Cylindrical Curve for Contactless Fingerprint Template Securisation

Cylindrical Curve for Contactless Fingerprint Template Securisation

Boris Jerson Zannou, Tahirou Djara, Antoine Vianou
Copyright: © 2022 |Pages: 28
DOI: 10.4018/IJISP.303664
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

large quantity of biometric models has rapidly proliferated in biometric applications. Due to the fact that biometric systems expose users to enormous risks that endanger , we improved an existing technics technique and adapted it to the contactless system. The proposed model, in this article, propose a very secure fingerprint model protection technique in which a cylindrical curve is generated as a user secure model for a contactless fingerprint. During the construction of our model, we use three invariants intra-personals characteristics, namely the set of distances between the detailed points and the center of mass, the orientation information of the detailed points and the number of endings between the minutiae points and the singular point. The results of the experimental analysis performed on the FVC databases (2000, 2002 and 2004) and our own database show a highly encouraging performance and present the viability of the proposed technique.
Article Preview
Top

1. Introduction

Biometrics identifies human characteristics and traits. The fingerprint remains the most used characteristic during human authentication because it works well and is unique. The minutiae are the most adopted representation. Although minutiae are the most adopted representation, it is exposed to several dangers that several researches have proven. The architecture of the figure 2 gives several types of attacks. The literature reviews vulnerabilities and attacks against a biometric system are described in several ways and based on the opinion of several authors in (Ratha et al, 2001; Ratha et al, 2003;Cukik et al, 2005; Adler et al, 2005; Jain et al, 2006; Roberts et al, 2008; Jain et al, 2008) . Eight levels of attacks have been identified, namely:

Figure 1.

Secured contactless cylindrical fingerprint template generation

IJISP.303664.f01
Figure 2.

Fish bone model to categorize vulnerabilities of fingerprints template

IJISP.303664.f02
  • ü Presentation attacks: fingerprints are presented at the entrances after having reproduced them;

  • ü hacking and use of fingerprint data after bypassing the sensor;

  • ü Usurped features are substituted for the original;

  • ü Tampering with the correspondence module to use false functionality;

  • ü Data replay attacks;

  • ü Replacement of the characteristics module by a trojan horse;

  • ü Spying on the channel between the feature extraction module and the classifier by an opponent in order to record the original model and replay it.

Each attack is dependent on a set of resources and constraints which makes it possible to classify it according to its acuity or its severity. The attack on the fingerprint templates stored in the comparison module, should be considered a major threat to authentication systems and one of the most formidable attacks against fingerprint-based authentication systems digital.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing