Non-Contact Fingerprint Template Protection Using DFT Combined Random Projection

Non-Contact Fingerprint Template Protection Using DFT Combined Random Projection

Boris Jerson Zannou, Tahirou Djara, Antoine Vianou
DOI: 10.4018/IJSPPC.302007
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In view of the different dangers to which users of contactless biometric systems are exposed, we have developed a contactless secure revocable model based on random projection and DFT (Discret Fourier Tansformation) to enhance contactless fingerprint authentication. Two matrices emerge, namely that corresponding to the terminations and that corresponding to the bifurcations. These matrices are then transformed in a first time thanks to the random projection. In a second time we apply to them the Discret Fourier Transformation called the DFT.This proposed non-contact revocable fingerprint model meets the requirements of revocability, diversity, security and non-reversibility. The evaluation of our model through its results gives the most promising results compared to those existing. The equal error rate (EER) obtained are respectively equal to 0.19% for FVC2002 DB1, 1% for FVC2002 DB2, 4.29% for FVC2002 DB3 and 9.01% for FVC2004 DB2.
Article Preview
Top

Introduction

Biometric authentication systems are increasingly being used extensively as part of the manifestation of identity and access control. It is based on the physiological characteristics that can be measured (signature, fingerprint, gait, strike, ...) of a human being. For a long time it has been used in sensitive systems passwords or tokens to allow users to authenticate. Generically, the biometric application is composed of: a) a sensor unit for recovering the non-contact image, b) generating a feature vector after the image acquisition from the contactless sensors in the module feature extraction, c) Storing extracted features in a database, d) Comparison module to check whether the stored characteristics match those of the user, e) a decision-making module for authorizing or not the access.

Figure 1.

Weakness point in a biometric system

IJSPPC.302007.f01

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 15: 1 Issue (2023)
Volume 14: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
View Complete Journal Contents Listing