A Novel Technique for Fingerprint Based Secure User Authentication

Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that coul...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on emerging topics in computing 2022-10, Vol.10 (4), p.1918-1931
Hauptverfasser: Ali, Syed Sadaf, Baghel, Vivek Singh, Ganapathi, Iyyakutti Iyappan, Prakash, Surya, Vu, Ngoc-Son, Werghi, Naoufel
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1931
container_issue 4
container_start_page 1918
container_title IEEE transactions on emerging topics in computing
container_volume 10
creator Ali, Syed Sadaf
Baghel, Vivek Singh
Ganapathi, Iyyakutti Iyappan
Prakash, Surya
Vu, Ngoc-Son
Werghi, Naoufel
description Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.
doi_str_mv 10.1109/TETC.2021.3130126
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2747610096</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9632377</ieee_id><sourcerecordid>2747610096</sourcerecordid><originalsourceid>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</originalsourceid><addsrcrecordid>eNpNkEFLw0AQhRdRsNT-APES8OQhdWc32d0c02KtUPRge14224lNqUndTQr-ezekFOcyw_DN480j5B7oFIBmz-uX9XzKKIMpB06BiSsyYiBULGRKr__Nt2Ti_Z6GUiAyIUdklkfvzQkP0Rrtrq5-OozKxkWLqv5Cd3RV3UYz43EbfaLtHEYbjy7Ku3aHdVtZ01ZNfUduSnPwODn3MdksgqFlvPp4fZvnq9hyJttYFQzL0vIEC1AplyJhhitWKqAFZSVLWGohM0ZlFra2xEIyWmyLQmGW0RSAj8nToLszBx2sfRv3qxtT6WW-0v2OJikIrsSpZx8H9uia8JNv9b7pXB3saSYTKYDSTAQKBsq6xnuH5UUWqO6T1X2yuk9Wn5MNNw_DTYWIFz6IMS4l_wOfj3Ir</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2747610096</pqid></control><display><type>article</type><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><source>IEEE Electronic Library (IEL)</source><creator>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</creator><creatorcontrib>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</creatorcontrib><description>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</description><identifier>ISSN: 2168-6750</identifier><identifier>EISSN: 2168-6750</identifier><identifier>DOI: 10.1109/TETC.2021.3130126</identifier><identifier>CODEN: ITETBT</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Authentication ; Biometrics ; Codes ; Computer Science ; Feature extraction ; fingerprint ; Fingerprint recognition ; Fingerprinting ; Fingerprints ; Privacy ; recognition ; revocablity ; Security ; user template</subject><ispartof>IEEE transactions on emerging topics in computing, 2022-10, Vol.10 (4), p.1918-1931</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</citedby><cites>FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</cites><orcidid>0000-0002-6076-7831 ; 0000-0002-0198-8319 ; 0000-0001-8039-1280 ; 0000-0003-3498-3335 ; 0000-0002-5542-448X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9632377$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,778,782,794,883,27616,27907,27908,54741,54916</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9632377$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-04516386$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Ali, Syed Sadaf</creatorcontrib><creatorcontrib>Baghel, Vivek Singh</creatorcontrib><creatorcontrib>Ganapathi, Iyyakutti Iyappan</creatorcontrib><creatorcontrib>Prakash, Surya</creatorcontrib><creatorcontrib>Vu, Ngoc-Son</creatorcontrib><creatorcontrib>Werghi, Naoufel</creatorcontrib><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><title>IEEE transactions on emerging topics in computing</title><addtitle>TETC</addtitle><description>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</description><subject>Authentication</subject><subject>Biometrics</subject><subject>Codes</subject><subject>Computer Science</subject><subject>Feature extraction</subject><subject>fingerprint</subject><subject>Fingerprint recognition</subject><subject>Fingerprinting</subject><subject>Fingerprints</subject><subject>Privacy</subject><subject>recognition</subject><subject>revocablity</subject><subject>Security</subject><subject>user template</subject><issn>2168-6750</issn><issn>2168-6750</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEFLw0AQhRdRsNT-APES8OQhdWc32d0c02KtUPRge14224lNqUndTQr-ezekFOcyw_DN480j5B7oFIBmz-uX9XzKKIMpB06BiSsyYiBULGRKr__Nt2Ti_Z6GUiAyIUdklkfvzQkP0Rrtrq5-OozKxkWLqv5Cd3RV3UYz43EbfaLtHEYbjy7Ku3aHdVtZ01ZNfUduSnPwODn3MdksgqFlvPp4fZvnq9hyJttYFQzL0vIEC1AplyJhhitWKqAFZSVLWGohM0ZlFra2xEIyWmyLQmGW0RSAj8nToLszBx2sfRv3qxtT6WW-0v2OJikIrsSpZx8H9uia8JNv9b7pXB3saSYTKYDSTAQKBsq6xnuH5UUWqO6T1X2yuk9Wn5MNNw_DTYWIFz6IMS4l_wOfj3Ir</recordid><startdate>20221001</startdate><enddate>20221001</enddate><creator>Ali, Syed Sadaf</creator><creator>Baghel, Vivek Singh</creator><creator>Ganapathi, Iyyakutti Iyappan</creator><creator>Prakash, Surya</creator><creator>Vu, Ngoc-Son</creator><creator>Werghi, Naoufel</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0002-6076-7831</orcidid><orcidid>https://orcid.org/0000-0002-0198-8319</orcidid><orcidid>https://orcid.org/0000-0001-8039-1280</orcidid><orcidid>https://orcid.org/0000-0003-3498-3335</orcidid><orcidid>https://orcid.org/0000-0002-5542-448X</orcidid></search><sort><creationdate>20221001</creationdate><title>A Novel Technique for Fingerprint Based Secure User Authentication</title><author>Ali, Syed Sadaf ; Baghel, Vivek Singh ; Ganapathi, Iyyakutti Iyappan ; Prakash, Surya ; Vu, Ngoc-Son ; Werghi, Naoufel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c327t-8b2effc34eb18537642a382f810b02f2425c19aa89c1dcfeb720bdbb8e9905113</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Authentication</topic><topic>Biometrics</topic><topic>Codes</topic><topic>Computer Science</topic><topic>Feature extraction</topic><topic>fingerprint</topic><topic>Fingerprint recognition</topic><topic>Fingerprinting</topic><topic>Fingerprints</topic><topic>Privacy</topic><topic>recognition</topic><topic>revocablity</topic><topic>Security</topic><topic>user template</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ali, Syed Sadaf</creatorcontrib><creatorcontrib>Baghel, Vivek Singh</creatorcontrib><creatorcontrib>Ganapathi, Iyyakutti Iyappan</creatorcontrib><creatorcontrib>Prakash, Surya</creatorcontrib><creatorcontrib>Vu, Ngoc-Son</creatorcontrib><creatorcontrib>Werghi, Naoufel</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE transactions on emerging topics in computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ali, Syed Sadaf</au><au>Baghel, Vivek Singh</au><au>Ganapathi, Iyyakutti Iyappan</au><au>Prakash, Surya</au><au>Vu, Ngoc-Son</au><au>Werghi, Naoufel</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Novel Technique for Fingerprint Based Secure User Authentication</atitle><jtitle>IEEE transactions on emerging topics in computing</jtitle><stitle>TETC</stitle><date>2022-10-01</date><risdate>2022</risdate><volume>10</volume><issue>4</issue><spage>1918</spage><epage>1931</epage><pages>1918-1931</pages><issn>2168-6750</issn><eissn>2168-6750</eissn><coden>ITETBT</coden><abstract>Fingerprint biometrics are extremely popular among digital identity systems for authentication. Most fingerprint based authentication systems store unique minutiae points information of a user directly in the database as their template. An adversary can potentially attack the user template that could compromise information of minutiae points. It has been proven that a fingerprint can be reconstructed from minutiae points and hence there is an important requirement in fingerprint based biometric systems to provide protection and privacy. This article introduces a novel technique to provide enhanced protection for fingerprint based biometrics, taking into account the attributes of minutiae point, the ridge count between the neighbouring minutiae points and the local minutiae point structure. The proposed technique has been implemented and tested on a total of nine fingerprint databases of varying quality. In comparison to the other existing techniques under different scenarios, the proposed technique exhibits superior recognition performance. The proposed technique is a singular point independent and has shown high stability, robustness, and security.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TETC.2021.3130126</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-6076-7831</orcidid><orcidid>https://orcid.org/0000-0002-0198-8319</orcidid><orcidid>https://orcid.org/0000-0001-8039-1280</orcidid><orcidid>https://orcid.org/0000-0003-3498-3335</orcidid><orcidid>https://orcid.org/0000-0002-5542-448X</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2168-6750
ispartof IEEE transactions on emerging topics in computing, 2022-10, Vol.10 (4), p.1918-1931
issn 2168-6750
2168-6750
language eng
recordid cdi_proquest_journals_2747610096
source IEEE Electronic Library (IEL)
subjects Authentication
Biometrics
Codes
Computer Science
Feature extraction
fingerprint
Fingerprint recognition
Fingerprinting
Fingerprints
Privacy
recognition
revocablity
Security
user template
title A Novel Technique for Fingerprint Based Secure User Authentication
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T08%3A10%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Novel%20Technique%20for%20Fingerprint%20Based%20Secure%20User%20Authentication&rft.jtitle=IEEE%20transactions%20on%20emerging%20topics%20in%20computing&rft.au=Ali,%20Syed%20Sadaf&rft.date=2022-10-01&rft.volume=10&rft.issue=4&rft.spage=1918&rft.epage=1931&rft.pages=1918-1931&rft.issn=2168-6750&rft.eissn=2168-6750&rft.coden=ITETBT&rft_id=info:doi/10.1109/TETC.2021.3130126&rft_dat=%3Cproquest_RIE%3E2747610096%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2747610096&rft_id=info:pmid/&rft_ieee_id=9632377&rfr_iscdi=true