SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem

被引:1
|
作者
Kaur, Prabhjot [1 ,2 ]
Kumar, Nitin [3 ]
机构
[1] Natl Inst Technol Uttarakhand, Dept Comp Sci & Engn, Garhwal 246174, Uttarakhand, India
[2] DIT Univ, Sch Comp, Dehra Dun, Uttarakhand, India
[3] Punjab Engn Coll Deemed Univ, Dept Comp Sci & Engn, Sect 12, Chandigarh 160012, Punjab, India
关键词
BCS; SIFT; SIFTBCS; Ear biometric; Biometric key; FINGERPRINT;
D O I
10.1007/s11042-023-16643-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric cryptosystem (BCS) is a challenging field of study where data is secured using biometrics features and cryptographic encryption. The necessity for retaining login credentials has been eliminated by the incorporation of biometrics in encrypted technology. The integration of biometrics into cryptographic systems eliminates the necessity of recalling passwords. This manuscript puts forward an innovative approach referred to as Scale Invariant Feature Transform (SIFT) based Biometric Cryptosystem (SIFTBCS) for the construction of cryptographic keys from the obtained features. The foundation of this technique rests upon the established Fuzzy Vault scheme utilized for safeguarding data. Themotive behind employing the SIFT scheme in biometric cryptosystems is that the extracted features remain unaltered by changes in orientation and scaling, thereby enhancing the accuracy and reliability of authentication. SIFTBCS method is comprised of three distinct stages, namely Key generation, Enrollment and Authentication. Comprehensive experiments were performed on five different ear databases, namely Mathematical Analysis of Images, Carreira-Perpinan, Indian Institute of Technology Delhi (version 1 & 2) and University of Science & Technology Beijing (version 2). Statistical and non-numeric data are used to draw meaningful conclusions from the study. The proposed technique achieves an accuracy of approximate to 94% on USTB-v2, IITD-v1 and CP databases. Our approach demonstrated superior performance using both kinds of performance evaluations.
引用
收藏
页码:28635 / 28656
页数:22
相关论文
共 50 条
  • [1] SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem
    Prabhjot Kaur
    Nitin Kumar
    Multimedia Tools and Applications, 2024, 83 : 28635 - 28656
  • [2] SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem
    Kaur, Prabhjot
    Kumar, Nitin
    Singh, Maheep
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11) : 12292 - 12316
  • [3] A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault
    V. Sujitha
    D. Chitra
    Journal of Medical Systems, 2019, 43
  • [4] A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault
    Sujitha, V.
    Chitra, D.
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (05)
  • [5] Image Watermarking Scheme Based on Scale-Invariant Feature Transform
    Lyu, Wan-Li
    Chang, Chin-Chen
    Thai-Son Nguyen
    Lin, Chia-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3591 - 3606
  • [6] Face recognition based on scale invariant feature transform and fuzzy reasoning
    Tao, Xiaojiao
    Pan, Dongyin
    INTERNET TECHNOLOGY LETTERS, 2023, 6 (05)
  • [7] Biometric Mobile Template Protection: A Composite Feature based Fingerprint Fuzzy Vault
    Xi, Kai
    Hu, Jiankun
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 829 - 833
  • [8] Biometric Cryptosystem Scheme for Internet of Things using Fuzzy Commitment principle
    Bentahar, Atef
    Meraoumia, Abdallah
    Bendjenna, Hakim
    Chitroub, Salim
    Zeroual, Abdelhakim
    2018 INTERNATIONAL CONFERENCE ON SIGNAL, IMAGE, VISION AND THEIR APPLICATIONS (SIVA), 2018,
  • [9] Image Registration Techniques Based on the Scale Invariant Feature Transform
    Lakshmi, K. Divya
    Vaithiyanathan, V.
    IETE TECHNICAL REVIEW, 2017, 34 (01) : 22 - 29
  • [10] Scale Invariant Feature Transform Based Image Matching and Registration
    Kher, Heena R.
    Thakar, Vishvjit K.
    2014 FIFTH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP 2014), 2014, : 50 - 55