). Biometric authentication using finger -vein patterns with deeplearning and discriminant correlation analysis. International Journal of Image and Graphics, 22(01), 2250013
[6] Oo, A.K & Aung, Z.L (2019). A Robust Fingerprint Recognition Technique Applying Minutiae Extractors and Neural Network, International Journal of Engineering Research and Advanced Technology (IJERAT), 5( 3), 78-87.
[7] Gaddam, S. V., & Lal, M. (2011). Development of bio-crypto key from fingerprints using cancelable templates. International Journal on Computer Science and Engineering, 3(2), 775-783.
[8] Adeniyi, A. E., Abiodun, K. M., Awotunde, J. B., Olagunju, M., Ojo, O. S., & Edet, N. P. (2023). Implementation of a block cipher algorithm for medical information security o n cloud environment: using modified advanced encryption standard approach. Multimedia Tools and Applications, 1-15.
[9] Khodadoust, J., Medina-Pérez, M. A., Monroy, R., Khodadoust, A. M., & Mirkamali, S. S. (2021). A multibiometric system based on the fusion of fingerprint, finger-vein, and finger-knuckle-print. Expert Systems with Applications, 176, 114687.
[10] Nandakumar, K., & Jain, A.K (2015). Biometric Template Protection: Bridging the performance Gap Between Theory and Practice, IEEE Signal Processing Magazine. 88-100. https://doi.org/10.1109/MSP.2015.2427849.
[11] Mwema, J., Kimwele, M., & Kimani, S. (2015). A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates, International Journal of Computer Trends and Technology (IJCTT), 20 (1) 12-18.
[12] Nandakumar, K., Nagar A., & Jain A.K. (2007). Hardening Fingerprint Fuzzy Vault Using Password. In: Lee SW., Li S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_97.
[13] Habibu, T., & Sam, A. E. (2018). Assessment of vulnerabilities of the biometric template protection mechanism. International Journal of Advanced Technology and Engineering Exploration, 5(45), 243-254.
[14] Awotunde, J. B., Abiodun, K. M., Adeniyi, E. A., Folorunso, S. O., & Jimoh, R. G. (2021, November). A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System. Communications in Computer and Information Science, 2022, 1547 CCIS, pp. 50–62.
[15] Awotunde, J. B., Chakraborty, C., & Adeniyi, A. E. (2021). Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wireless Communications and Mobile Computing, 2021, 2021, 7154587.
[16] Gavrilova, M., Luchak, I., Sudhakar, T., & Tumpa, S. N. (2022). Artificial Intelligence in Biometrics: Uncovering Intricacies of Human Body and Mind. In Advances in Selected Artificial Intelligence Areas (pp. 123-169). Springer, Cham.
[17] Dong, X., Jin, Z., Zhao, L., & Guo, Z. (2021, August). BioCanCrypto: An LDPC coded bio-cryptosystem on fingerprint cancellable template. In 2021 IEEE International Joint Conference on Biometrics (IJCB) (pp. 1-8). IEEE.
[18] Awotunde, J. B., Jimoh, R. G., Folorunso, S. O., Adeniyi, E. A., Abiodun, K. M., & Banjo, O. O. (2021). Privacy and security concerns in IoT-based healthcare systems. Internet of Things, 2021, pp. 105–134.
[19] Ashiba, H.I, & Abd El-Samie, F.E (2020). Implementation face based cancelable multi-biometric system, Multimedia Tools and Applications, 79, 30813–30838.
[20] Panwar, A., Singla, P., & Kaur, M. (2018). Techniques for enhancing the security of fuzzy vault: a review Progress in Intelligent Computing Techniques: Theory, Practice, and Applications ( 205-213): Springer.
[21] Awotunde, J. B., Fatai, O. W., Akanbi, M. B., Abdulkadir, S. I., & Idepefo, O. F. (2014). A Hybrid Fingerprint Identification System for Immigration Control Using the Minutiae and Correlation Methods. The Journal of Computer Science and its Applications, 21( 2), 97-108.
[22] Bedari, A., Wang, S., & Yang, W. (2021). Design of cancelable MCC-based fingerprint templates using Dyno-key model. Pattern Recognition, 119, 108074.
[23] Xi, K., Ahmad, T., Han, F., & Hu, J. (2011). A fingerprint based bio‐cryptographic security protocol designed for client/server authentication in mobile computing environment. Security and communication networks, 4(5), 487-499.
[24] Mahendran, R. K., & Velusamy, P. (2020). A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Computer Communications, 153, 545-552.
[25] Ponce-Hernandez, W., Blanco-Gonzalo,R., Liu-Jimenez,J. & Sanchez-Reillo, R. (2020). Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification, IEEE Access, 8, 11152 -11164.
[26] Machado, S., D'silva, P., D'mello, S., Solaskar, S., & Chaudhari, P. (2018). Securing ATM Pins and Passwords Using Fingerprint Based Fuzzy Vault System. Paper presented at the 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA).
[27] Morampudi, M. K., Prasad, M. V., & Raju, U. S. N. (2020). Privacy-preserving iris authentication using fully homomorphic encryption. Multimedia Tools and Applications, 79(27), 19215-19237.
[28] Loukhaoukha, K., Refaey, A., Zebbiche, K., & Shami, A. (2018). Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimedia Tools and Applications, 77(8), 9325 -9339.
[29] Kaur, M., & Sofat, S. (2016). Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack. In 2016 Sixth International Symposium on Embedded Computing and System Design (ISED) (pp. 122-126). IEEE.
[30] Li, H., Qiu, J., & Teoh, A.B.J (2020) Palmprint template protection scheme based on randomized Cuckoo hashing and MinHash, Multimedia Tools and Applications,79(17-18) 11947-11971.
[31] Ghammam, L., Barbier, M., & Rosenberger, C. (2018). Enhancing the security of transformation based biometric template protection schemes. In 2018 International Conference on Cyberworlds (CW) (pp. 316-323). IEEE.
[32] Joshi, M., Mazumdar, B., & Dey, S. (2020). A Comprehensive Security Analysis of Match -in-Database Fingerprint Biometric System, Pattern Recognition Letters, 138,247-264.
[33] Chitra, D., & Sujitha, V. (2018). Security analysis of prealigned fingerprint template using fuzzy vault scheme. Cluster Computing, 22(5), 12817-12825.
[34] Debnath, R., Nandi, S., & Majumder, S. (2021). Fingerprint Authentication System for BaaS Protocol. In Applications of Internet of Things (pp. 39-48). Springer, Singapore.
[35] Saputra, J., & Sukarno, P. (2019). Improving The Accuracy of Fuzzy Vault Scheme in Fingerprint Biometric. In 2019 7th International Conference on Information and Communication Technology (ICoICT) (pp. 1-8). IEEE.
[36] S. A & AnilKumar, K.S. (2020) Iris Template Protection using Double Bloom Filter Based Feature Transformation, Computers & Security 97, 1-15.
[37] Prasad, M. V., Anugu, J. R., & Rao, C. (2016). Fingerprint template protection using multiple spiral curves. Paper presented at the Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics.
[38] Kim, J., & Teoh, A. B. J. (2018). One-factor cancellable biometrics based on indexing-first-order hashing for fingerprint authentication. Paper presented at the 2018 24th International Conference on Pattern Recognition (ICPR).
[39] Wang, N., Li, Q., Han, Q., Abd El-Latif, A. A., & Niu, X. (2011, October). A novel multi-division template protection (mdtp) scheme for iris recognition based on fuz zy vault. In 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 101-104). IEEE. doi: 10.1109/IIHMSP.2011.66.
[40] Sharma, D., & Selwal, A. (2020, May). A Novel Transformation Based Security Scheme for Multiinstance Fingerprint Biometric System. In International Conference on Information, Communication and Computing Technology (pp. 147-159). Springer, Singapore.
[41] Dabbah, M. A., Dlay, S. S., & Woo, W. L. (2008, April). PCA authentication of facial biometric in the secure randomized mapping domain. In 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications (pp. 1-5). IEEE.