Figure 1 - uploaded by Berkay Topcu
Content may be subject to copyright.
Minutiae locations and set of minutiae represented by Gaussian functions. 

Minutiae locations and set of minutiae represented by Gaussian functions. 

Source publication
Conference Paper
Full-text available
In recent years, the interest in human authentication has been increasing. Biometrics are one of the easy authentication schemes, however, security and privacy problems limit their widespread usage. Following the interest in privacy protecting biometric authentication, template protection schemes for biometric modalities has increased significantly...

Context in source publication

Context 1
... corresponds to a convolution in the spatial domain where every minutia is now represented by an isotropic two-dimensional Gaussian function with standard deviation σ C . Minutiae locations on a fingerprint image together with the Gaus- sian functions are illustrated in Figure 1. The minutiae orientation is incorporated into this representation by assigning each Gaussian a complex amplitude e jθi , where θ i is the ori- entation of the corresponding minutiae. ...

Similar publications

Article
Full-text available
Recently, the need for automatic identification has caused researchers to focus on biometric identification methods. Palmprint-based biometric identification has several advantages such as user friendliness, low-cost capturing devices, and robustness. In this paper, a method that integrates the discrete cosine transform (DCT) and an autoregressive...
Article
Full-text available
Biometrics have a long-held hope of replacing passwords by establishing a non-repudiated identity and providing authentication with convenience. Convenience drives consumers toward biometrics-based access management solutions. Unlike passwords, biometrics cannot be script-injected; however, biometric data is considered highly sensitive due to its p...
Article
Full-text available
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Multimodal biometrics such as palmprints and iris provide highly effective automatic mechanisms for use in personal identification and helps to minimize the system error rate. This paper presents a new method for extracting features in spa...
Conference Paper
Full-text available
Hand shape based authentication has long been established as an effective method of biometric identification for access control and security. This paper presents the use of the different statistical measures like mean, median and standard deviation for feature dimensionality reduction following Radon transform along an optimal direction for each qu...
Conference Paper
Full-text available
Biometric cancellability enables protection and revocation of sensitive biometric data as used for authentication. This paper describes a cancellable biometric implementation by means of randomised Local Binary Pattern (LBP) feature vector, with user-specific secret-keys used to generate a biometric template. We also present experimental results to...

Citations

... While it enhances template entropy, it may exhibit reduced performance compared to cancellable biometrics when adversaries present legitimate tokens. For instance, Hakan et al. applied bio-hashing with a fixed-length template generated through spectral minutiae representation, achieving an EER of 0% in FVC2002 databases, with the lowest EER in the stolen token scenario recorded at 14.77% (230). Another variation, "Indexof-Max" (IoM) hashing, developed by Jin et al., converts real-value biometric feature vectors into discrete indexed hashed codes, yielding an EER of 4.10% in the stolen token scenario (208). ...
Article
Full-text available
In the contemporary technological landscape, biometrics, encompassing the analysis of biological data, have gained significance. Biometrics is a methodology that utilize unique behavioral, physical, or morphological traits—such as speech, facial features, iris, fingerprint, retina, and signature for individual identification. Biometric technology has been successfully used in forensic science, security, and authorization systems. This review highlights understanding the classification, types of biometric traits and their comparisons, fingerprint recognition stands out as a reliable and widely adopted method due to its simplicity and cost-effectiveness, accuracy and robustness compared to others. Unimodal fingerprint biometric systems safeguard authentication information through the analysis of characteristic sequences and, face challenges such as vulnerability to spoof attacks, inter-class similarity, intra-class variation, non-universality, and noisy data. These challenges are addressed by multimodal fingerprint biometric systems, in which various biometric sources compensate for each other’s limitations. The review focuses on the overview of unimodal and multimodal fingerprint biometric systems and the importance of fusion, advancements in data acquisition, preprocessing, feature extraction, matching algorithms, performance metrics, indexing, template protection, and addressing attacks in enhancing system security and reliability. The review paper sheds light on the intricate relationship between these elements, offering valuable insights into the current state and potential evolution of the field. The review paper highlights current challenges and suggests future research directions, emphasizing the necessity for continual advancements in fusion techniques, template protection methods, and novel defense mechanisms to effectively mitigate emerging threats in unimodal and multimodal fingerprint biometric systems.
... They demonstrated that the proposed fragile watermarking scheme can be applied to the integrity authentication systems based on biometric image. Also, [17] suggested a secure image encryption without size limitation using Arnold Transform and Random Strategies in order to alleviate the problem of security and inadequacy of Arnold Transform to handle images of any size. ...
... Disappearance of minutiae or appearance of new ones does not affect the size of the grid. Topcu et al. [17] applied biohashing to spectral minutiae as a form of template protection. Shao and Veldhuis [18] applied a HDS to spectral minutiae. ...
Article
Full-text available
Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System. Here it is necessary to transform the raw biometric measurement into a fixed-length representation. In this paper we extend the spectral function approach of Stanko and Skoric [WIFS2017], which provides such a fixed-length representation for fingerprints. First, we introduce a new spectral function that captures different information from the minutia orientations. It is complementary to the original spectral function, and we use both of them to extract information from a fingerprint image. Second, we construct a helper data system consisting of zero-leakage quantisation followed by the Code Offset Method. We show empirical data which demonstrates that applying our helper data system causes only a small performance penalty compared to fingerprint authentication based on the unprotected spectral functions.
... Once the existing transformed template is compromised, a new one can be re-issued as a replacement. Cancelable template ( [Savvides et al. 2004;Ratha et al. 2007; Ahmad et al. 2011]) and BioHashing ([Teoh et al. 2006;Topcu et al. 2013]) are the two most popular feature transformation-based methods. ...
Article
As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.
... Over the last decade, a new innovative research field has emerged, called cancelable biometrics, aimed at finding algorithms dedicated to template protection. [1][2][3][4][5][6][7] The resulting systems must fulfill the following important properties: 8 i) non-invertibility, which refers to the difficulty in recovering the original biometric given the secure template; ii) revocability, which refers to the ability of generating a new template from the same biometric trait and iii) diversity, which is the difficulty in guessing one secure template given another secure template generated from the same biometric data. 9, 10 Many template protection schemes have been applied on the fingerprint. ...
Article
In order to ensure privacy constraints in biometrics, new algorithms called template protection schemes have been proposed in the last ten years in the literature. Most of these algorithms require as input a feature having a fixed size. Texture features can be used within this context for fingerprints as the number of minutiae varies in general for different captures. BioHashing is a two authentication factor algorithm that can be used to enhance to ensure privacy while using biometrics. In this work, we compare different recent texture features from the literature within the BioHashing scheme while considering many constraints: efficiency, maximal representation size and constant size description. Experiments are conducted on three fingerprint databases from the FVC competition. Results permit us to conclude on the texture features to be used within this context.
Chapter
Researchers and scholars from both communities, biometric and crypto, have proposed several template protection schemes over the years to secure biometric systems from vulnerabilities or attacks. In this paper, we present an improvement to a very popular biometric template protection technique known as Bio-hashing for fingerprint, which has a major drawback when the token or secret key gets stolen or compromised. Earlier, many researchers have proposed an improvement to this popular Bio-hashing technique. However, most of the research is focused on nonlinear transformations and using auxiliary data in the form of secret or key that needs to be stored in the database. Here our method uses modified Arnold’s cat map technique to introduce randomness in the orthogonalized tokenized (pseudo) random number during Bio-hashing phase. For this purpose, we calculate the statistical parameter from the enrolled biometric features in the form of mean (µ) and use this to form a seed/key for randomizing the orthogonalized pseudo-random number matrix. This key or seed needs not to be stored in the system or database which makes the technique more secure. Our system achieves an EER ~2.7% which is promising to consider the deliberate perturbations introduced in the FVC DB2 fingerprints.
Chapter
Generation the Distance Matrix (DMx) is an important aspect that influences the correct solution of the routing problem in the dynamic variant. In the case of a frequent changing of points number and location, a continuous and effective update of the data is required, e.g., from more and more popular services such as Mapping APIs. The time-consuming nature of this process, which may extend the planning process, was emphasized. The article discusses the possibility of estimating the distance matrix based on the correction of the “haversine” distance. Method for the generation and updating of the DMx was proposed. The influence of update progress on some optimization algorithms was investigated. The research was carried out on the example of the real VRP problem. It was found that even a partial DMx update can significantly reduce the discrepancy between the VRP optimization results.
Chapter
Nowadays, younger generation is much more exposed to technology than previous generations used to. The recent advances in artificial intelligence (AI) and particularly natural language processing (NLP) and understanding (NLU) make it possible to reinforce and widespread the adoption of AI chatbots in education not only to help students in their administrative affairs or in academic advising but also in assisting them and monitoring their performance during their learning experience. This paper presents a review of the different methods and tools devoted to the design of chatbots with an emphasis on their use and challenges in the education field. Additionally, this paper focuses on language-related challenges and obstacles that hinder the implementation of English, Arabic, and other languages of chatbots. To show how AI chatbots benefit education, a use case is described where Hubert.ai chatbot has been used to assess students’ feedback regarding a machine learning course evaluation.
Chapter
Biometric systems are now proliferating in the very physical and informational fibres of our society, and with the usage of Biometric technology at widespread scale like AADHAAR India, the security risks it poses has gained wide attention as the pervasive hands of identity theft are spreading at an epidemic scale. To combat this, several biometric protection schemes have been proposed now and then. One of the most frequently applied techniques for identifying or authenticating individuals is the fingerprint recognition or authentication system. This survey focuses on the feature transformation schemes present at large in fingerprint and their comparative analysis describing strengths and weaknesses in terms of various performance metrics. Feature transformation methods make use of user-dependent invertible transform (F) or a transformation function (F′) that is non-invertible to transform acquired biometric characteristics from the registered or enrolled biometric sample. A summary of the key feature transformation schemes contained in the literature is discussed briefly in this survey.KeywordsFeature transformationTemplate protectionFingerprint securityBiometric security
Chapter
Keystroke dynamics authentication systems have shown promising results to be used in e-commerce and banking applications. However, this modality suffers from several limitations decreasing their widespread of use in daily applications. This chapter addresses the evaluation of keystroke dynamics authentication systems. The chapter provides an evaluation framework to be used when designing and comparing such systems. It also provides an analysis study of the collected features using a physical and touch screen keyboards. This chapter is dedicated to researchers and engineers who need to quantify the usability of their developed keystroke dynamics systems.