A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-reso

  • PDF / 3,550,195 Bytes
  • 30 Pages / 439.642 x 666.49 pts Page_size
  • 43 Downloads / 190 Views

DOWNLOAD

REPORT


A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution Ajnas Muhammed1

· Nikhil C. Mhala1 · Alwyn R. Pais1

Received: 13 August 2019 / Revised: 11 September 2020 / Accepted: 19 October 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Fingerprint is the most recommended and extensively practicing biometric trait for personal authentication. Most of the fingerprint authentication systems trust minutiae as the characteristic for authentication. These characteristics are preserved as fingerprint templates in the database. However, it is observed that the databases are not secure and can be negotiated. Recent studies reveal that, if a person’s minutiae points are dripped, fingerprint can be restored from these points. Similarly, if the fingerprint records are lost, it is a permanent damage. There is no mechanism to replace the fingerprint as it is part of the human body. Hence there is a necessity to secure the fingerprint template in the database. In this paper, we introduce a novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. During enrollment, a secret fingerprint image is encrypted into n shares. Each share is stored in a distinct database. During authentication, the shares are collected from various databases. The original secret fingerprint image is restored using a multiple image super-resolution procedure. The experimental results show that the reconstructed fingerprints are similar to the original fingerprints. The proposed method is robust, secure, and efficient in terms of fingerprint template protection and authentication. Keywords Fingerprint template · Fingerprint authentication · Visual Secret Sharing (VSS) · Share · Block-Based Progressive Visual Secret Sharing (BPVSS) · Super-Resolution (SR)

 Ajnas Muhammed

[email protected] Nikhil C Mhala [email protected] Alwyn R Pais [email protected] 1

Information Security Research Lab, NITK Surathkal, Karnataka, India

Multimedia Tools and Applications

1 Introduction In the modern world of automation, various technological development has caused human life more comfortable. Along with these developments, human identification and authentication have become automated. The part played by the automatic authentication system in human identification and authentication is exceptionally significant. However, automatic personal authentication has made security a prominent concern. Suppose an automated authentication system authenticates an impostor as a legitimate user can lead to immense losses. In such cases, it is arduous to track the original user. Traditional personal authentication systems were based on tokens (user ID badges, usernames) and/or some knowledge (passwords) recognized only by the valid user. These techniques were simple and very popular. However, there are many security concerns and weaknesses associated with it, such as 1. Passwords and tokens can be stole