SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem

被引:3
作者
Kaur, Prabhjot [1 ]
Kumar, Nitin [1 ]
Singh, Maheep [1 ]
机构
[1] Natl Inst Technol Uttarakhand, Dept Comp Sci & Engn, Srinagar, India
关键词
Biometric cryptosystem; SURF; Fuzzy vault; FINGERPRINT; GENERATION;
D O I
10.1007/s11227-023-05142-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric cryptosystem (BCS) is an emerging research area in which Biometric alleviates the need to remember passwords and cryptography provides a sense of security. The use of biometrics in cryptography alleviates the need to remember passwords. This paper proposes a novel method called Speeded Up Robust Features (SURF) based Biometric Cryptosystem (SURFBCS) for biometric key generation. This method makes use of a well-known Fuzzy vault scheme for data security. The motivation behind using SURF scheme for biometric cryptosystem is that the obtained features are invariant to rotation and scaling which is essential for improved authentication. SURFBCS is divided into three stages, i.e., Key generation, Enrollment and Authentication. In key generation stage, biometric features are extracted using Speeded Up Robust Features which are subsequently used to generate the biometric key. The enrollment stage uses these features and biometric key to create a fuzzy vault. The authentication stage uses this fuzzy vault to authenticate the query biometric. Extensive experiments have been conducted on five ear databases, viz., AMI, CP, IITD-v1, IITD-v2 and USTB-v2. The performance of the proposed method is evaluated in terms of accuracy, false reject rate (FRR), vault construction time, key recovery time and Receiver Operating Characteristics (ROC) curve and compared with the state-of-art methods. The highest accuracy of 94.9% is obtained by SURFBCS method on CP database. Moreover, vault construction and key recovery time of 31.69 ms and 0.90 ms, respectively, is obtained by the proposed method on IITD-v1 database also supersedes the other methods. It has been observed that the proposed method is better than several state-of-the-art methods in both qualitative and quantitative terms.
引用
收藏
页码:12292 / 12316
页数:25
相关论文
共 31 条
[1]   Key binding biometrics-based remote user authentication scheme using smart cards [J].
Al-Saggaf, Alawi A. .
IET BIOMETRICS, 2018, 7 (03) :278-284
[2]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[3]  
Daesung Moon, 2009, 2009 IEEE 13th International Symposium on Consumer Electronics (ISCE), P290, DOI 10.1109/ISCE.2009.5156914
[4]  
González E, 2011, INT CARN CONF SECU
[5]  
Greg C, 2022, 1SC ISOIEC JTC
[6]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
DESIGNS CODES AND CRYPTOGRAPHY, 2006, 38 (02) :237-257
[7]  
Kholmatov A, 2006, LECT NOTES COMPUT SC, V4263, P981
[8]   Algebraic soft-decision decoding of Reed-Solomon codes [J].
Koetter, R ;
Vardy, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (11) :2809-2825
[9]   Intra-class Variance Among Multiple Samples of the Same Person's Fingerprint in a Cooperative User Scenario [J].
Krivokuca, Vedrana ;
Abdulla, Waleed .
PATTERN RECOGNITION APPLICATIONS AND METHODS, ICPRAM 2014, 2015, 9443 :77-92
[10]   Automated human identification using ear imaging [J].
Kumar, Ajay ;
Wu, Chenye .
PATTERN RECOGNITION, 2012, 45 (03) :956-968