ArticlePDF Available

Noninvertible Minutia Cylinder-Code Representation

Authors:

Abstract and Figures

Although several fingerprint template protection methods have been proposed in the literature, the problem is still unsolved, since enforcing nonreversibility tends to produce an excessive drop in accuracy. Furthermore, unlike fingerprint verification, whose performance is assessed today with public benchmarks and protocols, performance of template protection approaches is often evaluated in heterogeneous scenarios, thus making it very difficult to compare existing techniques. In this paper, we propose a novel protection technique for Minutia Cylinder-Code (MCC), which is a well-known local minutiae representation. A sophisticate algorithm is designed to reverse MCC (i.e., recovering original minutiae positions and angles). Systematic experimentations show that the new approach compares favorably with state-of-the-art methods in terms of accuracy and, at the same time, provides a good protection of minutiae information and is robust against masquerade attacks.
Content may be subject to copyright.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012 1727
Noninvertible Minutia Cylinder-Code Representation
Matteo Ferrara, Davide Maltoni, Member, IEEE, and Raffaele Cappelli, Member, IEEE
Abstract—Although several ngerprint template protection
methods have been proposed in the literature, the problem is
still unsolved, since enforcing nonreversibility tends to produce
an excessive drop in accuracy. Furthermore, unlike ngerprint
verication, whose performance is assessed today with public
benchmarks and protocols, performance of template protection
approaches is often evaluated in heterogeneous scenarios, thus
making it very difcult to compare existing techniques. In this
paper, we propose a novel protection technique for Minutia
Cylinder-Code (MCC), which is a well-known local minutiae
representation. A sophisticate algorithm is designed to reverse
MCC (i.e., recovering original minutiae positions and angles).
Systematic experimentations show that the new approach com-
pares favorably with state-of-the-art methods in terms of accuracy
and, at the same time, provides a good protection of minutiae
information and is robust against masquerade attacks.
Index Terms—Fingerprints, minutiae, noninvertible transform,
P-MCC, template protection.
I. INTRODUCTION
IN recent years, template protection techniques have gained
increasing interest in the biometric community, due to the
worldwide diffusion of new biometric applications and the con-
sequent growing of privacy issues. Fingerprints are one of the
most studied biometric traits and the most widely used in civil
and forensic recognition systems, hence the development of ef-
fective techniques to protect ngerprint templates is undoubt-
edly a crucial challenge for the research community.
In general, template protection methods are designed to guar-
antee: i) the infeasibility to reconstruct the original pattern from
the protected template (nonreversibility), ii) the possibility to
create different protected templates starting from the same un-
protected pattern (diversity), iii) the preservation of the recog-
nition accuracy when the matching is carried out on protected
templates (accuracy), and iv) the possibility to revoke a com-
promised template and reissue a new one based on the same
biometric data (revocability)[1].
In [1] template protection techniques are grouped into
two main categories: feature transformation and biometric
cryptosystem. Feature transformation methods convert an
unprotected pattern into a protected template through a trans-
formation function. During the verication phase, the same
Manuscript received May 04, 2012; revised July 06, 2012; accepted July
31, 2012. Date of publication September 19, 2012; date of current version
November 15, 2012. This work was supported by the European Community’s
Framework Programme (FP7/2007-2013) under Grant agreement 284862. The
associate editor coordinating the review of this manuscript and approving it for
publication was Dr. Anjay Kumar.
The authors are with the Department of Electronics, Computer Sciences and
Systems of the University of Bologna, 47521 Cesena (FC), Italy (e-mail: matteo.
ferrara@unibo.it; davide.maltoni@unibo.it; raffaele.cappelli@unibo.it).
Digital Object Identier 10.1109/TIFS.2012.2215326
transformation is applied to the query pattern and the matching
takes place in the transformed space. Depending on the charac-
teristics of the transformation function, these approaches can be
further divided in: noninvertible transforms and salting.Non-
invertible transforms (e.g., [2]–[10]) exploit one-way functions
which are computationally hard to invert. Salting transforms
or biohashing (e.g., [11]) combine a transform function with
a secret key, to protect the original pattern. Hence, salting
methods are two-factor authentication approaches, whose secu-
rity partially depends on a secret key. Biometric cryptosystems
use a biometric trait to generate or protect a cryptographic key.
Some public information about the unprotected pattern, called
helper data, is stored. The helper data is not expected to reveal
any important information about the unprotected template,
hence it is not required to be secret. During the matching phase,
a cryptographic key is extracted from the query pattern using
the helper data; then the matching is indirectly performed by
verifying the validity of the extracted key. Biometric cryptosys-
tems can be further divided in key-generation and key-binding,
depending on how the helper data is generated. In the former
approaches (e.g., [12], [13]), the helper data is obtained from
the unprotected pattern and the cryptographic key is created
using the helper data and the query pattern; in the latter ap-
proaches (e.g., [14]–[18]), the helper data is derived by binding
an independent external key to the unprotected pattern: during
the matching the key is recovered from the helper data using
the query pattern.
Although several ngerprint template protection methods
have been proposed in the literature, the problem is still un-
solved, since enforcing nonreversibility tends to produce an
excessive drop in accuracy.Thisisprimaryduetothelargein-
traclass variability of ngerprint patterns: different acquisitions
of the same nger can be very dissimilar and consequently the
protected templates may be very different. It is commonly rec-
ognized that, in practice, it is very difcult to design template
protection methods that are both secure from a cryptographic
point of view and very accurate from a biometric point of
view. Unfortunately, unlike ngerprint verication, whose
performance is nowadays assessed with public benchmarks
and protocols [19], testing template protection approaches is
often performed in heterogeneous scenarios, thus making it
very difcult to compare existing techniques and to understand
their actual limits.
This paper introduces a novel minutiae template noninvert-
ible transform based on Minutia Cylinder-Code (MCC) [20], di-
mensionality reduction and binarization. MCC relies on a robust
xed-length minutia descriptor and was independently demon-
strated to be one of the most effective local minutia descriptors
for ngerprint recognition [21]. The template protection scheme
proposed in this work has been specically designed to benet
from the MCC representation. Extensive experiments prove that
1556-6013/$31.00 © 2012 IEEE
1728 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012
the proposed method combines good biometric accuracy to non-
reversibility and compares favorably with the state-of-the-art.
The rest of this paper is organized as follows. Section II
briey summarizes the state-of-the-art of noninvertible trans-
forms for ngerprint templates. Section III introduces the
MCC representation; Section IV proposes an attack strategy to
revert an MCC template into the original minutiae template,
and proves that unprotected MCC templates offer a very weak
protection of minutiae information. Section V describes the
new minutiae template protection method. Section VI reports
experiments on public databases to evaluate security and ac-
curacy of the new approach and to compare it against existing
template protection methods. Finally, Section VII draws some
concluding remarks.
II. NONINVERTIBLE TRANSFORMS
Conceptually, a template can be protected by transforming the
unprotected pattern into another representation space through a
noninvertible transform; then, during authentication, the same
transform is applied to the query template and the comparison
is performed in the transformed space. Thus, the security of
the protected template largely depends on the robustness of the
transformation used.
