A Novel Technique for Fingerprint Based Secure User Authentication
Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that coul...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on emerging topics in computing 2022-10, Vol.10 (4), p.1918-1931 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1931 |
---|---|
container_issue | 4 |
container_start_page | 1918 |
container_title | IEEE transactions on emerging topics in computing |
container_volume | 10 |
creator | Ali, Syed Sadaf Baghel, Vivek Singh Ganapathi, Iyyakutti Iyappan Prakash, Surya Vu, Ngoc-Son Werghi, Naoufel |
description | Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security. |
doi_str_mv | 10.1109/TETC.2021.3130126 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2747610096</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9632377</ieee_id><sourcerecordid>2747610096</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</originalsourceid><addsrcrecordid>eNpNkEFLw0AQhRdRsNT-APES8OQhdWc32d0c02KtUPRge14224lNqUndTQr-ezekFOcyw_DN480j5B7oFIBmz-uX9XzKKIMpB06BiSsyYiBULGRKr__Nt2Ti_Z6GUiAyIUdklkfvzQkP0Rrtrq5-OozKxkWLqv5Cd3RV3UYz43EbfaLtHEYbjy7Ku3aHdVtZ01ZNfUduSnPwODn3MdksgqFlvPp4fZvnq9hyJttYFQzL0vIEC1AplyJhhitWKqAFZSVLWGohM0ZlFra2xEIyWmyLQmGW0RSAj8nToLszBx2sfRv3qxtT6WW-0v2OJikIrsSpZx8H9uia8JNv9b7pXB3saSYTKYDSTAQKBsq6xnuH5UUWqO6T1X2yuk9Wn5MNNw_DTYWIFz6IMS4l_wOfj3Ir</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2747610096</pqid></control><display><type>article</type><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><source>IEEE Electronic Library (IEL)</source><creator>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</creator><creatorcontrib>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</creatorcontrib><description>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</description><identifier>ISSN: 2168-6750</identifier><identifier>EISSN: 2168-6750</identifier><identifier>DOI: 10.1109/TETC.2021.3130126</identifier><identifier>CODEN: ITETBT</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Biometrics ; Codes ; Computer Science ; Feature extraction ; fingerprint ; Fingerprint recognition ; Fingerprinting ; Fingerprints ; Privacy ; recognition ; revocablity ; Security ; user template</subject><ispartof>IEEE transactions on emerging topics in computing, 2022-10, Vol.10 (4), p.1918-1931</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</citedby><cites>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</cites><orcidid>0000-0002-6076-7831 ; 0000-0002-0198-8319 ; 0000-0001-8039-1280 ; 0000-0003-3498-3335 ; 0000-0002-5542-448X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9632377$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,778,782,794,883,27616,27907,27908,54741,54916</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9632377$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-04516386$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Ali, Syed Sadaf</creatorcontrib><creatorcontrib>Baghel, Vivek Singh</creatorcontrib><creatorcontrib>Ganapathi, Iyyakutti Iyappan</creatorcontrib><creatorcontrib>Prakash, Surya</creatorcontrib><creatorcontrib>Vu, Ngoc-Son</creatorcontrib><creatorcontrib>Werghi, Naoufel</creatorcontrib><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><title>IEEE transactions on emerging topics in computing</title><addtitle>TETC</addtitle><description>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</description><subject>Authentication</subject><subject>Biometrics</subject><subject>Codes</subject><subject>Computer Science</subject><subject>Feature extraction</subject><subject>fingerprint</subject><subject>Fingerprint recognition</subject><subject>Fingerprinting</subject><subject>Fingerprints</subject><subject>Privacy</subject><subject>recognition</subject><subject>revocablity</subject><subject>Security</subject><subject>user template</subject><issn>2168-6750</issn><issn>2168-6750</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEFLw0AQhRdRsNT-APES8OQhdWc32d0c02KtUPRge14224lNqUndTQr-ezekFOcyw_DN480j5B7oFIBmz-uX9XzKKIMpB06BiSsyYiBULGRKr__Nt2Ti_Z6GUiAyIUdklkfvzQkP0Rrtrq5-OozKxkWLqv5Cd3RV3UYz43EbfaLtHEYbjy7Ku3aHdVtZ01ZNfUduSnPwODn3MdksgqFlvPp4fZvnq9hyJttYFQzL0vIEC1AplyJhhitWKqAFZSVLWGohM0ZlFra2xEIyWmyLQmGW0RSAj8nToLszBx2sfRv3qxtT6WW-0v2OJikIrsSpZx8H9uia8JNv9b7pXB3saSYTKYDSTAQKBsq6xnuH5UUWqO6T1X2yuk9Wn5MNNw_DTYWIFz6IMS4l_wOfj3Ir</recordid><startdate>20221001</startdate><enddate>20221001</enddate><creator>Ali, Syed Sadaf</creator><creator>Baghel, Vivek Singh</creator><creator>Ganapathi, Iyyakutti Iyappan</creator><creator>Prakash, Surya</creator><creator>Vu, Ngoc-Son</creator><creator>Werghi, Naoufel</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-6076-7831</orcidid><orcidid>https://orcid.org/0000-0002-0198-8319</orcidid><orcidid>https://orcid.org/0000-0001-8039-1280</orcidid><orcidid>https://orcid.org/0000-0003-3498-3335</orcidid><orcidid>https://orcid.org/0000-0002-5542-448X</orcidid></search><sort><creationdate>20221001</creationdate><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><author>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Biometrics</topic><topic>Codes</topic><topic>Computer Science</topic><topic>Feature extraction</topic><topic>fingerprint</topic><topic>Fingerprint recognition</topic><topic>Fingerprinting</topic><topic>Fingerprints</topic><topic>Privacy</topic><topic>recognition</topic><topic>revocablity</topic><topic>Security</topic><topic>user template</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ali, Syed Sadaf</creatorcontrib><creatorcontrib>Baghel, Vivek Singh</creatorcontrib><creatorcontrib>Ganapathi, Iyyakutti Iyappan</creatorcontrib><creatorcontrib>Prakash, Surya</creatorcontrib><creatorcontrib>Vu, Ngoc-Son</creatorcontrib><creatorcontrib>Werghi, Naoufel</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on emerging topics in computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ali, Syed Sadaf</au><au>Baghel, Vivek Singh</au><au>Ganapathi, Iyyakutti Iyappan</au><au>Prakash, Surya</au><au>Vu, Ngoc-Son</au><au>Werghi, Naoufel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Technique for Fingerprint Based Secure User Authentication</atitle><jtitle>IEEE transactions on emerging topics in computing</jtitle><stitle>TETC</stitle><date>2022-10-01</date><risdate>2022</risdate><volume>10</volume><issue>4</issue><spage>1918</spage><epage>1931</epage><pages>1918-1931</pages><issn>2168-6750</issn><eissn>2168-6750</eissn><coden>ITETBT</coden><abstract>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TETC.2021.3130126</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-6076-7831</orcidid><orcidid>https://orcid.org/0000-0002-0198-8319</orcidid><orcidid>https://orcid.org/0000-0001-8039-1280</orcidid><orcidid>https://orcid.org/0000-0003-3498-3335</orcidid><orcidid>https://orcid.org/0000-0002-5542-448X</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-6750 |
ispartof | IEEE transactions on emerging topics in computing, 2022-10, Vol.10 (4), p.1918-1931 |
issn | 2168-6750 2168-6750 |
language | eng |
recordid | cdi_proquest_journals_2747610096 |
source | IEEE Electronic Library (IEL) |
subjects | Authentication Biometrics Codes Computer Science Feature extraction fingerprint Fingerprint recognition Fingerprinting Fingerprints Privacy recognition revocablity Security user template |
title | A Novel Technique for Fingerprint Based Secure User Authentication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T08%3A10%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Technique%20for%20Fingerprint%20Based%20Secure%20User%20Authentication&rft.jtitle=IEEE%20transactions%20on%20emerging%20topics%20in%20computing&rft.au=Ali,%20Syed%20Sadaf&rft.date=2022-10-01&rft.volume=10&rft.issue=4&rft.spage=1918&rft.epage=1931&rft.pages=1918-1931&rft.issn=2168-6750&rft.eissn=2168-6750&rft.coden=ITETBT&rft_id=info:doi/10.1109/TETC.2021.3130126&rft_dat=%3Cproquest_RIE%3E2747610096%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2747610096&rft_id=info:pmid/&rft_ieee_id=9632377&rfr_iscdi=true |