Skip to main content

Multi-fingerprint Unimodel-based Biometric Authentication Supporting Cloud Computing

  • Chapter
  • First Online:

Part of the book series: Studies in Computational Intelligence ((SCI,volume 660))

Abstract

Cloud computing is one of the emerging technologies that transfers network users to the next level. Security is one of the critical challenges faced by cloud computing. Biometrics proves its efficiency to achieve secured authentication. A new attribute should be created to handle authentication information in the infrastructure. The proposed system model presented a new idea for biometric security system based on fingerprint recognition. It automated the verification method to match between two human fingerprints, where fingerprints are considered a commonly used biometrics to identify an individual and to verify their identity. The proposed system presented a new model of a security system, where the users were asked to provide multiple [two] biometric fingerprints during the registration for a service. These templates are stored at the cloud providers’ end. The users are authenticated based on these fingerprint templates which have to be provided in the order of random numbers that are generated every time. Both fingerprint templates and images were provided whenever encrypted for enhanced security. The proposed multi-fingerprint system achieved superior accuracy of 98 % compared to the single-fingerprint and manual-based attendance management systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kuo AM-H (2011) Opportunities and challenges of cloud computing to improve health care services. J Med Internet Res

    Google Scholar 

  2. Peelukhana R, Bala PS, Aghila G (2011) Securing virtual images using blind authentication protocol. Int J Eng Sci Technol (IJEST)

    Google Scholar 

  3. Nandi S, Roy S, Dansana J, Karaa WBA, Ray R, Chowdhury SR, Chakraborty S, Dey N (2014). Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system. Int J Comput Netw Inf Secur 6(11)

    Google Scholar 

  4. Biswas S, Roy AB, Ghosh K, Dey N (2012) A Biometric authentication based secured atm banking system. Int J Adv Res Comput Sci Softw Eng

    Google Scholar 

  5. Dey M, Dey N, Mahata SK, Chakraborty S, Acharjee S, Das A (2014) Electrocardiogram feature based inter-human biometric authentication system. In: 2014 International conference on electronic systems, signal processing and computing technologies (ICESC), pp 300–304

    Google Scholar 

  6. Dey N, Nandi B, Das P, Das A, Chaudhuri SS (2013) Retention of electrocardiogram features insignificantly devalorized as an effect of watermarking for a multi-modal biometric authentication system, published by Advances in Biometrics for Secure Human Authentication and Recognition, CRC Press, ISBN-9781466582422, pp. 450

    Google Scholar 

  7. Bose S, Chowdhury SR, Sen C, Chakraborty S, Redha T, Dey N (2014) Multi-thread video watermarking: a biomedical application. In: International conference on circuits, communication, control and computing (I4C), pp 242–246

    Google Scholar 

  8. Dey N, Pal M, Das A (2012) A session based watermarking technique within the NROI of retinal fundus images for authencation using DWT, spread spectrum and Harris corner detection. Int J Mod Eng Res 2:749–757

    Google Scholar 

  9. Field W, Hellman ME (1976) New directions in cryptography by MEMBER. IEEE Trans Inf Theory 22:6

    Google Scholar 

  10. Davide M, Dario M, Jain AK, Salil P (2005) Handbook of fingerprint recognition, 2nd edn. Springer, New York

    MATH  Google Scholar 

  11. Sasirekha K, Mary CI (2012) Biometric based network video security system with RSA implementation. Int J Biom Bioinform

    Google Scholar 

  12. Tiwari P, Saklani A (2013) Role of biometric cryptogra phy in cloud computing. Int J Comput Appl 70–79

    Google Scholar 

  13. Sabri HM, Ghany KKA, Hefny HA, Elkhameesy N (2014) Biometrics template security on cloud computing. In: 2014 International conference on advances in computing, communications and informatics (ICACCI), pp 672–676

    Google Scholar 

  14. Liang B, Wu Z, You L (2014) A novel fingerprint- based biometric encryption. In: 2014 ninth international conference on P2P, Parallel, Grid, Cloud and internet computing (3PGCIC), pp 146–150

    Google Scholar 

  15. Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in Cloud computing. In: 2014 International symposium on biometrics and security technologies (ISBAST), pp 45–50

    Google Scholar 

  16. Masala GL, Ruiu P, Brunetti A, Terzo O, Grosso E (2015) Biometric authentication and data security in cloud computing. In: Proceedings of the international conference on security and management (SAM) (p 9). The steering committee of the world congress in computer science, computer engineering and applied computing (WorldComp)

    Google Scholar 

  17. Khan MK, Zhang J (2008) Multimodal face and finger print biometrics authentication on space-limited tokens. Neuro Comput 71(13):3026–3031

    Google Scholar 

  18. Emersic Z, Bule J, Zganec-Gros J, Struc V, Peer P (2014) A case study on multi-modal biometrics in the cloud/Multi-modal. ElektrotehniskiVestnik 81(3):74

    Google Scholar 

  19. Goh TA, Ngo D (2006) Random multispace quantization as an analytic mechanism for bio hashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 1892–1901

    Google Scholar 

  20. Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 03–117

    Google Scholar 

  21. Kanade S, Petrovska-Delacretaz D, Zi BD (2009) Cancelable iris biometrics and using error correcting. IEEE Conference computer vision and pattern recognition. CVPR 2009, Miami, pp 120–127

    Google Scholar 

  22. Gudavalli M, Raju VS, Adari R (2012) A novel approach for multi biometric template protection. IEEE international conference on computing and security (ICCS’12), Ulaanbaatar, Mongolia

    Google Scholar 

  23. Singh K, Verma R, Chehal R (2012) Modified prime number factorization algorithm (MPFA) for RSA public key encryption. Int J Soft Comput and Eng (IJSCE) 4(2):204–206

    Google Scholar 

  24. Miller VS (1986) Use of elliptic curves in cryptography. Adv Cryptol CRYPTO 85:417–426

    MathSciNet  Google Scholar 

  25. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 203–209

    Google Scholar 

  26. IEEE-P1363–2000 (2000) IEEE standard specifications for public-key cryptography. IEEE Computer Society Press, Silver Spring, MD, USA

    Google Scholar 

  27. ISO/IEC15946 (2002) Information technology -security techniques: cryptographic techniques based on elliptic curves. International Organization for Standardization, Switzer land

    Google Scholar 

  28. NSIX9.62 (1999) Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA). American National Standards Institute, New York, USA

    Google Scholar 

  29. NIST. FIPS 186–2 (2000) Digital signature standard (DSS). National Institute for Standards and Technology, Gaithersburg

    Google Scholar 

  30. Bos JW, Halderman JA, Heninger N, Moore J, Naehrig M, Wustrow E (2014) Elliptic curve cryptography in practice. In: Financial cryptography and data security. Springer, Berlin, pp 157–175

    Google Scholar 

  31. Lenstra AK, Verheul ER (2001) Selecting cryptographic key sizes. J Cryptol 14(4):1–255

    Article  MathSciNet  MATH  Google Scholar 

  32. Michaelis K, Meyer C, Schwenk J (2013) Randomly failed The state of randomness in current Java implementations. In Dawson E (ed) CT-RSA, 7779:129–144 of LNCS, Springer

    Google Scholar 

  33. Miers I, Garman C, Green M, Zerocoin RAD (2013) Anonymous distributed E-Cash from Bitcoin. In: IEEE symposium on security and privacy, pp 397–411

    Google Scholar 

  34. Miller VS (1986) Use of elliptic curves in cryptography. In: Williams HC (ed) CRYPTO, volume 218 of LNCS, Springer, pp 417–426

    Google Scholar 

  35. Juels A, Weis SA (2005) Authenticating pervasive devices with human protocols. In: Advances in cryptology–CRYPTO 2005. Springer, Heidelberg, pp 293–308

    Google Scholar 

  36. Singh K, Verma R, Chehal R (2012) Modified prime number factorization algorithm (MPFA) for RSA public key encryption. Int J Soft Comput Eng(IJSCE) 2:204–206

    Google Scholar 

  37. Sharma S, Yadav JS, Sharma P (2012) Modified RSA public key cryptosystem using short range natural number algorithm. Int J Adv Res Comput Sci Softw Eng 2:134–138

    Google Scholar 

  38. Wiener M (1990) Cryptanalysis of short RSA secret expo Nents. IEEE Trans Inf Theory 36:553–558

    Article  MathSciNet  MATH  Google Scholar 

  39. Latha U, Rameshkumar K (2013) A study on attacks and security against fingerprint template database 2(5)

    Google Scholar 

  40. Jain AK, Uludag U (2004) Attacks on biometric systems: a case study in fingerprints. In: Proceedings of SPIE-EI 2004, security, seganography and watermarking of multimedia contents VI, San Jose, CA, pp 622–633

    Google Scholar 

  41. Jain AK, Ross A, Uludag U (2005) Biometric template security: challenges and solutions. In: Proceedings of the European signal processing conference (EUSIPCO ‘05), Antalya, Turkey

    Google Scholar 

  42. Moore A, Ellison RJ, Linger R, (2001) Attack modeling for information security and survivability, technical report, Carnegie Mellon University

    Google Scholar 

  43. Abdullayeva F, Imamverdiyev Y, Musayev V, Man WJ (2008) Analysis of security vulnerabilities in biometric systems. In: The second international conference: problems of cybernetics and informatics

    Google Scholar 

  44. Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilanjan Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rajeswari, P., Viswanadha Raju, S., Ashour, A.S., Dey, N. (2017). Multi-fingerprint Unimodel-based Biometric Authentication Supporting Cloud Computing. In: Dey, N., Santhi, V. (eds) Intelligent Techniques in Signal Processing for Multimedia Security. Studies in Computational Intelligence, vol 660. Springer, Cham. https://doi.org/10.1007/978-3-319-44790-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44790-2_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44789-6

  • Online ISBN: 978-3-319-44790-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics