Converting Fingerprint Local Features to Public Key Using ... - CiteSeerX

3 downloads 5192 Views 276KB Size Report
novel method to extract fingerprint minutiae features and converting it to a public key using the fuzzy extractor. ... normalization of binary images were carried out. Ideally the width of ..... http://www.cs.bu.edu/˜reyzin/code/fuzzy.html. 35. Shoup ...
Converting Fingerprint Local Features to Public Key Using Fuzzy Extractor Mohammed S. Khalil1 and Dzulkifli Muhammad1, M.Masroor Ahmed2 Department of Computer Graphics and Multimedia, Universiti Teknologi Malaysia, [email protected] 1 Department of Computer Graphics and Multimedia, Universiti Teknologi Malaysia, [email protected] 2 Department of Computer Graphics and Multimedia, Universiti Teknologi Malaysia, [email protected] 1

  ABSTRACT  Biometric security systems are being widely used for ensuring maximum level of safety. In Biometric system, neither the data is uniformly distributed, nor can it be reproduced precisely. Each time it is processed. However, this processed data cannot be used as a password or as a cryptography secret. This paper proposes a novel method to extract fingerprint minutiae features and converting it to a public key using the fuzzy extractor. The public key can be used as a key in a cryptographic application Keywords: Biometric, Fingerprint, Local feature, Fuzzy extractor, and Cryptography.

1. Introduction  Biometric system ensures an automatic identification of human being based on the principle of measureable physiological or behavioral characteristics such as fingerprint, an iris pattern, or a voice sample [1]. A significant feature associated with Biometric data is that: it is hard to forge, unique to each person, and excellent source of entropy which makes them an excellent candidate for security applications. However, they have some disadvantage, such as biometric data cannot be subjected to any change, biometric template easy to steal, the data are not uniformly distributed and exactly reproducible, they cannot be

stolen biometric template, and stolen biometric data are stolen for life [3]. There have been several researches in the literature addressing this issue [4; 5; 6; 7]. Juels and Wattenberg [8] presented the first fuzzy commitment sachems by combining wellknown techniques from the areas of errorcorrecting codes and cryptography, in which a cryptographic key is de-committed using biometric data. Though this scheme worked well, but it has two major shortcomings; first, it does not allow modifications of the key. Second, the security proof holds if the key is uniformly distributed. Juels and sudan fixed these drawbacks by

used directly as password or cryptography secret

proposing a fuzzy vault scheme [9]. The main

[2].

drawback of this scheme is that if it’s used for When biometric data are used in an application

it has to be stored in a database. This data might be used across a network for matching against

different application with different vault each times it reveals fingerprint minutiae. To overcome the drawback of the fuzzy

reference database. Due to this basic step, the

commitment and the fuzzy vault Yevgeniy et al

biometric system gets exposed to a new security

[10] defined a fuzzy extractor, which will be used

risk such as: constructing false biometrics from

in this paper to convert the fingerprint local feature

into a public key which can be used by any security

distributed string. The seed for the Fuzzy Extractor

application as a cryptographic key. In

along with the Sketch is stored publicly. When a

preprocessing step, skeletonization and

query needs to be matched to the input, the Fuzzy

normalization of binary images were carried out.

Extractor uses the public Sketch of the input along

Ideally the width of the skeleton is one pixel but

with the query to exactly reconstruct the input. The

this is not always true especially at the connection

Fuzzy Extractor’s reconstruction procedure is

point it produced unwanted superior minutiae

designed in such a way that if the query is within a

points, therefore, they should be removed.

specified distance from the input, the reconstruction succeeds. The reconstructed input is

2. Fuzzy Extractor  Yevgeniy et al [10] defined a Fuzzy Extractor,

then mapped to the same string using the same seed stored along with the Sketch. The public storage of the Sketch and the seed

which extracts uniform string R from its input W’ 

do not substantially compromise the security of the input as they cannot be used to recover the input without a query which is ‘close’ to the input.