The idea of noninvertible transforms for ngerprint tem-
plate protection was rst introduced by Ratha et al. in [2]
and extended in [3]. These approaches rst locate singular
points and minutiae in ngerprint images; then, minutiae are
transformed with respect to the core point using three different
transforms: i) Cartesian, ii) polar, and iii) functional surface
folding. The resulting minutiae points are still embedded in
a two-dimensional space and conventional minutiae-based
ngerprint matching algorithms can be used to compare two
protected templates. Unfortunately, the proposed transforms
have a fairly low nonreversibility degree; in fact, the same
authors found that only few minutiae (about 8%) have their
neighbors perturbed by these transformations [22]. In con-
clusion, although the approach achieves an high matching
accuracy, the level of nonreversibility provided is quite limited.
More recent methods based on noninvertible transforms show
some improvements, but, in general, the trade-off between ac-
curacy and nonreversibility is still far from being satisfactory
[23]. In [5], [8] the authors propose an alignment-free method
that uses a family of symmetric hash functions to transform
the minutiae and performs the matching step in the hash space.
Ahn et al. [7] hide minutiae information by deriving geomet-
rical properties from triplets of minutia points. Although the
idea is promising, the accuracy is quite low. Nagar et al. [9]
describe a scheme to extract binary features from ngerprints
using minutia points and ngerprint ridges. During the matching
phase, the binary features are compared using the normalized
Hamming distance. In [24], Yang et al. propose a nonlinear dy-
namic random projection method to increase the computational
complexity of reversing the genuine biometric feature, with re-
spect to the traditional random projection.
In [4], [6], [10] and [25], to improve the degree of nonre-
versibility, the authors propose to exploit a user’s secret key as
a parameter of the noninvertible function. These methods are
two-factor authentication approaches and the nonreversibility
is mostly provided by the secrecy of the key rather than by
the transformation itself. In [4], Lee et al. calculate, for each
minutia, a rotation- and translation-invariant value from the
orientation information in its neighborhood. The protected tem-
plate is built by transforming minutiae according to changing
functions (user’s PIN dependent) that produce two values
invariant to translation and rotation of the original minutiae.
Chikkerur et al. [6] extract a texture-based feature vector from
the gray-scale neighborhood of each minutia. Each feature
vector is transformed using a noninvertible function that uses a
random key as a parameter. Yang et al. [25] create a xed-length
binary hash string from the minutiae vicinity representation
introduced in [26]. A user-specic random parameter is used
to encrypt and randomly offset each vicinity. In [10], Zhe and
Jin use minutia vicinity decomposition (a variant of the minutia
vicinity representation [26]) to extract a set of geometrical in-
variant features from minutiae triplets. To achieve revocability,
a user-specic random matrix is added to the feature matrix.
III. MINUTIA CYLINDER-CODE
Let be a minutiae template: each minutia is a triplet
where is the minutia location and
is the minutia direction (in the range ). The Minutia
Cylinder-Code representation (MCC) [20] associates a local de-
scriptor to each minutia : this descriptor encodes spatial and
directional relationships between the minutia and its neighbor-
hood of radius , and can be conveniently represented as a
cylinder, whose base and height are related to the spatial and
directional information, respectively. The cylinder is divided
into sections: each section corresponds to a directional differ-
ence in the range ; sections are discretized into cells.
During the creation of a cylinder, a numerical value is calcu-
lated for each cell, by accumulating contributions from minu-
tiae in a neighborhood of the projection of the cell center onto
the cylinder base. The contribution of each minutia to a cell
(of the cylinder corresponding to a given minutia ), depends
both on:
spatial information (how much is close to the center of
the cell), and
directional information (how much the directional differ-
ence between and is similar to the directional differ-
ence associated to the section where the cell lies).
In other words, the value of a cell represents the likelihood of
nding minutiae that are close to the cell and whose directional
difference with respect to is similar to a given value. Fig. 1
shows the cylinder associated to a minutia with seven minutiae
in its neighborhood.
Given a template , MCC creates a cylinder-set ,which
contains the cylinders associated to all minutiae in with a
sufcient number of neighbors (see [20]). Each cylinder is a
local descriptor:
invariant for translation and rotation, since i) it only
encodes distances and directional differences between
minutiae, and ii) its base is rotated according to the corre-
sponding minutia direction;
robust against skin distortion (which is small at a local
level) and against small feature extraction errors, thanks
FERRARA et al.: NONINVERTIBLE MINUTIA CYLINDER-CODE REPRESENTATION 1729
Fig. 1. Graphical representation of a cylinder: (a) minutiae involved and
(b) cell values: lighter areas represent higher values. Note that cylinder sections
in (b) are rotated according to the direction of minutia .
to the smoothed nature of the functions dening the con-
tribution of each minutia;
with a xed-length given by the total number of cells in the
cylinder.
Another advantage of the MCC representation is that each
cylinder can be treated as a feature vector obtained
by linearizing the cells of the cylinder corresponding to a
given minutia 1. Hence, from a template , a set of feature
vectors can be derived:
(1)
where is the feature vector obtained from the cylinder of
minutia and is the cylinder-set of template .Inthefol-
lowing, depending on the context, we will refer to or
interchangeably; because of the 1:1 relationship between them,
this exibility does not lead to ambiguities.
IV. MINUTIAE TEMPLATE RECONSTRUCTION STRATEGY
In this section we propose an attack strategy aimed at recon-
structing a minutiae template starting from a cylinder-set; this
is useful to evaluate the degree of nonreversibility of the MCC
representation.
Nagar and Jain introduced, in [27], a measure of nonre-
versibility (called Coverage-Effort curve) which quanties
the number of guesses an adversary should make to recover
a certain fraction of the original minutiae template. This ap-
proach is well suited for noninvertible transforms that map each
minutia independently of the others, while it is not adequate for
approaches mapping minutiae neighborhoods (such as MCC).
In fact, it would be computationally unfeasible to compute the
number of all minutiae neighborhoods that produce the same
(or very similar) cylinder. The proposed reconstruction strategy
1In the MCC representation proposed in [20], each cell value belongs to
. For simplicity, in the proposed protection approach all
invalid values are substituted with zero. Furthermore, while in the original
MCC templates spatial and directional information of each minutia is usually
included to allow global consolidation [20], the proposed protection approach
does not store such information in the templates (see also Section V-D).
Fig. 2. Minutiae neighborhood reconstruction of a cylinder. and are the
cylinder radius and the Euclidean distance between two points, respectively.
follows two steps: rst the minutiae neighborhood corre-
sponding to each cylinder is estimated; then the neighborhoods
are merged to form a single and consistent set of minutiae.
