Abstract
A fingerprint authentication system usually suffers from privacy problem. A third party intruder can steal the information stored in the database and try to recreate the original fingerprint. Here a system is proposed which prevents the possibility of generating fingerprints from the information in the database. Two different fingerprints are acquired from a person. Then the orientation of ridges is calculated from the first fingerprint and minutiae points are extracted from a reference area in second fingerprint. They are combined to form a mixed template which is encrypted using blowfish cipher. The encrypted template serves as a virtual biometric. This prevents the revealing of original fingerprints to third party intruders. Moreover the attacker may not be aware that it is a mixed template that is used rather than the original fingerprint.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee, H.C., Gaensslen, R.E: Advances in Fingerprint Technology, 2nd edn., p. 426. CRC Press, New York (2001)
Nagar, B., Nandakumar, K., Jain, A.K: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors (2008)
Chen, H., Chen, H.: A novel algorithm of fingerprint encryption using minutiae-based transformation. Pattern Recognit. 32(11), 305–309 (2011)
Teoh, B.J.A., Ngo, C.L.D., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37, 2245–2255 (2004)
Yanikoglu, B., Kholmatov, A.: Combining multiple biometrics to protect privacy. In: Proceedings ICPR- BCTP Workshop, Cambridge, U.K. (2004)
Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
Liu, L., Dai, T.: A reliable fingerprint orientation estimation algorithm. J. Inf. Sci. Eng. 27, 353–368 (2011)
Łukasz, W.: A minutiae based matching algorithm in fingerprint recognition systems. J. Med. Inf. Tech. 13, 1642–6037 (2009)
Li, S., Kot, A.C.: Attack using reconstructed fingerprint. In: Proceedings of the IEEE International Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil (2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Athira Ram, A., Jyothis, T.S. (2015). Reducing Vulnerability of a Fingerprint Authentication System. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)