the string R can be reproduced as long as the input remains reasonably close to the original. The fuzzy

3. Propose Pre­processing  Fingerprint is the oldest biometric-based identification system [11]. Because of its

extractor output a non secret string ρ to assist in

uniqueness, accessibility, reliability, this biometric system is being used widely in numerous applications, for example forensic test, security, personal identification. When a finger is pressed

reproducing R from W’.

against a smooth surface the fingerprint is produced. The most visual characteristics of a fingerprint are a pattern of ridges and valleys, they run in parallel; sometimes they gets terminated and

They introduced two primitives called a Secure

sometimes they are bifurcated.

Sketch which allows recovery of a shared secret

There are two type of feature for fingerprint

given a close approximation thereof, and a fuzzy

recognition: global feature and local feature. Global

Extractor which extracts a uniformly distributed

feature form special pattern of ridge and furrows,

string R from this shared secret in an error-tolerant

which are called singularities or singular point, and

manner.

the important points are the core and the delta. The

During the enrolment of an error prone, none uniformly distributed input; the Secure Sketch generates some public information related to the input called a ‘Sketch’ which by itself cannot be used to recover the input. The Fuzzy Extractor is used to map the non uniform input to a uniformly

core is defined as the most point on the inner most ridges; and a delta is defined as the point where three flows meet [12]. There have been several approaches for singular point detection in the literature [13; 14; 15; 16; 17; 12; 18; 19; 20; 21] and most of them operate on the fingerprint orientation field [13; 14; 15; 17; 12; 18; 19]. The

Poincare index (PI) method [12; 22; 18; 23] is one

connectivity of the ridge structures while forming a

of commonly used methods to detect singular

skeletonized version of the binary image. This

point. Minutiae are important at the local feature; it

skeleton image is then used in the extraction of

carries information about the individuality of the

subsequent feature.

fingerprint. Minutiae, in fingerprint context, are the various ridge discontinuities of a fingerprint. The ANSI [24] classified minutiae to four classes:

3.2 Feature Filtering  A post-processing stage is important to remove

termination, bifurcations, trifurcations, and

the spurious minutiae introduced by the previous

undetermined. Consistent extraction of these

process or caused by dirt, excess or lake of ink, or

features is essential for fingerprint recognition.

from the fingerprint scanner. Figure (2) illustrate

There are many approaches in the literature about

the false minutiae and shows how the ridge is

locating the local feature [25; 26; 27; 2; 28; 29; 30;

connected. The facing endpoint in (a, b) are

31].

connected, bifurcation facing with endpoint is

In this paper Normalization, Thinning, Feature Filtering, and Feature Extraction are used for extracting the fingerprint feature as vectors which are used as input for the fuzzy extractor.

3.1 Normalization  Normalization is used to remove the effects of

removed (c), bifurcation facing other bifurcation is removed (d), spurs are removed (e), bridges are removed (f), triangles are removed (g), and ladder structure is removed. Xiao and Raafat [33] introduced an algorithm to describe and remove the spurious minutiae: In order to describe the minutia structures, some

the sensor noise and finger pressure difference. The

statistical attribute about the fingerprint ridge are

ridge and valley structure will not be affected by

calculated as follows:

this process. It determines the new intensity value of each pixel in the image by making use of following mathematical relation:

The coordinates (x,y) of the fingerprint image are calculated from top left (0, 0) to bottom right (255,255) with the first horizontal line of scanning as the X-axis direction. The ridge length Lp1p2 equals the tracing steps

Where I'[x,y] is a 2D finger print and m and v are the image mean and variance and m0 and v0 are the desired mean and variance obtained after the

from point P1 to point P2 along a thinned fingerprint ridge. The ridge direction Dp can be obtained from

normalization [11]. The proposed approach also

adjacent ridge points of point P Tracing t steps

makes use of thinning process followed by the

Suggest Documents