SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem

被引:2
作者
Kaur, Prabhjot [1 ,2 ]
Kumar, Nitin [3 ]
机构
[1] Natl Inst Technol Uttarakhand, Dept Comp Sci & Engn, Garhwal 246174, Uttarakhand, India
[2] DIT Univ, Sch Comp, Dehra Dun, Uttarakhand, India
[3] Punjab Engn Coll Deemed Univ, Dept Comp Sci & Engn, Sect 12, Chandigarh 160012, Punjab, India
关键词
BCS; SIFT; SIFTBCS; Ear biometric; Biometric key; FINGERPRINT;
D O I
10.1007/s11042-023-16643-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric cryptosystem (BCS) is a challenging field of study where data is secured using biometrics features and cryptographic encryption. The necessity for retaining login credentials has been eliminated by the incorporation of biometrics in encrypted technology. The integration of biometrics into cryptographic systems eliminates the necessity of recalling passwords. This manuscript puts forward an innovative approach referred to as Scale Invariant Feature Transform (SIFT) based Biometric Cryptosystem (SIFTBCS) for the construction of cryptographic keys from the obtained features. The foundation of this technique rests upon the established Fuzzy Vault scheme utilized for safeguarding data. Themotive behind employing the SIFT scheme in biometric cryptosystems is that the extracted features remain unaltered by changes in orientation and scaling, thereby enhancing the accuracy and reliability of authentication. SIFTBCS method is comprised of three distinct stages, namely Key generation, Enrollment and Authentication. Comprehensive experiments were performed on five different ear databases, namely Mathematical Analysis of Images, Carreira-Perpinan, Indian Institute of Technology Delhi (version 1 & 2) and University of Science & Technology Beijing (version 2). Statistical and non-numeric data are used to draw meaningful conclusions from the study. The proposed technique achieves an accuracy of approximate to 94% on USTB-v2, IITD-v1 and CP databases. Our approach demonstrated superior performance using both kinds of performance evaluations.
引用
收藏
页码:28635 / 28656
页数:22
相关论文
共 33 条
[1]  
Clancy T.Ch., 2003, P 2003 ACM SIGMM WOR, P45, DOI [DOI 10.1145/982507.982516, 10.1145/982507.982516]
[2]  
Daesung Moon, 2009, 2009 IEEE 13th International Symposium on Consumer Electronics (ISCE), P290, DOI 10.1109/ISCE.2009.5156914
[3]   Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme [J].
Elrefaei, Lamiaa A. ;
Al-Mohammadi, Ashwaq M. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) :204-217
[4]  
Gonzalez E., 2012, AMI ear database
[5]  
Greg C, 2022, ISO/IEC JTC 1/SC 37 biometrics
[6]   A Zero-Leakage Fuzzy Embedder From the Theoretical Formulation to Real Data [J].
Hine, Gabriel Emile ;
Maiorana, Emanuele ;
Campisi, Patrizio .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) :1724-1734
[7]   Independent component analysis:: algorithms and applications [J].
Hyvärinen, A ;
Oja, E .
NEURAL NETWORKS, 2000, 13 (4-5) :411-430
[8]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) :237-257
[9]  
Kaur P., 2022, MULTIMED TOOLS APPL, V82, P1
[10]  
Kholmatov A, 2006, LECT NOTES COMPUT SC, V4263, P981