Skip to main content

Reducing Vulnerability of a Fingerprint Authentication System

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

  • 1694 Accesses

Abstract

A fingerprint authentication system usually suffers from privacy problem. A third party intruder can steal the information stored in the database and try to recreate the original fingerprint. Here a system is proposed which prevents the possibility of generating fingerprints from the information in the database. Two different fingerprints are acquired from a person. Then the orientation of ridges is calculated from the first fingerprint and minutiae points are extracted from a reference area in second fingerprint. They are combined to form a mixed template which is encrypted using blowfish cipher. The encrypted template serves as a virtual biometric. This prevents the revealing of original fingerprints to third party intruders. Moreover the attacker may not be aware that it is a mixed template that is used rather than the original fingerprint.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, H.C., Gaensslen, R.E: Advances in Fingerprint Technology, 2nd edn., p. 426. CRC Press, New York (2001)

    Google Scholar 

  2. Nagar, B., Nandakumar, K., Jain, A.K: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors (2008)

    Google Scholar 

  3. Chen, H., Chen, H.: A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognit. 32(11), 305–309 (2011)

    Article  Google Scholar 

  4. Teoh, B.J.A., Ngo, C.L.D., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37, 2245–2255 (2004)

    Article  Google Scholar 

  5. Yanikoglu, B., Kholmatov, A.: Combining multiple biometrics to protect privacy. In: Proceedings ICPR- BCTP Workshop, Cambridge, U.K. (2004)

    Google Scholar 

  6. Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)

    Article  Google Scholar 

  7. Liu, L., Dai, T.: A reliable fingerprint orientation estimation algorithm. J. Inf. Sci. Eng. 27, 353–368 (2011)

    Google Scholar 

  8. Łukasz, W.: A minutiae based matching algorithm in fingerprint recognition systems. J. Med. Inf. Tech. 13, 1642–6037 (2009)

    Google Scholar 

  9. Li, S., Kot, A.C.: Attack using reconstructed fingerprint. In: Proceedings of the IEEE International Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to A. Athira Ram or T. S. Jyothis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Athira Ram, A., Jyothis, T.S. (2015). Reducing Vulnerability of a Fingerprint Authentication System. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics