Skip to main content

Advertisement

Log in

Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment

  • Applications
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy third-party in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Biometrics Market and Industry Report 2006–2010. International Biometric Group, http://www.biometricsgroup.com.

  2. Biometric Systems Lab, Pattern Recognition and Image Processing Laboratory, Biometric Test Center. http://bias.csr.unibo.it/fvc2004/.

  3. Biometric Systems Lab, Pattern Recognition and Image Processing Laboratory, Biometric Test Center. http://bias.csr.unibo.it/fvc2006/.

  4. O’Gorman L. Fingerprint verification. Biometrics: Personal Identification in a Networked Society. Jain A K, Bolle R et al. (eds.), Kluwer Academic Publishers, 1999, pp. 43–64.

  5. Shen L L, Kot A, Koo W M. Quality measures of fingerprint images. In Proc. 1st Audio- and Vedio-Based Person Authentication, Halmstad, Sweden, 2001, pp. 266–271.

  6. Shi Z C, Wang Y C, Qi J, Xu K. A new segmentation algorithm for low quality fingerprint image. In Proc. 3rd Int. Conf. Image and Graphics, Hong Kong, China, Dec. 18–20, 2004, pp. 314–317.

  7. Gu J W, Zhow J. Model-based orientation field estimation for fingerprint recognition. In Proc. IEEE Conference on Image Processing, Barcelona, Spain, 2003, pp. 899–903.

  8. Lin H, Wan Y, Jain A K. Fingerprint image enhancement: Algorithm and performance evaluation. IEEE Trans. Pattern Anal. Machine Intell., 1998, 20(8): 777–789.

    Article  Google Scholar 

  9. Yang J W, Liu L F, Jiang T Z, Fan Y. A modified Gabor filter design method for fingerprint image enhancement. Pattern Recognition, 2003, 24: 1805–1817.

    Article  Google Scholar 

  10. Zhu E, Yin J P, Zhang G M. Fingerprint enhancement using circular Gabor filter. In Proc. 1st Int. Conf. Image Analysis and Recognition, Porto, Portugal, 2004, pp. 750–758.

  11. Mohammad A U K, Mohammad K K, Mohammad A K. Fingerprint image enhancement using decimation-free directional filter bank. Info. Tech. Journal, 2005, 4(1): 16–20.

    Article  MathSciNet  Google Scholar 

  12. Xie M H, Wang Z M. Fingerprint enhancement based on edge-direct diffusion. In Proc. 3rd International Conference on Image and Graphics, Hong Kong, China, 2004, pp. 274–277.

  13. Weickert J. A review of nonlinear diffusion filtering in scale-space theory in computer vision. Lecture Notes in Computer Science 1252, Springer-Verlag, 1997, pp. 3–28.

  14. Gilboa G, Zeevi Y Y, Sochen N A. Forward and backward diffusion processes for adaptive image enhancement denoising. IEEE Trans. Image Processing, 2002, 11(7): 689–703.

    Google Scholar 

  15. Willis A J, Myers L. A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips. Pattern Recognition, 2001, 34(2): 255–270.

    Article  MATH  Google Scholar 

  16. Zhu G C, Zhang C. A top-down fingerprint image enhancement method based on Fourier analysis. In Proc. 5th Chinese Conf. Biometric Recognition, Guangzhou, China, 2004, p.439.

  17. Bazen A M, Gerez S H. Elastic minutiae matching by means of thin-plate spline models. In Proc. Int. Conf. Pattern Recognition, Quebec, Canada, Aug. 11–15, 2002, pp. 985–988.

  18. Chen H, Tian J, Yang X. Fingerprint matching with registration pattern inspection. In Proc. 2nd Auido- and Vedio-Based Person Authentication, Guildford, UK, 2003, pp. 327–334.

  19. Ratha N K, Bolle R M. Effect of controlled acquisition on fingerprint matching. In Proc. 14th Int. Conf. Pattern Recognition, Brisbane, Australia, Aug. 17–20, 1998, pp. 1659–1661.

  20. Dorai C, Ratha N, Bolle R. Detecting dynamic behavior in compressed fingerprint videos: Distortion. In Proc. IEEE Conf. Computer Vision and Pattern Recognition, Hilton Head Island, USA, 2000, pp. 2320–2326.

  21. Cappelli R, Maio D, Maltoni D. Modelling plastic distortion in fingerprint images. In Proc. Int. Conf. Advances in Pattern Recognition, Rio de Janeiro, Brazil, March 11–14, 2001, pp. 369–376.

  22. Lee D, Choi K, Kim J. A robust fingerprint matching algorithm using local alignment, In Proc. Int. Conf. Pattern Recognition, Quebec, Canada, Aug. 11–15, 2002, pp. 803–806.

  23. Senior A, Bolle R. Improved fingerprint matching by distortion removal. IEICE Trans. Inf. and Syst., Special Issue on Biometrics, 2001, E84-D(7): 825-831.

    Google Scholar 

  24. Watson C, Grother P, Cassasent D. Distortion-tolerant filter for elastic-distorted fingerprint matching. In Proc. SPIE Optical Pattern Recognition, Orlando, USA, April 26, 2000, pp. 166–174.

  25. Vajna Z M K. A fingerprint verification system based on triangular matching and dynamic time warping, IEEE Trans. Pattern Anal. Machine Intell., 2000, 22(11): 1266–1276.

    Article  Google Scholar 

  26. Bazen A M, Gerez S H. Fingerprint matching by thin-plate spline modelling of elastic deformations. Pattern Recognition, 2003, 36(8): 1859–1867.

    Article  Google Scholar 

  27. Ross A, Dass S, Jain A K. A deformable model for fingerprint matching. Pattern Recognition, 2005, 38(1): 95–103.

    Article  Google Scholar 

  28. Chen X J, Tian J, Yang X. A new algorithm for distorted fingerprints matching based on normalized fuzzy similarity measure. IEEE Trans. Image Processing, 2006, 15(3): 767–776.

    Google Scholar 

  29. He Y L, Tian J. Fingerprint matching based on global comprehensive similarity. IEEE Trans. Pattern Anal. Machine Intell., 2006, 28(6): 850–862.

    Article  Google Scholar 

  30. Chen X J, Tian J, Yang X. An algorithm for distorted fingerprint matching based on local triangle features set. IEEE Trans. Info., Forensics and Security, 2006, 1(2): 169–177.

    Article  MATH  Google Scholar 

  31. FpVTE 2003. http://fpvte.nist.gov/.

  32. Soutar C, Roberge D, Stoianov A et al. Biometric Encryption. ICSA Guide to Cryptography, McGrow-Hill, 1999.

  33. Clancy T C, Kiyavash N, Lin D J. Secure smart card-based fingerprint authentication. In Proc. 2003 ACM SIGMM Workshop on Biometrics Methods and Application, Berkley, CA, 2003, pp. 45–52.

  34. Juels A, Sudan M. A fuzzy vault scheme. In Proc. IEEE International Information Theory Symp., Lausanne, Switzerland, 2002, p.480.

  35. Uludag U, Pankanti S, Jain A K. Fuzzy vault for fingerprints. In Proc. 5th Audio- and Video-Based Biometric Person Authentication, New York, USA, 2005, pp. 310–319.

  36. Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. IEEE Trans. Computers, 2006, 55(9): 1081–1088.

    Article  Google Scholar 

  37. Goh A, Ngo D C L. Computation of cryptographic keys from face biometrics. Lecture Notes in Computer Science 2828, Lioy A, MazzocchiIto D (eds.), Springer-Verlage, 2003, pp. 1–13.

  38. Monrose F, Reiter M K, Li Q, Wetzel S. Cryptographic key generation from voice. In Proc. 2001 IEEE Symposium on Security and Privacy, Oakland, CA, 2001, pp. 202–213.

  39. Hao F, Chan C W. Private key generation from on-line handwritten signatures. Information Management & Computer Security, 2002, 10(2): 159–164.

    Google Scholar 

  40. Monrose F, Reiter M K, Wetzel R. Password hardening based on keystroke dynamics. In Proc. 6th ACM Conf. Computer and Communications Security, Singapore, 1999, pp. 73–82.

  41. Dodis Y, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Lecture Notes in Computer Science 3027, Cachin C, Camenisch J (eds.), Springer-Verlag, 2004, pp. 523–540.

  42. Jin A T B, Ling D N C, Goh A. BioHashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 2004, 37: 2245–2255.

    Article  Google Scholar 

  43. Liu M H, Jiang X D, Kot A C. Fingerprint reference-point detection. EURASIP J. Applied Signal Processing, 2005, 4: 498–509.

    Google Scholar 

  44. Jain A K, Ross A, Pankanti S. Biometrics: A tool for information security. IEEE Trans. Information Forensics and Security, 2006, 1(2): 125–143.

    Article  Google Scholar 

  45. Li L, Tian J, Yang X. A novel identity authentication technique without trustworthy third-party based on fingerprint verification. Lecture Notes in Computer Science 3917, Chen H C, Wang F Y, Yang C C et al. (eds.), Springer-Verlag, 2006, pp. 175–176.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Tian.

Additional information

Regular Paper: Supported by the National Science Fund for Distinguished Young Scholars of China under Grants No. 60225008, the National Natural Science Foundation of China under Grants No. 60332010 and No. 60575007, the Young Scientists’ Fund of National Natural Science Foundation of China under Grant No.60303022, the Natural Science Foundation of Beijing under Grant No.4052026, and the 242 National Information Security Plan.

Jie Tian received the Ph.D. degree (with honor) in artificial intelligence from the Institute of Automation, Chinese Academy of Sciences (CAS) in 1992. From 1994 to 1996, he was a postdoctoral fellow at the Medical Image Processing Group, University of Pennsylvania. Since 1997, he has been a professor in the Institute of Automation, CAS. His research interests are the medical image process and analysis, pattern recognition, etc. He has published more than 50 papers in academic journals and international conferences. He received National Science & Technology Advance Award in 2003 and 2004 respectively. He is the reviewer of “Mathematical Reviews” and a senior member of IEEE Computer Society.

Liang Li received his B.S. degree from Northwestern Polytechnical University, in 2002. Now he is a Ph.D. candidate in CAS. His research interests include pattern recognition, machine learning, and image processing and their applications in biometrics.

Xin Yang received the B.S., M.S., and Ph.D. degrees in intelligent instrument from Tianjin University, China in 1994, 1997, and 2000 respectively. From 2001 to 2003, she was a postdoctoral fellow at the Biometric Research Group, Key Laboratory of Complex Systems and Intelligence Science, Institute of Automation, CAS. Since 2003, she has been an associate professor. Her research interests are bioinformatics, pattern recognition, etc.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tian, J., Li, L. & Yang, X. Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment. J Comput Sci Technol 21, 861–870 (2006). https://doi.org/10.1007/s11390-006-0861-7

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-006-0861-7

Keywords

Navigation