Research Article | OPEN ACCESS
Ear Authentication and Template Protection using Bio-key
1K. Annapurani, 2M.A.K. Sadiq and 1C. Malathy
1Department of Computer Science and Engineering, SRM University, Chennai-603203, India
2Department of Information Technology, Ministry of Higher Education, Oman
Research Journal of Applied Sciences, Engineering and Technology 2014 12:1450-1455
Received: June 20, 2014 | Accepted: July 19, 2014 | Published: September 25, 2014
Abstract
Biometric authentication is gaining popularity in the current scenario. Biometric based authentication is the science of using physical or behavioral characteristic for ensuring that the person is the claimed identity. Biometric authentication system is also vulnerable to attacks in various phases. The biometric data stored in the template has to be protected, since variety of attacks like circumvent, covert acquisition affects the normal functioning of the system. An attacker may create new biometric data or steal the template or modify the template. Once the biometric template is compromised then the entire system is lost. So securing biometric template is an important aspect in biometric authentication system. In this study ear biometric template is secured by a new method of generating bio key from the ear fused template. Here the transformed template is stored in the database. During verification phase, for the new biometric sample a bio key is generated. Using this bio key the person is authenticated if the transformed feature generated is matched with the stored one. Hence the template is protected with the bio key. The authenticated person alone can access the system, since the key to decrypt the encrypted template is obtained from the ear trait of the authenticated person. FAR and FRR are used to evaluate the system performance.
Keywords:
Authentication , biometric template, bio key , circumvent , encrypted template , transformed feature,
References
-
Boult, T., 2006. Robust distance measures for face-recognition supporting revocable biometric tokens. Proceeding of 7th International Conference on Automatic Face and Gesture Recognition, pp: 560-566.
CrossRef -
Boult, T., W. Scheirer and R. Woodworth, 2007. Revocable fingerprint biotokens: Accuracy and security analysis. Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp: 1-8.
CrossRef -
Cavoukian, A. and A. Stoianov, 2009. Biometric encryption. In: Encyclopedia of Biometrics. Springer, US, pp: 260-269.
CrossRef -
Chang, K., K. Bowyer and V. Barnabas, 2003. Comparison and combination of ear and face images in appearance-based biometrics. IEEE T. Pattern Anal., 25: 1160-1165.
CrossRef -
Chen, H. and B. Bhanu, 2005. Shape model-based 3D ear detection from side face range images. Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition-Workshop (CVPR, 2005). San Diego, CA, USA, pp: 122.
-
Jain, A.K., A. Ross and U. Uludag, 2005. Biometric template security: Challenges and responses. Proceedings of European Signal Processing Conference (EUSIPCO), pp: 1934-1937.
-
Jain, A.K., K. Nandakumar and A. Nagar, 2008. Biometric template security. EURASIP J. Adv. Sig. Pr., 2008(113): 1-17.
CrossRef -
Juels, A. and M. Wattenberg, 1999. A fuzzy commitment scheme. Proceeding of 6th ACM Conferences on Computer and Comm. Security, pp: 28-36.
CrossRef -
Juels, A. and M. Sudan, 2002. A fuzzy vault scheme. Proceeding of IEEE International Symposium on Information Theory, pp: 408-412.
CrossRef -
Li, Y. and M. Zhichun, 2012. An ear template protection method. Proceeding of 31st Chinese Control Conference (CCC, 2012), pp: 3858-3862.
-
Mark, B. and B. Wilhelm, 1999. Ear biometrics. BIOMETRICS: Personal Identification in a Networked Society, pp: 273-286.
PMid:10480252 -
Ouda, O., N. Tsumura and T. Nakaguchi, 2010. BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting IrisCodes. IEICE T. Inf. Syst., E93-D (7): 1878-1888.
CrossRef -
Pillai, J., V. Patel, R. Chellappa and N. Ratha, 2011. Secure and robust iris recognition using random projections and sparse representations. IEEE T. Pattern Anal., 33(9): 1877-1893.
CrossRef PMid:21339529 -
Yan, P. and K.W. Bowyer, 2007. Ear biometrics using 2D and 3D images. IEEE T. Pattern Anal., 29(8): 1297-1308.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|