Efficient Approach for Retinal Biometric Template Security and Person Authentication using Noninvertible Constructions

نویسندگان

  • M. Pabitha
  • L. Latha
  • M. Ortega
  • C. Marino
  • M. G. Penedo
  • M. Blanco
  • F. Gonzalez
چکیده

Cancelable biometrics is a good approach to address the security and privacy concerns on biometric authentication. The security of cancelable biometrics lies on non invertibility of the transformed templates. So the transforms should be noninvertible and the original biometric template cannot be recovered. Our proposed method initially involves segmentation process to identify blood vessel bifurcation points in the retina, and then the generation of template consisting of the bifurcation points in the blood vessels and the template is transformed using Noninvertible construction (NIC) algorithm and finally matching of the bifurcation points in different patterns. Our work mainly focused to provide the efficient person authentication and the secured biometric template, which has the unique patterns of blood vessels. The effectiveness of our proposed system is then verified with experimental results using a total of 603 retinal images from three different publicly available databases, namely DRIVE, VARIA and STARE. Also we have made a performance analysis, and found that the proposed retinal recognition method gives 100%, 98% and 93% recognition rates, 0%, 0. 16%, 0. 62% error rates for the above databases and analyzed the Genuine Acceptance Rate (GAR), False Acceptance Rate (FAR) and False Rejection Rate (FAR), Elapsed time respectively. The experimental results obtained using various databases shows that the application of Retinal feature extraction algorithm (RFEA) and NCI results in higher recognition rates and lower error

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Retina based Biometric Privacy using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Preserving the biometric privacy such as digital biometric data (eg. face, iris, retina and fingerprint) is very important nowadays. The retinal biometrics is considered one of the most accurate and robust methods of the identity verification...

متن کامل

An Efficient Secure Biometric System with Non-Invertible Gabor Transform

Biometric scheme are being widely employed because their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. High scale employments and the related template storage have increased the requirement to guard the biometric data stored in the system. Theft of biometric information is a negotiation of the user’s privacy. In Addition, the...

متن کامل

Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault

Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...

متن کامل

Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications

personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric...

متن کامل

Secure Iris Authentication Using Visual Cryptography

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013