A. Reconstructing Neighborhood From Cylinder
The basic idea is to reverse the cylinder building pro-
cedure introduced in [20] by estimating position and di-
rection of each minutia from the values of the cells in the
cylinder. The algorithm in Fig. 2 allows to reconstruct a
set of minutiae starting from: i) a
cylinder and ii) a likelihood matrix computed by the
algorithm reported in Fig. 3. Notation and symbols are the
same introduced in [20]. In the algorithm reported in Fig. 3, for
each point inside the cylinder base, the likelihood of
nding a minutia with direction is calculated as the average
of the contributions of each cylinder cell whose spatial distance
from is less than . The contribution of the cell
is the product of: i) the spatial contribution that the center
of the cell (projected onto the cylinder’s base) gives to point
, ii) the directional contribution that the angle associated
to the cell (i.e., ) gives to direction , and iii) the cell
value . The algorithm in Fig. 2 creates minutiae
at local maxima of . To this purpose, it iteratively: i) nds
the maximum value of matrix ; ii) adds a new
minutia to set ;iii)sets and its
spatial and angular neighboring elements in to zero (to avoid
1730 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012
Fig. 3. Algorithm for calculating the likelihood matrix . , ,and
represent the cylinder radius, the center of the base cell with indices ,,and
the Euclidean distance between two points, respectively.
Fig. 4. Minutiae neighborhood reconstructed from the cylinder reported
in Fig. 1(b). Rounded and squared minutiae belong to the original and the
reconstructed neighborhood, respectively. The reconstruction is rather good:
minutiae locations are quite accurate and only two minutiae have been missed
(see top-left part).
selecting other elements of the same minutia neighborhood).
The algorithm ends when the current maximum is lower than a
threshold .
The parameters ( and )have
been tuned to maximize the average reconstruction accuracy on
atrainingset(asexplainedinSectionVI-D).
Fig. 4 shows the neighborhood reconstructed starting from
the cylinder reported in Fig. 1(b).
B. Neighborhood Merging
The algorithm in Fig. 5 combines the sets of minutiae recon-
structed from the cylinders into a single minutiae template. The
inputs are minutiae neighborhoods obtained, using algo-
rithm NRC (see Fig. 2), from the corresponding cylinders
Fig. 5. Minutiae template reconstruction of a set of minutiae neighborhoods.
in . Since all MCC cylinders are aligned with respect to their
central minutia, at the center of each neighborhood
there is always a minutia with direction [20]. The ratio-
nale behind this algorithm is that if two neighborhoods in the
original template are close enough, the central minutia of one
of them corresponds to a noncentral minutia in the other.
The algorithm works on a set of pairs ,
where is a set of noncentral minutiae and is the corre-
sponding set of central minutiae. Each is initialized with
the central minutia of a reconstructed neighborhood ,
then the algorithm starts an iterative merging procedure. At
each iteration it determines the best candidates and to
merge; merging and involves replacing corresponding
minutiae with their spatial- and directional-average, and leaving
unaltered noncorresponding ones. The merging procedure ter-
minates when all neighborhoods have been merged into a single
set, or when no more candidates are available for merging.
Finally, the reconstructed template is obtained as the union
of noncentral and central minutiae; if more sets are
still present (i.e., ) the neighborhood containing the
largest number of minutiae is chosen.
The algorithm in Fig. 5 is now described with more details:
at each iteration, for each pair of neighborhoods and ,all
possible alignments between noncentral minutia in and
central minutia in are considered, to nd the best minu-
tiae pairing according to score function MNS.MNS is dened as
(2)
where returns the set of minutiae obtained
by translating and rotating so that position and direction of
match those of .computes a sim-
ilarity score between minutiae in and (excluding
and , which have been used for the alignment).
The two candidates and are then merged into a single
neighborhood:
(3)
FERRARA et al.: NONINVERTIBLE MINUTIA CYLINDER-CODE REPRESENTATION 1731
The set of minutiae created by contains: i) for
each minutia paired to a minutia ,asingle
minutia obtained as the spatial and directional average of
and ; ii) any unpaired minutia in and . Note that,
in principle, unpaired minutiae belonging to the intersection
of the two neighborhoods may be considered as false minu-
tiae and discarded at this stage; on the other hand, they may
nd a good pairing at a following merging iteration. For this
reason unpaired minutiae are not removed during merging: for
each minutia, the algorithm counts the number of times it was
paired (pairing count) and the number of times it was inside
the intersection of two sets being merged (intersection count).
At the end of the merging iterations, a postprocessing proce-
dure, , discards any minutia whose ratio be-
tween its pairing count and its intersection count is lower than a
threshold . Other postprocessing techniques were tested
(e.g., selecting the same number of minutiae that were present
in the original unprotected template), but they lead to slightly
worse results.
Note that a template reconstructed by the algorithm in Fig. 5
may be oriented at any angle, since no information on the di-
rection of the central minutia of any cylinder is available in the
cylinder-set . For this reason, each reconstructed template
has been rotated according to a model tting technique taking
into account the direction of maximum variance of minutiae
positions and the conformance of minutia angles to a generic
arch-like shape in the upper part. Since recovering the exact
template rotation is not critical for this study, we do not provide
further details on this step. Parameter has been tuned to
maximize the average reconstruction accuracy on a training set
(as explained in Section VI-D). Fig. 7(b) shows the efcacy of
the proposed approach in reconstructing the minutiae template
reportedinFig.7(a).
V. PROTECTED MINUTIA CYLINDER-CODE (P-MCC)
To prevent attack strategies aimed at reversing cylinders into
their original minutiae neighborhoods (see Section IV) we pro-
pose a noninvertible function based on dimensionality reduc-
tion and binarization. The resulting protection scheme is called
P-MCC.
A. Binary-KL Transform
The noninvertible transform consists in a KL projection [28]
followed by a binarization step: in the following it is referred
to as Binary-KL ( -KL). This particular transform was chosen
since, in our preliminary experiments, it showed a good preser-
vation of cylinder distances in the transformed space even when
most of the original information is lost.
Let beasetof -dimen-
sional vectors, let and be their mean vector
and covariance matrix, and let and be the
eigenvalues and the eigenvectors of , respectively. Then, for
agiven ,let ,bethema-
trix whose columns are the eigenvectors corresponding to the
largest eigenvalues:
(4)
with .
The -KL projection of a vector is:
(5)
where
(6)
binarizes each element of vector by
means of the unit step function :
(7)
B. Cylinder Noninvertible Transform
Given the feature vector obtained from a cylinder ,
and the -KL parameters and , the noninvertible transform
encodes into a -dimensional binary
space. is simply dened as follows:
(8)
and can be computed ofine starting from a generic
dataset of ngerprint images (see Section VI-C).
Then, given the set of feature vectors derived from a minu-
tiae template (see (1)), the protected template is a set of
bit-vectors dened as:
(9)
C. The Similarity Between Two Protected Cylinders
Let and be the protected bit-vectors derived from two
cylinders and ; their similarity can be computed as:
(10)
where XOR denotes the bitwise-exclusive-or between two bit-
vectors, represents the 1-norm, and the length of the bit-
vectors. Note that the 1-norm of a bit-vector can be simply com-
puted as the population count (number of bits with value one).
The similarity is always in the range , where zero
means no similarity and one maximum similarity.
D. The Similarity Between Two Protected Templates
In order to compare two protected templates, a single value
denoting their overall similarity has to be obtained from the
local similarities between protected bit-vectors. It is worth
noting that a protected template contains only bit-vectors: the
spatial location and direction of the minutiae are not stored in
the template. For this reason global consolidation techniques
based on the relative placement of minutiae and directional
differences [20] cannot be adopted in this case.
According to some preliminary experiments, a simple but ef-
fective approach is the Local Greedy Similarity (LGS), origi-
nally proposed in [29] for nonprotected templates.
Given two protected templates and , the basic idea of
LGS is to calculate the global score as the average of the
bit-vector pairs with the largest similarity, but discarding pairs
that contains at least a bit-vector already selected. The value
1732 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012
Fig. 6. Information recovered from the cylinder in Fig. 1(b) (reported in the
top row), protected with (middle row) and (bottom row).
of is not an overall constant, but partially depends on the
number of bit-vectors in the two templates:
(11)
where and are parameters, and
denotes the rounding operator. The same parameters specied
in [29] have been used in this work, except for and
whose values have been tuned on a training dataset (see
Section VI-A) and set to 10 and 20, respectively.
E. From Protected to Unprotected Cylinders
InordertoapplytheattackstrategydescribedinSectionIV
to a protected template, one must rst attempt to recover the
unprotected cylinders. Let be a protected template:
assuming that the parameters of the KL transform used to en-
code are available (i.e., the mean vector , the eigenvectors
,andthe largest eigenvalues ), an attacker may apply the
following procedure to reconstruct, from each protected vector
, an approximation of the corresponding unprotected
vector .
1. The KL projection of is esti-
mated as :
(12)
2. is estimated as the KL back-projection of :
(13)
The rationale of the above procedure is that, under the as-
sumption that each component of follows a normal distri-
bution with zero mean and variance (i.e., ,
(12) estimates as . In fact, since the only
available information about (besides and )isitssign
(stored in bit , see (7)), can be estimated as the
expected value of a half-normal distribution
[30], with the sign given by .Fig.6showsa
graphical example of the result obtained with the above ap-
proach. It is evident that the reconstruction leads to a relevant
obfuscation of the original cell values, thus making the determi-
nation of minutiae positions quite hard (especially for ).
Fig. 7. Minutiae templates reconstructed using the attack strategy described in
Section IV: (a) the original template and (b) the reconstructed templates starting
from MCC and P-MCC templates with equal to (c) 128, (d) 64, (e) 32, and
(f)16.Black-andwhite-lled minutiae denote recovered and false minutiae,
respectively; missed minutiae are represented by cross symbols.
In Section VI-D the feasibility of cylinder reconstruction will
be numerically quantied.
VI. EXPERIMENTATION
This section describes the experiments carried out to evaluate
the nonreversibility and the accuracy of the new template pro-
tection technique; performance comparisons with other state-of-
the-art approaches are also reported.
A. Data Sets
Most of the published methods for ngerprint template pro-
tection have been evaluated on the four data sets of FVC2002
FERRARA et al.: NONINVERTIBLE MINUTIA CYLINDER-CODE REPRESENTATION 1733
TAB L E I
FOUR DATA SETS CONSIDERED AND TEMPLATE PROTECTION METHODS FOR
WHICH PUBLISHED RESULTS ARE AVAI L A B L E
[31]; each data set contains 800 ngerprints from 100 ngers
(8 impressions per nger). Table I reports template protection
approaches for which published results on FVC2002 data sets
are available.
Other data sets used in the following experiments are:
FVC2006 DB2 [36]: 1 680 ngerprints from 140 ngers.
FVC2006 DB2b [36]: 120 ngerprints from 10 ngers; this
separate dataset has been used to calibrate all the recon-
struction and matching parameters.
B. Minutiae Extraction and Creation of the Cylinders
A state-of-the-art minutiae extraction algorithm (developed
by one of the best-performing FVC2006 participants) has been
used to create ISO/IEC 19794-2 [37] minutiae templates from
all ngerprints of all data sets.
MCC descriptors have been derived from the minutiae tem-
plates as described in [20] and summarized in Section III: the
same parameters reported in [29] have been used to create all
the cylinders; in particular, each cylinder contains
cells (i.e., in Section V).
C. KL Space Computation
To evaluate the trade-off between biometric accuracy and
nonreversibility varying parameter (see Section V), four KL
subspaces, with , have been created. A set
of 5 799 minutia cylinders have been obtained from FVC2006
DB2b and used as a training set to compute and for each .
D. Nonreversibility Evaluation
Two experiments have been carried out on FVC2006 DB2 to
understand if the information recovered from the cylinders:
1. reveals minutiae information and then can compromise the
identity and the privacy of a user;
2. is useful to perform masquerade attacks against state-of-
the-art automatic ngerprint recognition systems (e.g., in-
jecting a reconstructed minutiae template in a communica-
tion channel).
TAB L E I I
MINUTIAE TEMPLATE RECONSTRUCTION PARAMETER VALUES
It is worth noting that the two experiments are consistent with
recent proposals of common criteria to evaluate the security of
biometric protection algorithms [38], [39].
The minutiae template reconstruction algorithm (see
Section IV) is controlled by six parameters:
,and . A systematic tuning has been
performed to choose optimal parameter values in order to
maximize the average reconstruction accuracy on FVC2006
DB2b. The values of ,and have been
optimized using unprotected cylinders and do not depend on ,
while parameters and have been tuned separately
for each value of . Table II summarizes the parameter values.
In the rst experiment, minutiae templates have been recon-
structed from MCC and P-MCC templates and compared to the
original ones. The following reconstruction accuracy indicators
have been computed:
RM: average percentage of correctly recovered minutiae
with respect to the number of minutiae in the original
template;
MM: average percentage of missed minutiae with respect
to the number of minutiae in the original template;
FM: the average percentage of false minutiae with respect
to the number of minutiae in the original template.
To compute the above indicators, each reconstructed template
has been aligned to the original one in order to maximize the
number of paired minutiae. Two minutiae have been considered
paired if and only if their spatial distance is less or equal to
12 pixels and their directional difference less or equal to ;
this is in line with typical thresholds used in minutiae matching
algorithms [22].
Table III reports the reconstruction accuracy indicators on
FVC2006 DB2 using the parameters reported in Table II. As
expected, the reconstruction strategy works well with MCC
templates, recovering most of the original minutiae (81.9%),
losing only 18.1% of the minutiae, and adding a small amount
of false minutiae (17.2%). However, by applying the recon-
struction strategy to P-MCC templates, the percentage of
missed and false minutiae rapidly increases as decreases. For
example, using P-MCC , 74.6% of the original minutiae are
missed (i.e., only 25.4% of them are correctly recovered) and
69.6% of false minutiae are added.
A further test has been performed to evaluate the accuracy of
the cylinder reconstruction algorithm (NRC) alone (see Fig. 2).
To this purpose, an additional information has been added to
the templates: the correspondence between each cylinder and
its central minutia in the original template. In this way it is pos-
sible to evaluate the reconstruction accuracy indicators on each
reconstructed neighborhood. Table IV reports the results: as ex-
pected, the reconstruction accuracy of individual cylinders is
higher than that reported in Table III for the whole template.
