2017 Biometric Encryption System For Increased Security
2017 Biometric Encryption System For Increased Security
2017
Suggested Citation
Jayapal, Ranjith, "Biometric encryption system for increased security" (2017). UNF Graduate Theses and
Dissertations. 746.
https://digitalcommons.unf.edu/etd/746
April 2017
This thesis titled “Biometric Encryption System for Increased Security” by Ranjith Jayapal is
approved by:
Date
ACKNOWLEDGEMENTS
I would like to thank the thesis committee members, Dr. Pramod Govindan, my
supervising professor, for his continuous guidance and encouragement during the course of my
thesis; Dr. O Patrick Kreidl and Dr. Swapnoneel Roy for their feedback and advice. I offer my
sincere appreciation for all the support and learning opportunities provided by the committee
members. Additionally, I thank Michael Bourg, for reviewing my thesis and helping to improve
my English proficiency.
& Construction and the Graduate School staff & faculty members for supporting me on my
TABLE OF CONTENTS
Page
Acknowledgements …………………………………………………………………...III
Summary …………………………………………………………………………………...42
Reference ……………………………………...……………………………………………44
Vita ……………………………………………...……………………………………46
VI
LIST OF TABLES
Page
Table 3: (a) Eight neighboring pixels (b) Ridge ending (c) Bifurcation point…………………..30
LIST OF FIGURES
Page
Figure 7 (a) A Ridge Ending (b) Ridge Bifurcation (c) Termination (White) and Bifurcation
Figure 11 (a) Gaussian noise (b) Speckle noise (c) Salt & pepper noise .................................. 24
Figure 12 (a) Sharpen image (b) Sobel (c) Canny (d) Prewitt edge detector ............................ 26
Figure 15 (a) Minutiae detection points (b) False minutiae removal ……………………31
Figure 16 (a) False minutiae point 1 (b) False minutiae point 2 ……………………………32
ABSTRACT
Security is very important in present day life. In this highly-interconnected world, most of
our daily activities are computer based, and the data transactions are protected by passwords. These
passwords identify various entities such as bank accounts, mobile phones, etc. [10]. People might
reuse the same password, or passwords related to an individual that can lead to attacks [20]. Indeed,
remembering several passwords can become a tedious task. Biometrics is a science that measures
replace the cumbersome use of complex passwords. Our research uses the features of biometrics
By using a Biometric Encryption (BE) method, one can personalize the biometric to
encode a PIN, a password, or an alphanumeric string, for a multitude of applications such as,
bank ATMs, building access, and computer terminal access. Basically, no PIN numbers to be
remembered in this case [20]. Moreover, the database only needs to store the biometrically
As shown in Figure 1 , in the key binding mode, a random key will be generated during
the image capturing. This key is completely independent of the user’s biometric sample.
The biometric encryption algorithm securely binds the key from the biometric sample to
create a biometrically encrypted key. Basically, the biometric encryption template provides
privacy protection and can be stored in either a database or other electronic accessories. At the
end of the process, the biometric sample and generated key are discarded [20].
During the verification time, when the user presents his or her biometric sample to the
system, the key values are compared with the previously stored key or template image. Then the
key or image will be retrieved from the storage to allow the person to access. At the end of the
verification, the retrieved key or image will be discarded again [19]. This algorithm is designed
to accept a slight variation of the given input samples. On the contrary, if the sample keys are not
matched with each other, the system will automatically reject the input.
Fingerprint biometric has huge potential to enhance privacy and security [14]. Some key
No retention of biometric template image. Many privacy and security concerns derive
there is not much risk that all the other accounts will be as well, i.e., no need to change
one's fingers.
3
Enhanced validation security. No need for user memorization and less vulnerable to
security attacks.
Enhanced security of individual data and communications. Since the key is one's own
biometric, this technology could place a reliable tool in the hands of users.
Biometric Encryption has been researched since the mid-90s. Scientifically, this area is
much more stimulating than conventional biometrics [15]. As shown in the Figure 1, there are
making it a prime choice. Since then, it has been used more extensively than the other
Increase the image acquisition process. Selecting a proper fingerprint sensor reduces the
amount of skin distortions [12]. Image quality can also be enriched at the algorithm level.
Make biometric encryption resilient beside attacks. By chance, if an attacker has access
to both the Biometric Encryption templates and the algorithm, they should not able to
access the biometric, even if they are fully aware of the algorithm.
Expand the accuracy and security of the biometric encryption algorithm. Progress is
Therefore, the modes that were shared must be orthogonal (Statistically Independent).
Improved biometric encryption applications. To exhibit the benefits for privacy and
Use of biometric encryption in the united states government. Some of the biometric
US-VISIT Program
Program
Biometrics
5
By using biometrics, anyone can keep their data as secret and private. As shown in
Figure 2, this system explains how the template image has been stored and the data is kept in
secret [20].
The major issues involved in the biometric system are shown in Figure 2.
fingerprints.
Replay attacks: A previously recorded image will be applied into the system, instead
Masquerade attack: An artifact image can be drawn from the fingerprint template.
Thus, whenever a person applies their fingerprint, the system will produce a match.
Tampering: An attacker will modify the templates to obtain a high verification score
during the matching process. So, the system will be matched with all the given input
data.
Trojan horse attacks: If the matcher is attacked by Trojan horse, all given inputs
Substitution attack: Typically, the template is stored in the database so the system
must allow user verification. As an example, suppose an attacker were to get access to
the template storage, he/she can modify the user’s template to match with their own
finger.
Overriding Yes/No response: The output of the system is always a binary Yes/No
This gives rise to False Acceptance Rate, which, in turn, lowers the security level of
the system.
7
To find an individual’s biometric record from the large set of biometric records is called
identification [1]. For instance, the fraud detection system checks the person’s identity such as
face, iris etc., and compare with the database to ensure that multiple documents had not been
handed out to the same application to receive a person’s passport or driver’s license.
The process, wherein a biometric sample is compared with the samples stored in a
database is called verification or authentication. For example, a person can see their identity
card’s serial number, however, the number must be matched with the database where the data
has been previously stored. In this way, the system knows the bearer holding that card, and is
In some cases, such as passport applications, both identification and verification are
performed to make sure that a person has not been listed in certain databases such as
criminal/terrorist list. Once the person clears all the preliminary requirements, the person’s
Although, the biometrics are more secured than the other system, the stored template
images from the database can be stolen as shown in Figure 3. The concept of cancelable
biometrics helps to create a biometric template that can be cancelled. A distorted version of the
biometric template is stored, which provides high privacy level by allowing multiple templates to
Biometrics).
10
These are the following applications; we are using it for the authentication process based
cancellable biometrics.
Government: Passports, national identification (ID) cards, voter cards, driver’s licenses
Security: Access control and identity verifications, including time and attendance.
Multimodal Biometrics
There are about 18 different models of biometrics in the recognition method as shown in
Figure 4. However, the most commonly used techniques are fingerprint, iris and face [12].
12
Fingerprint recognition are the most common available technology in the biometrics.
Fingerprints exits throughout biometric applications, because of its uniqueness, resolution and
ease of achievement.
13
fingertip lines such as arch, tented arch, right loop, left loop and whorl. There are about 65% of
Although fingerprints are authenticated, there are several ways to confirm the person is
who they say they are as shown in Table 1. The following terms are what the system is looking
for:
A system that has stored information, such as identity card and passport is called “what
you have.” Having pin number and password to access like an ATM is called “what you know.”
The system which is looking for physical evidence that you are who you say you are is called
“who you are,” for instance, fingerprint, iris and vein geometry.
15
Table 1.
PIN Guess
Forgotten
Card)
it will enhance the image quality, and convert it into a template. Scanner technologies can be
optical, silicon, or ultrasound technologies. Typically, optical scanners are the most commonly
used. During enhancement, noise caused by cuts, scars, dryness and wetness in fingerprints is
A Fingerprint layer is a skin particle on your fingertip. The structure of fingerprint has
separated in two ways: ridges and valleys. Typically, ridges and valleys looks like a parallel but,
There are about 150 different types of minutiae that are characterized based on their
shape [10], but the most commonly used methods are Ridge ending and Ridge bifurcation points
as shown in Figure 7.
Figure 7. (a) A Ridge ending (b) Ridge bifurcation (c) Termination (white) and
A small scratch, scrape, or even burn will not affect the structure of ridges of the
fingerprint. The newly developed skin will form in the original place within a short period.
Although, it causes some minor problems in that area, it will not affect the fingerprint itself.
Ridges are connected to the inner skin by small projection called papillae. If, suppose, the
papillae are smashed, the ridges are done for and the fingerprints are wrecked.
A shown in Figure 8, first the fingerprint image is preprocessed and it converts the image
into binary. Then the morphological operation will be applied to get a thinning image. Finally,
the minutia points are extracted and their corresponding values are found.
19
As shown in Figure 9, there are three steps involved in this model: (i) pre-processing, (ii)
Pre-processing
During the pre-processing stage, the captured image will be enhanced by a histogram
function. Later, if there is any noise in the image, the noise will be removed by using image
filtering techniques such as Gaussian, Speckle, Salt & Pepper noise. Furthermore, the image will
Edge occurs in the boundary between two different regions in an image. To find edges in
a given image we use Prewitt, Sobel and Canny. Canny is the most commonly used method for
Image Enhancement
image analysis as shown in Figure 10. During the image enhancement process, the image will be
sharpened, brightened, and noise will be removed to identify the key features.
Histogram equalization model for fingerprint image. As shown in Figure 10, by using
a histogram technique for a particular image, a person can observe the whole distribution
at a glance. The images are displayed in both bright and dark of their corresponding pixel
Image Filtering
or eliminate other features. There are three ways to perform the filtering as given below.
23
A Low pass filter is a technique which only calculates the average of a given image pixel
and all its eight neighbors. So, the original values are replaced by the resulted pixel. The same
Smoothing. It is very helpful to remove the noise form the image without changing their
The blurring. The during the image blurring or degradation is placed when the image is
captured from the camera. It could be either out of focus or a movement capture time.
By changing the pixel values in the region, this operator will move over the image to
affect all the pixels in an image. Initially, the operator only focuses on one pixel at a time.
It is a reverse method of a low pass filter. To emphasize certain pixel details in the image,
a high pass filter is used in this research. It will also make an image very sharp in order to detect
Noise Removal
Image noise is a function which will be placed during the image capturing time in the
sensor. Basically, noise is caused by cuts, scars, dryness, or wetness in fingerprints. The noise
will produce a random variation in images like brightness and color information as shown in
Figure 11. To remove the noise, we are using Gaussian, speckle and salt & pepper noise.
Figure 11. (a) Gaussian noise (b) Speckle noise (c) Salt & pepper noise.
1. Gaussian kernel noise is very useful to find edges in the image and smooth the
surfaces.
25
2. To multiply pixels with a random value of integers is called speckle noise, which
3. The most commonly used technique to remove the noise is salt & pepper. It is
also known as impulse noise. The impulsive noise will be caused by sharpening,
and unexpected distributions in the image signal. If the neighborhood value is “0”
and isolated value is “1”, it is salt. In reverse, if the neighborhood value is “1” and
Edge detection. Edges are significant local changes of intensity in the image. This
typically occurs in the boundary between two different regions in an image. As shown in
Figure 12, important features can be extracted from the edges of image (e.g., curves,
lines, corners). Basically, these features will be used in computer vison algorithms. There
are different methods involved in finding the edges in the image surface such as Prewitt,
intensities of an image.
Sobel. To find the approximate absolute gradient magnitude at each given input grayscale
image values.
Canny. Here the input value is a gray scale image, then it will produce the output image
Image Binarization
There are two different ways to threshold the binary image. These are:
pixel values are relatively uniform, then global threshold is used to binarize the image by
using its corresponding pixel intensity. Alternatively, if the background intensity values
have a large variation, then the adaptive threshold is used as in Figure 13.
28
Minutiae Extraction
Ridge thinning and Minutiae detection. A thinning process is used to remove particular
portions of foreground pixels in the binary image as shown in Figure 14. Thinning is a
very useful for skeletonizing. Here we are using it for cleaning up the resultant output of
edge detectors.
Figure 14. (a) Ridge thinning (b) Minutiae detection (source: Florence).
Human fingerprints have many details when the skin layer is pressed in a smooth
surface [10]. It is commonly denoted as minutiae. Ridge ending and ridge bifurcations
points are most commonly used minutiae techniques for identifying a human finger.
29
commonly used technique in the biometric process. If the two given minutiae
points are matched with each other, then it is classified as same finger.
Pattern matching or ridge based technique. Compared with the above technique,
pattern matching is very sensitive to proper settlement of the finger and it needs a
Correlation method. Two fingerprint images are placed over and the correlation
rotations.
he neighborhood of each ridge pixel in the minutiae model is scanned by using a 3×3
window operation. Now the crossing numbers are computed by half the sum of the 8
neighbor’s pairs, as shown in Table 2 and Table 3. The ridge pixels are classified as ridge
ending, and bifurcation points with their corresponding values. For instance, the crossing
number value “1” represents the ridge ending point and the crossing number value “3”
Isolated Point 0
Bifurcation Point 3
Crossing Point 4
where Pi is the pixel value (where possible values are 0 and 1) in the
Table 3. (a) Eight neighboring pixels (b) ridge ending (c) bifurcation point.
31
Post-Processing
False Minutiae removal. No two fingerprints are exaclty alike, but their ridges might be
equal with furrows. To solve this, we are using a 3 ×3 matrix which previously stores
each ridge and furrow in a separate dataset. This result will help to find if the two
different fingerprints are distinctively unique with their corresponding key vector
over the networks such as the internet. There are five primary functions of cryptography today
Privacy / confidentiality. Ensuring that no one read the message except the intended
receiver.
Integrity. Assuring the receiver that the received message has not been altered in any
Non-repudiation. A mechanism to prove that the sender really sent this message.
Key exchange. The method by which crypto keys are shared between sender and
receiver.
1. Typically, messages are based on the key in cryptography. So, the system may fail to
3. Encryption and decryption process will take longer time if the key values are larger
than usual.
34
4. To remember the key is very tedious. At the same time, storing that key in database is
another uncertainty.
cryptography system.
By using this method, cryptography will provide the high security level and biometrics
will help to avoid remembering passwords. In addition, the cryptographic keys are generated
from the user’s biometric templates. Unless the same person participates again, the system will
There are several types of cryptosystems available for biometry applications such as key
In the key release cryptosystems, the key will be released after the given biometric
sample is verified. Initially, the cryptographic key and the biometric data are separated from each
other. It might get affected by some harmful software during the authentication time. Because
the authentication and the key release are independent, this process will not be suitable for many
applications.
In the key binding cryptosystems, the biometric data and the cryptographic keys are
combined. So, the key will not be generated unless the same person is involved in the system.
In the key generation cryptosystems, the secret key will be generated by a special
algorithm for given biometrically extracted points. Comparatively, this system is distinguished
from the other models because the database will not store the cryptographic key in this system.
35
Several pieces data and information are needed to be protected and secured from the user.
In order to achieve this, the biometric encryption method is used in many applications as listed
below:
Border security control. These days, many people are travelling around the world. So,
the identification requirement plays an important role in the airport and border crossing to
Crime and fraud prevention, detection, and forensics. Using biometrics such as a
fingerprint, can be digitized, recovered and verified rapidly. In this way, it is convenient
to monitor and check a person’s backgrounds. Also, it will help to solve crimes, and
sign-in or registration methods are necessary. In this case, biometrics are helpful to solve
this problem. By using this, a person’s fingerprint or hand can be taken by the system and
it will register and allow the person to access the building, premises etc.
Payment systems. Using biometrics in everyday life is more feasible than any other
method. For example, when shopping in for groceries or gasoline, a person can use their
Access control. Biometrics are more secure than any other system. For instance,
applications are wrecked or lost when someone uses it for a long time. But biometrics are
not even broken or damaged. For example, accessing laptop gets more secure by using
biometric method.
36
As we discussed inTable 2, the minutiae coordinate and angles are measured and data
values are extracted as shown in Table 4. In addition, Ridge Ending (RIG) is marked in red, and
The average values of minutiae point X and Y coordinates and angle θ are calculated.
The resultant outputs are in decimal for X and Y coordinates and radians for angle θ as shown in
Table 4 . These output values are converted into binary representation, because during the
38
preprocessing time the input image values are resized into 256x256 array for minutiae extraction
[17].
Lastly, all the binary values are converted into single coordinate values. By concatenation
of these three values, a private key will be generated for the given fingerprint image [17]. The
, given minutiae.
III. Convert the above concatenated binary string to decimal to get the single
co-ordinate value 1.
39
The algorithm results for the original fingerprint image values are given below.
X = 14320/65 = 1101001000011010000011101100
Y = 12171/65 = 1011001010010010011001001001
The generated cryptographic key of length 64 for the biometric image in Figure 18 is as
follows:
1101001000011010000011101100101100101001001001100100100110011110
The original image, the encrypted image and the output image respectively are shown in
Figure 19 .
SUMMARY
This research proposes the use of fingerprint samples to generate a cryptographic key for
increased security. There are many biometric samples available for use in this recognition model;
however, the fingerprint was selected as the biometric. Fingerprints are stable and remain
consistent throughout a person’s lifetime. Initially, the captured image is converted to a binary
representation. Then, minutiae points are extracted by using a MATLAB function. Next, the
cryptographic keys are generated from the corresponding minutiae values. During this work, it
was discovered that each person has unique minutiae coordinates, and orientation angles. The
proposed method can be used as an efficient biometric security system for application such as
FUTURE WORK
The matching process between the fingerprint and other templates by using
database FVC2004 DB4, which contains a very low image quality to demonstrate the
Modify the existing algorithm for fingerprint identification such that the image
REFERENCES
[1] C. Saraswat and A. