Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing

被引:55
作者
Abdullahi, Sani M. [1 ]
Wang, Hongxia [2 ]
Li, Tao [2 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 611756, Peoples R China
[2] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Peoples R China
基金
中国国家自然科学基金;
关键词
Fingerprint image hashing; Fourier-Mellin transform; fractal coding; robustness; minutiae features; RING PARTITION; GENERATION; TEMPLATES; SECURE;
D O I
10.1109/TIFS.2020.2971142
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric image hashing techniques have been widely studied and seen progressive advancements. However, only a handful of available solutions provide two-factor cancelability while simultaneously satisfying the tradeoff among all criteria of template protection mechanisms. In this paper, we propose a novel scheme for generating a secure and robust hash from a fingerprint image using Fourier-Mellin transform and fractal coding. First, due to its invariance property, Fourier-Mellin transform is incorporated into the domain fingerprint minutiae blocks to provide feature alignment, therein generating a fixed-length minutiae representation for comparison. Then, dimensionality reduction and texture compression are exploited using fractal coding to generate a robust and compact hash for improved security and recognition. The experimental results demonstrate a favorable recognition performance on benchmarked state-of-the-art schemes from FVC2002 and FVC2004 fingerprint databases. The analyses prove our method's robustness and resiliency to security and privacy attacks. Our method also satisfies the revocability and unlinkability criteria of cancelable biometrics.
引用
收藏
页码:2587 / 2601
页数:15
相关论文
共 45 条
[31]   Robust image hashing using non-uniform sampling in discrete Fourier domain [J].
Qin, Chuan ;
Chang, Chin-Chen ;
Tsou, Pei-Ling .
DIGITAL SIGNAL PROCESSING, 2013, 23 (02) :578-585
[32]   Generation of Cancelable Iris Templates via Randomized Bit Sampling [J].
Sadhya, Debanjan ;
Raman, Balasubramanian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) :2972-2986
[33]   A Biometric Key Generation Method Based on Semisupervised Data Clustering [J].
Sheng, Weiguo ;
Chen, Shengyong ;
Xiao, Gang ;
Mao, Jiafa ;
Zheng, Yujun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2015, 45 (09) :1205-1217
[34]   Secure and robust image hashing via compressive sensing [J].
Sun, Rui ;
Zeng, Wenjun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) :1651-1665
[35]   Robust and secure image hashing [J].
Swaminathan, Ashwin ;
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) :215-230
[36]   Robust image hashing via DCT and LLE [J].
Tang, Zhenjun ;
Lao, Huan ;
Zhang, Xianquan ;
Liu, Kai .
COMPUTERS & SECURITY, 2016, 62 :133-148
[37]   Robust Image Hashing With Ring Partition and Invariant Vector Distance [J].
Tang, Zhenjun ;
Zhang, Xianquan ;
Li, Xianxian ;
Zhang, Shichao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (01) :200-214
[38]   Robust image hashing via colour vector angles and discrete wavelet transform [J].
Tang, Zhenjun ;
Dai, Yumin ;
Zhang, Xianquan ;
Huang, Liyan ;
Yang, Fan .
IET IMAGE PROCESSING, 2014, 8 (03) :142-149
[39]   Robust Perceptual Image Hashing Based on Ring Partition and NMF [J].
Tang, Zhenjun ;
Zhang, Xianquan ;
Zhang, Shichao .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (03) :711-724
[40]   Robust image hashing using ring-based entropies [J].
Tang, Zhenjun ;
Zhang, Xianquan ;
Huang, Liyan ;
Dai, Yumin .
SIGNAL PROCESSING, 2013, 93 (07) :2061-2069