Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Ear Authentication and Template Protection using Bio-key

1K. Annapurani, 2M.A.K. Sadiq and 1C. Malathy
1Department of Computer Science and Engineering, SRM University, Chennai-603203, India
2Department of Information Technology, Ministry of Higher Education, Oman
Research Journal of Applied Sciences, Engineering and Technology  2014  12:1450-1455
http://dx.doi.org/10.19026/rjaset.8.1120  |  © The Author(s) 2014
Received: June ‎20, ‎2014  |  Accepted: ‎July ‎19, ‎2014  |  Published: September 25, 2014

Abstract

Biometric authentication is gaining popularity in the current scenario. Biometric based authentication is the science of using physical or behavioral characteristic for ensuring that the person is the claimed identity. Biometric authentication system is also vulnerable to attacks in various phases. The biometric data stored in the template has to be protected, since variety of attacks like circumvent, covert acquisition affects the normal functioning of the system. An attacker may create new biometric data or steal the template or modify the template. Once the biometric template is compromised then the entire system is lost. So securing biometric template is an important aspect in biometric authentication system. In this study ear biometric template is secured by a new method of generating bio key from the ear fused template. Here the transformed template is stored in the database. During verification phase, for the new biometric sample a bio key is generated. Using this bio key the person is authenticated if the transformed feature generated is matched with the stored one. Hence the template is protected with the bio key. The authenticated person alone can access the system, since the key to decrypt the encrypted template is obtained from the ear trait of the authenticated person. FAR and FRR are used to evaluate the system performance.

Keywords:

Authentication , biometric template, bio key , circumvent , encrypted template , transformed feature,


References

  1. Boult, T., 2006. Robust distance measures for face-recognition supporting revocable biometric tokens. Proceeding of 7th International Conference on Automatic Face and Gesture Recognition, pp: 560-566.
    CrossRef    
  2. Boult, T., W. Scheirer and R. Woodworth, 2007. Revocable fingerprint biotokens: Accuracy and security analysis. Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp: 1-8.
    CrossRef    
  3. Cavoukian, A. and A. Stoianov, 2009. Biometric encryption. In: Encyclopedia of Biometrics. Springer, US, pp: 260-269.
    CrossRef    
  4. Chang, K., K. Bowyer and V. Barnabas, 2003. Comparison and combination of ear and face images in appearance-based biometrics. IEEE T. Pattern Anal., 25: 1160-1165.
    CrossRef    
  5. Chen, H. and B. Bhanu, 2005. Shape model-based 3D ear detection from side face range images. Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition-Workshop (CVPR, 2005). San Diego, CA, USA, pp: 122.
  6. Jain, A.K., A. Ross and U. Uludag, 2005. Biometric template security: Challenges and responses. Proceedings of European Signal Processing Conference (EUSIPCO), pp: 1934-1937.
  7. Jain, A.K., K. Nandakumar and A. Nagar, 2008. Biometric template security. EURASIP J. Adv. Sig. Pr., 2008(113): 1-17.
    CrossRef    
  8. Juels, A. and M. Wattenberg, 1999. A fuzzy commitment scheme. Proceeding of 6th ACM Conferences on Computer and Comm. Security, pp: 28-36.
    CrossRef    
  9. Juels, A. and M. Sudan, 2002. A fuzzy vault scheme. Proceeding of IEEE International Symposium on Information Theory, pp: 408-412.
    CrossRef    
  10. Li, Y. and M. Zhichun, 2012. An ear template protection method. Proceeding of 31st Chinese Control Conference (CCC, 2012), pp: 3858-3862.
  11. Mark, B. and B. Wilhelm, 1999. Ear biometrics. BIOMETRICS: Personal Identification in a Networked Society, pp: 273-286.
    PMid:10480252    
  12. Ouda, O., N. Tsumura and T. Nakaguchi, 2010. BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting IrisCodes. IEICE T. Inf. Syst., E93-D (7): 1878-1888.
    CrossRef    
  13. Pillai, J., V. Patel, R. Chellappa and N. Ratha, 2011. Secure and robust iris recognition using random projections and sparse representations. IEEE T. Pattern Anal., 33(9): 1877-1893.
    CrossRef    PMid:21339529    
  14. Yan, P. and K.W. Bowyer, 2007. Ear biometrics using 2D and 3D images. IEEE T. Pattern Anal., 29(8): 1297-1308.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved