Fingerprint Image Hashing Based on Minutiae Points and Shape Context

Fingerprint Image Hashing Based on Minutiae Points and Shape Context

Sani M. Abdullahi, Hongxia Wang, Asad Malik
DOI: 10.4018/978-1-7998-3025-2.ch034
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Fingerprint minutiae is the unique representation of fingerprint image feature points as terminations and bifurcations. Therefore, generating a hash signature from these feature points will unarguably meet the desired properties of a robust hash signature and which will accurately fit in for fingerprint image content authentication purposes. This article proposes a novel minutiae and shape context-based fingerprint image hashing scheme. Fingerprint image minutiae points were extracted by incorporating their orientation and descriptors, then embedded into the shape context-based descriptors in order to generate a unique, compact, and robust hash signature. The robustness of the proposed scheme is determined by performing content preserving attacks, including noise addition, blurring and geometric distribution. Efficient results were achieved from the given attacks. Also, a series of evaluations on the performance comparison between the proposed and other state-of-art schemes has proven the approach to be robust and secure, by yielding a better result.
Chapter Preview
Top

1. Introduction

Since the discovery of biometrics, fingerprint image biometric remains the most versatile, prominent and reliable form of individual authentication in comparison to other biometric techniques. The unique sufficient details that aid in this human identification lies within the minutiae feature points which are the terminations and bifurcations of ridges and valleys in the texture pattern of the fingerprint image (Anil, Arun, & Karthik, 2011). The distribution of this patterns is unique in every individual and on each separate finger, hence the reason it is primarily used for collective fingerprint image identification and verification.

It motivates us to know that the distribution of minutiae points composes the main content structure of fingerprint images. Therefore, embedding these feature points as well as their orientation descriptor into the shape context descriptor is eventually feasible in generating a compact, robust and secure hash signature. Also, our proposed hashing scheme will have a better role to play in cases of multimedia authentication where fingerprint image needs to be verified before permission or access is granted. In the current prevailing literatures, such as in (Wang, Li, & Qiu, 2013), (Schmidt, Sharifi, & Moreno, 2014) and (Aravablumi, Chenna, & Reddy, 2010), researchers make use of the generic hashing algorithm for such multimedia authentication which eventually has limited robustness, security and discriminative capability. Therefore, our proposed approach is a welcome contribution into the realm of fingerprint hashing for multimedia authentication purposes.

Image hashing plays so many important roles in the field of multimedia security, including content identification and authentication (Tang, Wang, Zhang, Wei & Su, 2008), image retrieval (Tang, Wang, Zhang, & Wei, 2011a), tampering detection (Tang, Dai, & Zhang, 2012), digital watermarking (Zhu, Huang, Kwong, & Yang, 2010) and image registration (Chuan, Xueqin, Dengpan, Jinwei & Xingming, 2016). In our scheme, we use it for fingerprint image authentication (identification and/or verification) by compressing the minutiae features into a compact hash and matching the hash during the authentication stage. All desirable properties of image hashing function, i.e. compactness, perceptual robustness, visual fragility, unpredictability and One-way function, randomness and security (Wang et al., 2015) were put into consideration in the process of generating a hash signature.

Some of the early researchers in the area of fingerprint minutiae hashing includes (Tulyakov, Farooq, Mansukhani, & Govindaraja, 2007), (Kumar, Tulyakov, & Govindaraja, 2010) and (Tulyakov, Farooq, & Govindaraja, 2005), they all proposed the use of symmetric hash functions and its combinations for the purpose of securing the fingerprint feature during identification and/or verification. Even with their astounding contribution in this area, their schemes are not robust enough as compared to current state-of-art schemes.

Recently, a prominent approach was introduced by Lv & Wang, (2012). In their scheme, they proposed a SIFT Harris detector by using it to select the most stable key points, thereby employing their proposed shape context approach to embed the detected local key points and their corresponding descriptors. Their work provides an outstanding contribution to the area of image hashing using shape context and local feature points.

Complete Chapter List

Search this Book:
Reset