A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution
Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, i...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2021-03, Vol.80 (7), p.10255-10284 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10284 |
---|---|
container_issue | 7 |
container_start_page | 10255 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Muhammed, Ajnas Mhala, Nikhil C. Pais, Alwyn R. |
description | Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into
n
shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication. |
doi_str_mv | 10.1007/s11042-020-10095-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2505257953</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2505257953</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-637b1938fd35672bb2e812f01571ad361ff613d7dd3bfba44d7f480c1525a433</originalsourceid><addsrcrecordid>eNp9kM1KxDAUhYsoOI6-gKuA62hu0jTtchj8gwE3sw9pe-N06LQ1SQfc-OymU0HcuMpN7jknnC9JboHdA2PqwQOwlFPGGY33QlI4SxYglaBKcTiPs8gZVZLBZXLl_Z4xyCRPF8nXinT9EVtim-4d3eCaLpCAh6E1Acng-oBVaPqOmK7-ozFj2GEXmsqc1r7a4QHJ6KOEHBs_mpZ4rBwG4nfGTa9Tgh8HdNSh79tx8l0nF9a0Hm9-zmWyfXrcrl_o5u35db3a0EpAEWgmVAmFyG0tZKZ4WXLMgVsWG4KpRQbWZiBqVdeitKVJ01rZNGcVSC5NKsQyuZtjY6GPEX3Q-350XfxRc8miSBVyUvFZVbnee4dWx6oH4z41MD1h1jNmHTHrE2YN0SRmk5-4RDy_0f-4vgEG7YLt</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2505257953</pqid></control><display><type>article</type><title>A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution</title><source>SpringerNature Journals</source><creator>Muhammed, Ajnas ; Mhala, Nikhil C. ; Pais, Alwyn R.</creator><creatorcontrib>Muhammed, Ajnas ; Mhala, Nikhil C. ; Pais, Alwyn R.</creatorcontrib><description>Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into
n
shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-020-10095-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Fingerprint verification ; Fingerprinting ; Image reconstruction ; Image resolution ; Image restoration ; Multimedia Information Systems ; Security management ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2021-03, Vol.80 (7), p.10255-10284</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-637b1938fd35672bb2e812f01571ad361ff613d7dd3bfba44d7f480c1525a433</citedby><cites>FETCH-LOGICAL-c319t-637b1938fd35672bb2e812f01571ad361ff613d7dd3bfba44d7f480c1525a433</cites><orcidid>0000-0003-0068-6885</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-020-10095-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-020-10095-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Muhammed, Ajnas</creatorcontrib><creatorcontrib>Mhala, Nikhil C.</creatorcontrib><creatorcontrib>Pais, Alwyn R.</creatorcontrib><title>A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into
n
shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.</description><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Fingerprint verification</subject><subject>Fingerprinting</subject><subject>Image reconstruction</subject><subject>Image resolution</subject><subject>Image restoration</subject><subject>Multimedia Information Systems</subject><subject>Security management</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kM1KxDAUhYsoOI6-gKuA62hu0jTtchj8gwE3sw9pe-N06LQ1SQfc-OymU0HcuMpN7jknnC9JboHdA2PqwQOwlFPGGY33QlI4SxYglaBKcTiPs8gZVZLBZXLl_Z4xyCRPF8nXinT9EVtim-4d3eCaLpCAh6E1Acng-oBVaPqOmK7-ozFj2GEXmsqc1r7a4QHJ6KOEHBs_mpZ4rBwG4nfGTa9Tgh8HdNSh79tx8l0nF9a0Hm9-zmWyfXrcrl_o5u35db3a0EpAEWgmVAmFyG0tZKZ4WXLMgVsWG4KpRQbWZiBqVdeitKVJ01rZNGcVSC5NKsQyuZtjY6GPEX3Q-350XfxRc8miSBVyUvFZVbnee4dWx6oH4z41MD1h1jNmHTHrE2YN0SRmk5-4RDy_0f-4vgEG7YLt</recordid><startdate>20210301</startdate><enddate>20210301</enddate><creator>Muhammed, Ajnas</creator><creator>Mhala, Nikhil C.</creator><creator>Pais, Alwyn R.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-0068-6885</orcidid></search><sort><creationdate>20210301</creationdate><title>A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution</title><author>Muhammed, Ajnas ; Mhala, Nikhil C. ; Pais, Alwyn R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-637b1938fd35672bb2e812f01571ad361ff613d7dd3bfba44d7f480c1525a433</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Fingerprint verification</topic><topic>Fingerprinting</topic><topic>Image reconstruction</topic><topic>Image resolution</topic><topic>Image restoration</topic><topic>Multimedia Information Systems</topic><topic>Security management</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Muhammed, Ajnas</creatorcontrib><creatorcontrib>Mhala, Nikhil C.</creatorcontrib><creatorcontrib>Pais, Alwyn R.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Muhammed, Ajnas</au><au>Mhala, Nikhil C.</au><au>Pais, Alwyn R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-03-01</date><risdate>2021</risdate><volume>80</volume><issue>7</issue><spage>10255</spage><epage>10284</epage><pages>10255-10284</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into
n
shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-020-10095-1</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0003-0068-6885</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-03, Vol.80 (7), p.10255-10284 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2505257953 |
source | SpringerNature Journals |
subjects | Computer Communication Networks Computer Science Data Structures and Information Theory Fingerprint verification Fingerprinting Image reconstruction Image resolution Image restoration Multimedia Information Systems Security management Special Purpose and Application-Based Systems |
title | A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T22%3A36%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20novel%20fingerprint%20template%20protection%20and%20fingerprint%20authentication%20scheme%20using%20visual%20secret%20sharing%20and%20super-resolution&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Muhammed,%20Ajnas&rft.date=2021-03-01&rft.volume=80&rft.issue=7&rft.spage=10255&rft.epage=10284&rft.pages=10255-10284&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-020-10095-1&rft_dat=%3Cproquest_cross%3E2505257953%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2505257953&rft_id=info:pmid/&rfr_iscdi=true |