Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics

Wei-jing Wong , Mou-ling Dennis Wong , Yau-hee Kho

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (5) : 1292 -1297.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (5) : 1292 -1297. DOI: 10.1007/s11771-013-1614-8
Article

Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics

Author information +
History +
PDF

Abstract

A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication.

Keywords

cancelable fingerprint template / multi-line code / single-line code / stolen-key case

Cite this article

Download citation ▾
Wei-jing Wong, Mou-ling Dennis Wong, Yau-hee Kho. Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics. Journal of Central South University, 2013, 20(5): 1292-1297 DOI:10.1007/s11771-013-1614-8

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

MaltoniD, MaioD, JainA K, PrabhakarSHandbook of fingerprint recognition [M], 2009LondonSpringer-Verlag Berlin398-399

[2]

AngR, Safavi-nainiR, McavenL. Cancelable key-based fingerprint templates [C]. Proceedings of 10th Australasian Conference on Information Security and Privacy, 2005HeidelbergSpringer Berlin109-128

[3]

TulyakovS, FarooqF, GavindarajuV. Symmetric hash functions for fingerprint minutiae [C]. Proceedings of 3rd International Conference on Advances in Pattern Recognition, 2005HeidelbergSpringer Berlin30-38

[4]

TulyakovS, FarooqF, MansukhaniP, GavindarajuV. Symmetric hash functions for secure fingerprint biometric systems [J]. Pattern Recognition Letters, 2007, 28(16): 2427-2436

[5]

KumarG, TulyakovS, GavindarajuV. Combination of symmetric hash functions for secure fingerprint matching [C]. 20th International Conference on Pattern Recognition, 2010IstanbulIEEE890-893

[6]

LeeC, ChoiJ-Y, TohK-A, LeeS. Alignment-free cancelable fingerprint templates based on local minutiae information [J]. IEEE Transactions on Systems, Man and Cybernetics — Part B: Cybernetics, 2007, 37(4): 980-992

[7]

TicoM, KuosmanenP. Fingerprint matching using an orientation-based minutia descriptor [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(8): 1009-1014

[8]

FarooqF, BolleR M, JeaT Y, RathaN. Anonymous and revocable fingerprint recognition [C]. IEEE Conference on Computer Vision and Pattern Recognition, 2007MinneapolisIEEE1-7

[9]

LeeC, KimJ. Cancelable fingerprint templates using minutiae-based bit-strings [J]. Journal of Network and Computer Applications, 2010, 33(3): 236-246

[10]

JinZ, TeohA B J, OngT-S, TeeC. Generating revocable fingerprint template using minutiae pair representation [C]. 2nd International Conference on Education Technology and Computer, 2010ShanghaiIEEE251-255

[11]

JinZ, OngT-S, TeeC, TeohA B J. Generating revocable fingerprint template using polar grid based 3-tuple quantization technique [C]. IEEE 54th International Midwest Symposium on Circuits and Systems, 2011SeoulIEEE1-4

[12]

AhmadT, HuJ-k, WangSong. String-based cancelable fingerprint templates [C]. 6th IEEE Conference on Industrial Electronics and Applications, 2011BeijingIEEE1028-1033

[13]

CappelliR, FerraraM, MaltoniD. Minutia cylinder-code: A new representation and matching technique for fingerprint recognition [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010, 32(12): 2128-2141

[14]

TeohA B J, NgoD C L, GohA. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number [J]. Pattern Recognition, 2004, 37(11): 2245-2255

[15]

TeohA B J, YipW-K, LeeS. Cancellable biometrics and annotations on biohash [J]. Pattern Recognition, 2008, 41(6): 2034-2044

[16]

TeohA B J, YipW-k, TohK-ann. Cancellable biometrics and user-dependent multi-state discretization in biohash [J]. Pattern Analysis & Applications, 2010, 13(3): 301-307

[17]

WongW J, WongM L D, KhoY H. A low complexity multi-line code for cancelable fingerprint template [C]. 2nd International Conference on Convergence Technology, 2012QingdaoKorea Convergence Society61-65

[18]

CHIKKERUR S, WU C, GOVINDARAJU V. A systematic approach for feature extraction in fingerprint images [C]// International Conference on Bioinformatics and Its Applications. Florida, USA, 2004: 344–350.

[19]

GuoZ-c, HallR W. Parallel thinning with two-subiteration algorithms [J]. Communication of the ACM, 1989, 32(3): 359-373

[20]

RutovitzD. Pattern recognition [J]. Journal of Royal Statistical Society, 1966, 129: 504-530

[21]

DiceL R. Measures of the amount of ecologic association between species [J]. Ecology, 1945, 26(3): 297-302

AI Summary AI Mindmap
PDF

90

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/