3,717 research outputs found

    A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes

    Get PDF
    Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost solution is presented to obfuscate secret keys with Physically Unclonable Functions (PUFs), which exploit the hardware identity of the node. In addition, a lightweight fingerprint recognition solution is proposed, which can be implemented in low-cost sensor nodes. Since biometric data of individuals are sensitive, they are also obfuscated with PUFs. Both solutions allow authenticating the origin of the sensed data with a proposed dual-factor authentication protocol. One factor is the unique physical identity of the trusted sensor node that measures them. The other factor is the physical presence of the legitimate individual in charge of authorizing their transmission. Experimental results are included to prove how the proposed PUF-based solution can be implemented with the SRAMs of commercial Bluetooth Low Energy (BLE) chips which belong to the communication module of the sensor node. Implementation results show how the proposed fingerprint recognition based on the novel texture-based feature named QFingerMap16 (QFM) can be implemented fully inside a low-cost sensor node. Robustness, security and privacy issues at the proposed sensor nodes are discussed and analyzed with experimental results from PUFs and fingerprints taken from public and standard databases.Ministerio de EconomĂ­a, Industria y Competitividad TEC2014-57971-R, TEC2017-83557-

    Minutiae-based Fingerprint Extraction and Recognition

    Get PDF

    Poor Quality Fingerprint Recognition Based on Wave Atom Transform

    Get PDF
    Fingerprint is considered the most practical biometrics due to some specific features which make them widely accepted. Reliable feature extraction from poor quality fingerprint images is still the most challenging problem in fingerprint recognition system. Extracting features from poor fingerprint images is not an easy task. Recently, Multi-resolution transforms techniques have been widely used as a feature extractor in the field of biometric recognition. In this paper we develop a complete and an efficient fingerprint recognition system that can deal with poor quality fingerprint images. Identification of poor quality fingerprint images needs reliable preprocessing stage, in which an image alignment, segmentation, and enhancement processes are performed. We improve a popular enhancement technique by replacing the segmentation algorithm with another new one. We use Waveatom transforms in extracting distinctive features from the enhanced fingerprint images. The selected features are matched throw K-Nearest neighbor classifier techniques. We test our methodology in 114 subjects selected from a very challenges database; CASIA; and we achieve a high recognition rate of about 99.5%

    A new algorithm for minutiae extraction and matching in fingerprint

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%

    FLAG : the fault-line analytic graph and fingerprint classification

    Get PDF
    Fingerprints can be classified into millions of groups by quantitative measurements of their new representations - Fault-Line Analytic Graphs (FLAG), which describe the relationship between ridge flows and singular points. This new model is highly mathematical, therefore, human interpretation can be reduced to a minimum and the time of identification can be significantly reduced. There are some well known features on fingerprints such as singular points, cores and deltas, which are global features which characterize the fingerprint pattern class, and minutiae which are the local features which characterize an individual fingerprint image. Singular points are more important than minutiae when classifying fingerprints because the geometric relationship among the singular points decide the type of fingerprints. When the number of fingerprint records becomes large, the current methods need to compare a large number of fingerprint candidates to identify a given fingerprint. This is the result of having a few synthetic types to classify a database with millions of fingerprints. It has been difficult to enlarge the minter of classification groups because there was no computational method to systematically describe the geometric relationship among singular points and ridge flows. In order to define a more efficient classification method, this dissertation also provides a systematic approach to detect singular points with almost pinpoint precision of 2x2 pixels using efficient algorithms

    A survey of fingerprint classification Part I: taxonomies on feature extraction methods and learning models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P.

    A Survey of Fingerprint Classification Part I: Taxonomies on Feature Extraction Methods and Learning Models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.Research Projects CAB(CDTI) TIN2011-28488 TIN2013-40765Spanish Government FPU12/0490

    Low-Quality Fingerprint Classification

    Get PDF
    Traditsioonilised sĂ”rmejĂ€lgede tuvastamise sĂŒsteemid kasutavad otsuste tegemisel minutiae punktide informatsiooni. Nagu selgub paljude varasemate tööde pĂ”hjal, ei ole sĂ”rmejĂ€lgede pildid mitte alati piisava kvaliteediga, et neid saaks kasutada automaatsetes sĂ”rmejĂ€ljetuvastuse sĂŒsteemides. Selle takistuse ĂŒletamiseks keskendub magistritöö vĂ€ga madala kvaliteediga sĂ”rmejĂ€lgede piltide tuvastusele – sellistel piltidel on mitmed ĂŒldteada moonutused, nagu kuivus, mĂ€rgus, fĂŒĂŒsiline vigastatus, punktide olemasolu ja hĂ€gusus. Töö eesmĂ€rk on vĂ€lja töötada efektiivne ja kĂ”rge tĂ€psusega sĂŒgaval nĂ€rvivĂ”rgul pĂ”hinev algoritm, mis tunneb sĂ”rmejĂ€lje Ă€ra selliselt madala kvaliteediga pildilt. Eksperimentaalsed katsed sĂŒgavĂ”ppepĂ”hise meetodiga nĂ€itavad kĂ”rget tulemuslikkust ja robustsust, olles rakendatud praktikast kogutud madala kvaliteediga sĂ”rmejĂ€lgede andmebaasil. VGG16 baseeruv sĂŒgavĂ”ppe nĂ€rvivĂ”rk saavutas kĂ”rgeima tulemuslikkuse kuivade (93%) ja madalaima tulemuslikkuse hĂ€guste (84%) piltide klassifitseerimisel.Fingerprint recognition systems mainly use minutiae points information. As shown in many previous research works, fingerprint images do not always have good quality to be used by automatic fingerprint recognition systems. To tackle this challenge, in this thesis, we are focusing on very low-quality fingerprint images, which contain several well-known distortions such as dryness, wetness, physical damage, presence of dots, and blurriness. We develop an efficient, with high accuracy, deep neural network algorithm, which recognizes such low-quality fingerprints. The experimental results have been conducted on real low-quality fingerprint database, and the achieved results show the high performance and robustness of the introduced deep network technique. The VGG16 based deep network achieves the highest performance of 93% for dry and the lowest of 84% for blurred fingerprint classes

    Documentation and analysis of plastic fingerprint impressions involving contactless three-dimensional surface scanning

    Get PDF
    Fingerprint impressions are frequently encountered during the investigation of crime scenes, and may establish a crucial linkage between the suspect and the crime scene. Plastic fingerprint impressions found at crime scenes are often transient and delicate, leaving photography the sole means of documentation. A traditional photography approach can be inadequate in documenting impressions that contain three-dimensional (3D) details due to the limitations of camera and lighting conditions on scene. In this study, 3D scanning was proposed as a novel method for the documentation of plastic fingerprints. Structured-light 3D scanning (SLS) captures the distortion of projected light patterns on the subject to obtain its 3D profile, which allows fast acquisition of the complete 3D geometric information of the surface. The contactless operation of SLS also eliminates the risk of destroying fragile evidence, making it a sound choice for forensic applications. In this study, the feasibility of 3D scanning of plastic fingerprint impressions was evaluated and compared with traditional photography regarding the quantity and quality of perceptible friction ridge features. Attempts were made to develop a procedure to extract curvature features from 3D scanned fingerprints and flatten the friction ridge features into two-dimensional (2D) images to allow direct comparison with the traditional photography method in the CSIpixÂź Matcher and NFIQ 2.0 software. One of the developed methods (3DR) utilizing a discrete geometry operator and convexity features outperformed traditional photography, both in minutiae count and match quality, while traditional photography could not always capture enough high-quality minutiae for comparisons, even after digital enhancement. The reproducibility of the 3D scanning process was evaluated using 3D point cloud statistics. The pair-wise mean distance and standard deviation were calculated for four levels of comparisons with theoretically increasing disparity, including pairs of scans of the same impressions. The results showed minimal shape deviation from scan to scan for the same impression, but high variations for different impressions

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims
    • 

    corecore