1734 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012
Fig. 8. Score distributions for the MCC-based system. Left and right graphs show attacks using reconstructed MCC and P-MCC templates, respectively.
TAB L E I II
RECONSTRUCTION ACCURACY ON
FVC2006 DB2 TEMPLATES
TAB L E I V
RECONSTRUCTION ACCURACY ON INDIVIDUAL
CYLINDERS IN FVC2006 DB2
TAB L E V
PERFORMANCE OF THE THREE REFERENCE SYSTEMS ON FVC2006 DB2
However it shall be noted that, even in this simplied (and unre-
alistic) case, the degree of protection is remarkable: for instance,
with , given 10 true minutiae, on the average only 4 are
correctly recovered (6 are not recovered) and 6 false minutiae
are added.
Fig. 7 shows an example of minutiae template reconstructed
from MCC (b) and P-MCC (c)–(f) templates. It is evident that
reconstruction from MCC is very good, while reconstruction
from P-MCC is generally very bad (except for where
the lower part of the ngerprint template is fairly reconstructed).
In the second experiment, as proposed in [40], two scenarios
have been considered: a reconstructed template is used to at-
tack i) the system that stores the original template (type-I at-
tack), or ii) other systems where another impression of the same
nger is enrolled (type-II attack). Both attack scenarios have
been evaluated on three reference ngerprint recognition sys-
tems: MCC (the MCC-based algorithm described in [29]), NIST
(the algorithm available in the NIST Biometric Image Software
(NBIS) v4.0 [41]), and VF (VeriFinger 6.5 by Neurotechnology
[42]). Each attack scenario has been evaluated under two se-
curity levels: i) medium-security, where the biometric verica-
tion threshold of each system has been set to 0.1% FMR [22];
ii) high-security, where the threshold of each system has been
TAB L E V I
PERCENTAGE OF SUCCESSFUL ATTACKS AGAINST THE THREE REFERENCE
SYSTEMS AT MEDIUM-SECURITY LEVEL ON FVC2006 DB2
TAB L E V II
PERCENTAGE OF SUCCESSFUL ATTACKS AGAINST THE THREE REFERENCE
SYSTEMS AT HIGH-SECURITY LEVEL ON FVC2006 DB2
set to 0% FMR. Table V reports the biometric verication per-
formance of the three reference systems at the EER and at the
operating points corresponding to the two security levels.
The attack simulations were performed on FVC2006 DB2
for both MCC and P-MCC templates. Each reconstructed tem-
plate was matched against all the twelve original templates of
the same nger, thus producing 1 680 and 18 480 type-I and
type-II attempts, respectively.
Tables VI and VII report the percentage of successful attacks
under medium- and high-security levels, respectively. Fig. 8
shows score distributions for the MCC-based reference system
when MCC and P-MCC templates are reconstructed: it is ev-
ident how, in the case of protected templates, match scores of
type I and II attacks are close to impostor scores, while with un-
protected templates, they are often close to genuine scores. The
results show that MCC templates are vulnerable, while P-MCC
is effective against such attacks. In particular P-MCC
are robust against type I and type II attacks at both security
levels, while P-MCC provides good protection only at high-
security level.
E. Evaluation of Verication Accuracy
The evaluation of biometric verication accuracy has been
carried out on all FVC2002 datasets and on FVC2006 DB2. Two
different protocols are used in the literature to report results of
template protection methods on FVC2002:
•TheoriginalFVC protocol—Each template is compared
against the remaining ones of the same nger to obtain
FERRARA et al.: NONINVERTIBLE MINUTIA CYLINDER-CODE REPRESENTATION 1735
TAB L E V III
VERIFICATION ACCURACY USING THE FVC PROTOCOL (PERCENTAGE VALUES)
TAB L E I X
VERIFICATION ACCURACY USING THE 1VS1PROTOCOL (PERCENTAGE VALUES)
the False Non Match Rate (FNMR). The rst template of
each nger is compared against the rst template of the
remaining ngers in the data set, to determine the False
Match Rate (FMR). If template is compared against ,
the symmetric comparison ( against ) is not executed,
to avoid correlation in the scores.
•The1vs1 protocol—The rst template of each nger is
compared against the second one of the same nger to ob-
tain the FNMR. The rst template of each nger is com-
pared against the rst template of the remaining ngers in
the data set, to determine the FMR.
Results using both the above protocols are reported, to allow
a fair comparison with the state-of-the-art. In case of failure to
process or match templates, the corresponding matching scores
are set to zero. The following performance indicators are con-
sidered [22], [43]: Equal-Error-Rate (EER), lowest FNMR for
%,andlowestFNMRfor %
.
Tables VIII and IX compare the verication accuracy of
P-MCC (for each value of ) to existing approaches (see
Table I) using FVC and 1vs1 protocol, respectively; only algo-
rithms for which published results are available are reported.
The two tables also report the results of the unprotected MCC
algorithm [29]. Note that two-factor authentication approaches
are not reported to avoid an unfair performance comparison
with single-factor techniques; the only two-factor approach
here considered is [25] because the authors also provide results
of the stolen-token scenario, thus allowing a direct comparison.
It is worth noting that:
•P-MCC is always the most accurate algorithm;
•P-MCC is better than all existing approaches, except for
one case (EER on FVC2002 DB1 in Table VIII);
•P-MCC is often better than existing approaches.
A comparison of the accuracy of P-MCC with the unprotected
MCC in Table VIII shows that, on the average, the EER is about
1.7 times worse for P-MCC , 2.9 times worse for P-MCC ,
and 6.2 for P-MCC .
VII. CONCLUSION
In this paper, a novel minutiae template protection scheme
(P-MCC) has been proposed. Parameter , controlling the
amount of dimensionality reduction before binarization, allows
to set the desired trade-off between security and accuracy.
In order to evaluate the degree of nonreversibility of P-MCC
and of the original MCC representation, an attack strategy has
been introduced and systematic experiments have been carried
out. The results show that, while MCC representation can be
quite-easily reverse-engineered (most of the original minutiae
can be correctly recovered), P-MCC offers a good protection
against disclosure of minutia information.
A second round of experiments has been carried out to
compare the biometric verication accuracy of P-MCC with
state-of-the-art algorithms, over ve datasets with two different
evaluation protocols.
Among the congurations evaluated, P-MCC is a good
trade-off between accuracy and security: it overcomes all
existing approaches except in a single case, and the amount
of information disclosed is quite limited (the chance that a
randomly selected minutia in a reversed template is real is
about 25%). Furthermore, with respect to the unprotected MCC
algorithm, P-MCC EER is just 2.9 times worse, which is a
remarkable result compared to the state-of-the-art.
It is worth noting that the proposed attack strategy is not
necessarily the most effective one. During its development we
also evaluated alternatives aimed at excluding unfeasible re-
constructed patterns; however, the particular dimensionality re-
1736 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 6, DECEMBER 2012
duction used tend to produce compressed vectors that, once
back-projected into the original space, have a smooth nature
(both in terms of spatial and direction contributions) and very
often resemble realistic portions of a minutia template. For this
reason we believe it is unlikely that the reconstructed pattern
can be signicantly improved by discarding unrealistic contri-
butions. On the other hand, instead of using an attack strategy
optimized on a whole dataset as here proposed, adapting the
strategy to a specic template (e.g., with hill-climbing methods)
could increase the success chances of a single attack.
WhilewebelievethatP-MCCadvances the state-of-the-art
of ngerprint template protection techniques, we recognize that
this approach is still far from being perfect and that relevant re-
search efforts are still necessary in this eld. In particular, our
future work will be devoted to: i) carrying out a more in-depth
theoretical study of P-MCC by evaluating the feasibility of var-
ious kinds of brute force attacks; ii) adding a user-specic secret
key to P-MCC to achieve diversity and revocability; iii) evalu-
ating other transformations to be applied to MCC descriptors;
iv) extending the proposed protection method to other biometric
traits.
REFERENCES
[1] A.K.Jain,K.Nandakumar,andA.Nagar, “Biometric template secu-
rity,” EURASIP J. Adv. Signal Process., vol. 8, no. 2, pp. 1–17, Jan.
2008.
[2] N.K.Ratha,J.H.Connell,andR.M.Bolle,“Enhancingsecurityand
privacy in biometrics-based authentication systems,” IBM Syst. J., vol.
40, no. 3, pp. 614–634, 2001.
[3] N.Ratha,S.Chikkerur,J.Connell,andR.M.Bolle,“Generatingcan-
celable ngerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 29, no. 4, pp. 561–572, Apr. 2007.
[4] C.Lee,J.Y.Choi,K.A.Toh,andS.Lee,“Alignment-freecance-
lable ngerprint templates based on local minutiae information,” IEEE
Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 4, pp. 980–992,
Aug. 2007.
[5] S. Tulyakov, F. Farooq, P. Mansukhani, and V. Govindaraju, “Sym-
metric hash functions for secure ngerprint biometric systems,” Pat-
tern Recognit. Lett., vol. 28, no. 16, pp. 2427–2436, Dec. 2007.
[6] S. Chikkerur, N. Ratha, J. Connell, and R. M. Bolle, “Generating reg-
istration-free cancelable ngerprint templates,” in Proc.Int.Conf.Bio-
metrics: Theory, Applications and Systems (BTAS 08), 2008, pp. 1–6.
[7] D. Ahn, S. G. Kong, Y. S. Chung, and K. Y. Moon, “Matching with
secure ngerprint templates using non-invertible transform,” in Proc.
Image and Signal Processing (CISP’08), 2008, pp. 29–33.
[8] G. Kumar, S. Tulyakov, and V. Govindaraju, “Combination of sym-
metric hash functions for secure ngerprint matching,” in Proc. 20th
Int. Conf. Pattern Recognition (ICPR), Istanbul, 2010, pp. 890–893.
[9] A. Nagar, S. Rane, and A. Vetro, “Alignment and bit extraction for
secure ngerprint biometrics,” in Proc. Media Forensics and Security,
San Jose, CA, 2010.
[10] J. Zhe and A. T. B. Jin, “Fingerprint template protection with minutia
vicinity decomposition,” in Proc. Int. Conf. Biometrics (IJCB 2011),
Washington, DC, 2011.
[11] A. T. B. Jin, D. N. C. Ling, and A. Goh, “Biohashing: Two factor au-
thentication featuring ngerprint data and tokenised random number,”
Pattern Recognit., vol. 37, no. 11, pp. 2245–2255, 2004.
[12] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate
strong keys from biometrics and other noisy data,” in Proc. Int. Conf.
Cryptology (EUROCRYPT 04), 2004, pp. 523–540.
[13] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors:
How to generate strong keys from biometrics and other noisy data,”
SIAM J. Comput., vol. 38, no. 1, pp. 97–139, 2008.
[14] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc.
ACM Conf. Computer and Communications Security, 1999, pp. 28–36.
[15] A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proc. Int. Symp.
Information Theory, 2002, p. 408.
[16] K. Nandakumar, A. K. Jain, and S. Pankati, “Fingerprint-based fuzzy
vault: Implementation and performance,” IEEE Trans. Inf. Forensics
Security, vol. 2, no. 4, pp. 744–757, Dec. 2007.
[17] A. Nagar, K. Nandakumar, and A. K. Jain, “Securing ngerprint tem-
plate: Fuzzy vault with minutiae descriptors,” in Proc. 19th Int. Conf.
Pattern Recognition (ICPR 2008), 2008, pp. 1–4.
[18] P. Li et al., “An alignment-free ngerprint cryptosystem based on fuzzy
vault scheme,” J. Netw. Comput. Applicat., vol. 33, no. 3, pp. 207–220,
May 2010.
[19] BioLab., FVC-onGoing Web Site, Jan. 2012 [Online]. Available: http://
biolab.csr.unibo.it/fvcongoing
[20] R. Cappelli, M. Ferrara, and D. Maltoni, “Minutia Cylinder-Code: A
new representation and matching technique for ngerprint recogni-
tion,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 12, pp.
2128–2141, Dec. 2010.
[21] J. Feng and J. Zhou, “A performance evaluation of ngerprint minutia
descriptors,” in Proc. Int. Conf. Hand-Based Biometrics (ICHB),Hong
Kong, 2011.
[22] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fin-
gerprint Recognition, 2nd ed. New York: Springer-Verlag, 2009.
[23] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and
cancelable biometrics,” EURASIP J. Inf. Security, pp. 1–25, 2011.
[24] B. Yang, D. Hartung, K. Simoens, and C. Busch, “Dynamic random
projection for biometric template protection,” in Proc.FourthIEEE
Int. Conf. Biometrics: Theory Applications and Systems (BTAS), 2010,
pp. 1–7.
[25] B. Yang, C. Busch, P. Bours, and D. Gafurov, “Robust minutiae hash
for ngerprint template protection,” in Proc. Media Forensics and Se-
curity II, 2010, p. 75410.
[26] B. Yang and C. Busch, “Parameterized geometric alignment for minu-
tiae-based ngerprint template protection,” inProc. IEEE 3rd Int. Conf.
Biometrics: Theory, Applications and Systems (BTAS 09), 2009, pp.
340–345.
[27] A. Nagar and A. K. Jain, “On the security of non-invertible ngerprint
template transforms,” in Proc. 1st IEEE Int. Workshop on Information
Forensics and Security (WIFS), 2009, pp. 81–85.
[28] K. Fukunaga, Statistical Pattern Recognition. San Diego: Academic,
1990.
[29] R. Cappelli, M. Ferrara, D. Maltoni, and M. Tistarelli, “MCC: A base-
line algorithm for ngerprint verication in FVC-onGoing,” in Proc.
11th Int. Conf. Control, Automation, Robotics and Vision (ICARCV),
Singapore, 2010.
[30] E. W. Weisstein, Half-Normal Distribution Apr. 2012 [Online]. Avail-
able: http://mathworld.wolfram.com/Half-NormalDistribution.html
[31] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain,
“FVC2002: Second ngerprint verication competition,” in Proc. Int.
Conf. Pattern Recognition, 2002, vol. 16, pp. 811–814.
[32] T. E. Boult, W. J. Scheirer, and R. Woodworth, “Revocable ngerprint
biotokens: Accuracy and security analysis,” in Proc. IEEE Conf. Com-
puter Vision and Pattern Recognition (CVPR), 2007, pp. 1–8.
[33] H. Yang, X. Jiang, and A. C. Kot, “Generating secure cancelable n-
gerprint templates using local and global features,” in Proc. IEEE Int.
Conf. Computer Science and Information Technology (ICCSIT 2009),
2009, pp. 645–649.
[34] B. Yang, C. Busch, P. Bours, and D. Gafurov, “Non-invertible geo-
metrical transformation for ngerprint minutiae template protection,”
in Proc. 1st Int. Workshop on Security and Communication Networks
(IWSCN), 2009, pp. 1–7.
[35] T. Ahmad, J. Hu, and S. Wang, “Pair-polar coordinate-based cance-
lable ngerprint templates,” Pattern Recognit., vol. 44, no. 10–11, pp.
2555–2564, 2011.
[36] R. Cappelli, M. Ferrara, A. Franco, and D. Maltoni, “Fingerprint veri-
cation competition 2006,” Biometric Technol. Today, vol. 15, no. 7-8,
pp. 7–9, Aug. 2007.
[37] Information Technology—Biometric Data Interchange Formats—Part
2: Finger Minutiae Data, ISO/IEC 19794-2:2005, 2005.
[38] K. Simoens et al., “Criteria towards metrics for benchmarking template
protection algorithms,” in Proc. 5th IAPR Int. Conf. Biometrics (ICB
2012), New Delhi, 2012, pp. 498–505.
[39] J. Breebaart, C. Busch, J. Grave, and E. Kindt, “A reference architec-
ture for biometric template protection based on pseudo identities,” in
Proc. BIOSIG 2008, Special Interest Group on Biometrics and Elec-
tronic Signatures, Darmstadt, Germany, 2008.
[40] J. Feng and A. K. Jain, “Fingerprint reconstruction: From minutiae to
phase,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 2, pp.
209–223, Feb. 2011.
[41] NIST Biometric Image Software NIST, Apr. 2012 [Online]. Available:
http://www.nist.gov/itl/iad/ig/nbis.cfm
[42] Neurotechnology Web Site, Neurotechnology Inc., Apr. 2012 [Online].
Available: http://www.neurotechnology.com/
[43] R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, “Per-
formance evaluation of ngerprint verication systems,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3–18, Jan. 2006.
FERRARA et al.: NONINVERTIBLE MINUTIA CYLINDER-CODE REPRESENTATION 1737
Matteo Ferrara received the Ph.D. degree from the
Department of Electronics, Computer Science and
Systems (DEIS), University of Bologna. He received
the bachelor’s degree cum laude in computer science
from the University of Bologna (March 2004), and
the Master’s degree cum laude in October 2005.
During his Ph.D. studies, which he completed in
2009, he worked on Biometric Fingerprint Recog-
nition Systems. Today he is an assistant teacher in
Computer Architectures and Pattern Recognition
courses at the faculty of Computer Science, Uni-
versity of Bologna, and he is a member of the Biometric System Laboratory,
Cesena, Italy. His research interests include image processing, pattern recog-
nition, biometric systems (ngerprint recognition, performance evaluation of
biometric systems, ngerprint scanner quality, and face recognition), informa-
tion security, and smart card.
Davide Maltoni (M’05) is an Associate Professor
at the Department of Electronics, Informatics and
Systems (DEIS), University of Bologna. He teaches
“Computer Architectures” and “Pattern Recogni-
tion” in Computer Science, University of Bologna,
Cesena. His research interests are in the area of
Pattern Recognition and Computer Vision. He is
active in the eld of Biometric Systems (ngerprint
recognition, face recognition, hand recognition,
performance evaluation of biometric systems). He
is codirector of the Biometric Systems Laboratory,
Cesena, Italy, which is internationally known for its research and publications
in the eld. He is author of two books: Biometric Systems, Technology, Design
and Performance Evaluation (Springer, 2005) and Handbook of Fingerprint
Recognition (Springer, 2003; II edition 2009), for which received the PSP
award from the Association of American Publishers.
Raffaele Cappelli (M’09) received the Laurea de-
gree cum laude in computer science from the Univer-
sity of Bologna, Cesena, Italy, in 1998. In 2002, he re-
ceived the Ph.D. degree in computer science and elec-
tronic engineering at DEIS, University of Bologna.
He is an Associate Researcher at the University of
Bologna, Italy. He teaches “Pattern Recognition” at
Computer Science, and he is a member of the Bio-
metric System Laboratory, University of Bologna,
Cesena, Italy. His research interests include pattern
recognition, image retrieval by similarity, and bio-
metric systems (ngerprint classication and recognition, synthetic ngerprint
generation, ngerprint aliveness detection, ngerprint scanner quality, face
recognition, and performance evaluation methodologies).
... However, its invertibility makes it insecure. A non-invertible transformation with secure MCC was proposed by Ferrara et al. [16] by adding a random distortion to the cylindrical coordinates. Moujahdi et al. [17] developed a shell shaped structure from a fingerprint template. ...
Article
Full-text available
In digital identification technologies, fingerprint-based biometric systems are extensively utilized for authentication. Fingerprint authentication systems usually store the original minutiae points as user templates in the database which consist of minutiae bifurcation and ridge end points. Storing original minutiae points in the database can create a potential security risk to a person’s identity. An adversary might attack the database and compromise the user template. Various studies have demonstrated the feasibility of reconstructing the original fingerprint by utilizing the minutiae points. Existing research methods still need to be improved, and therefore, it is essential to provide security and robustness to fingerprint-based biometric systems. In this paper, a novel template protection technique using non-invertible transformation is proposed to create a secure and robust template. The transformation function uses the original minutiae positions, orientation details, and user key set values. The results demonstrated equal error rates of 1.5%, 0.85%, and 2.71% for the FVC2002 DB1, DB2, and DB3 fingerprint databases. The proposed method has demonstrated noteworthy performance improvement compared to other notable contributions. The outcome of the proposed method demonstrates practicality and effectiveness.
... Towards evaluating the improvement in matching performance, we compare cumulative matching characteristics (CMC) curves for latent fingerprints and average equal error rate (EER) for both the rural Indian fingerprint databases. Standard fingerprint matching tools, Bozorth [42] and MCC [3,4,11] are used to perform fingerprint matching. Figure 5 contrasts state-of-the-art fingerprint denoising algorithms with DA-GAN. ...
Article
Full-text available
State-of-the-art fingerprint recognition systems perform far from satisfactory on noisy fingerprints. A fingerprint denoising algorithm is designed to eliminate noise from the input fingerprint and output a fingerprint image with improved clarity of ridges and valleys. To alleviate the unavailability of annotated data to train the fingerprint denoising model, state-of-the-art fingerprint denoising models generate synthetically distorted fingerprints and train the fingerprint denoising model on the synthetic data. However, a visible domain shift exists between synthetic training data and the real-world test data. Subsequently, state-of-the-art fingerprint denoising models suffer from poor generalization. To counter this drawback of state-of-the-art, this research proposes to align the synthetic and real fingerprint domains. Experiments conducted on publicly available rural Indian fingerprint demonstrate that after the proposed domain alignment, equal error rate improves from 7.30 to 6.10 on Bozorth matcher and 5.96 to 5.31 on minutiae cylinder code (MCC) matcher. Similar improved fingerprint recognition results are obtained for IIITD-MOLF and private rural fingerprints database as well.
Article
Full-text available
The wide deployment of biometrics has prompted enormous security and privacy concerns regarding biometric template protection. Cancellable biometrics is one of the most representative countermeasures that maps a biometric feature vector into its protected template non-invertible yet replaceable when the previously transformed template is compromised. This paper proposes a two-stage cancellable biometric scheme on top of the Index-of-Maximum (IoM) hashing, dubbed Random Sparse Binary Encoded IoM (RSBE-IoM) hashing. Unlike the vanilla IoM hashing that operates only on the first-ranked feature indices, the RSBE-IoM hashing employs the first and the second-ranked features for additional discriminability gain. We also devise an instance-specific Random Sparse Binary (RSB) encoder to project the IoM-hashed vectors (both first and second-ranked) into a random sparse binary bitstring. We also introduce an instance-specific seeding mechanism to the RSB encoder such that a one-time seed is generated on the fly and not physically cached upon enrolment. We comprehensively evaluate the proposed RSBE-IoM scheme with six fingerprint benchmark datasets, i.e., DB 1 to 3 for each FVC 2002 and FVC 2004. In addition to accuracy performance, our discussions cover other important perspectives, including computational cost, biometric template protection criteria, and privacy and security concerns.
Article
Latent palmprints represent crucial forensic evidence in criminal investigations, necessitating their storage in governmental databases. The identification of corresponding palmprints within large-scale databases using an automated palmprint identification system (APIS) is time-consuming and computationally intensive. To address this challenge, this paper introduces an innovative approach: delineating the region of interest (ROI) for palmprint segmentation and presenting a novel indexing algorithm founded on minutiae and the orientation field (OF). Additionally, a novel feature vector is proposed, leveraging minutiae triplets and ellipse properties, marking the pioneering algorithm to consider minutiae importance in palmprint indexing. Significantly, an improved version of an existing palmprint indexing algorithm tailored for latent palmprints is introduced. The study demonstrates the indexing and retrieval of both our feature vectors and those obtained by the improved palmprint indexing algorithm, using two clustering algorithms and locality-sensitive hashing (LSH). The method's robustness is evaluated across three diverse databases with extensive palmprint records. The experimental results underscore the superior performance of our approach compared to current state-of-the-art algorithms.
Article
Cancelable biometrics are a group of techniques to transform the input biometric to an irreversible feature intentionally using a transformation function and usually a key in order to provide security and privacy in biometric recognition systems. This transformation is repeatable enabling subsequent biometric comparisons. This paper introduces a new idea to be exploited as a transformation function for cancelable biometrics aimed at protecting templates against iterative optimization attacks. Our proposed scheme is based on time-varying keys (random biometrics in our case) and morphing transformations. An experimental implementation of the proposed scheme is given for face biometrics. The results confirm that the proposed approach is able to withstand leakage attacks while improving the recognition performance.
Article
Full-text available
Fingerprint recognition is widely used in daily life. However, the physiological phenomena of human can still fail recognition under dry and low temperature conditions.We present two main approaches for enhancing the accuracy of fingerprint recognition systems in cases of dry fingerprints. The first approach is an image enhancement algorithm with multiple training stages (MTS) for fingerprints at low temperatures, which aims to restore low quality fingerprints to normal quality. The second method is a Cycled Contrastive Ridge Generative Adversarial Network (CCRGAN) learning framework for synthesizing enrolled templates, aimed at improving the accuracy of low-temperature fingerprint matching in authentication systems. For FVC2002 dataset, we have achieved 0.05% for EER on DB1A, which is better than 0.09% for [1] and 0.18% for [2] on the MTS algorithm. After adding CCRGAN pseudo low fingerprint, the EER is improved to 0.0009%. As for inference time, our inference time is about 83 times faster than [3] on the FVC2002 DB3B.
Conference Paper
Full-text available
Minutia vicinity representation was recently proposed by Yang & Busch to generate a protected fingerprint template scheme [14], the resultant protected template enjoys good accuracy and free from alignment. However, Yang and Busche 's scheme is highly likely reversible [18]. This paper proposed a new minutiae representation technique known as Minutia Vicinity Decomposition (MVD) whereby each minutia vicinity is decomposed into four minutia triplets. A set of geometrical invariant features can be extracted from the minutia triplet to construct a fingerprint template. The invariant features with random offsets salting mechanism enhance the reversibility, revocability as well as performance accuracy of the resultant protected fingerprint template. Promising experimental results on FVC2002 DB2 justify the feasibility of our proposed technique.
Article
Full-text available
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms for biometric-dependent key-release. In the last years a significant amount of approaches to both technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Conference Paper
Traditional criteria used in biometric performance evaluation do not cover all the performance aspects of biometric template protection (BTP) and the lack of well-defined metrics inhibits the proper evaluation of such methods. Previous work in the literature focuses, in general, on a limited set of criteria and methods. This paper provides the first holistic approach to the evaluation of biometric template protection that is able to cover a whole range of methods. We present a selection of well-defined criteria and some metrics that are compliant with the reference architecture for template protection as defined in the recently adopted standard ISO/IEC 24745 (2011), which is applicable to nearly all known BTP methods. The criteria have been grouped in three categories of performance: technical, protection, and operational.
Article
Minutiae-based matching method is the most widely used fingerprint matching method and most minutiae matching algorithms employ minutia descriptors of certain type. A good minutia descriptor should be distinctive and at the same time robust in difficult situations, i.e., noise, occlusion and plastic distortion. Many different minutia descriptors have been proposed in the literature, which can be coarsely classified into three categories: image-based, texture-based, and minutia-based. These descriptors have not been evaluated systematically. In this paper, seven different descriptors are evaluated according to local matching accuracy for four types of fingerprint pairs: good quality, poor quality, small common region, and large plastic distortion. Experimental results show that the texture-based descriptor and Minutia Cylinder-Code (MCC) are the two most accurate descriptors. In the case of small common region, texture-based descriptor ranks first, while in the rest three cases, MCC is the most accurate one.
Article
The interest in fingerprint-based biometric systems has constantly grown in recent years and considerable efforts have been focused by both academia and industry on the development of new algorithms for fingerprint recognition. Raffaele Cappelli, Matteo Ferrara, Annalisa Franco and Davide Maltoni of the Biometric System Laboratory at the University of Bologna explain the findings of the Fingerprint Verification Competition 2006.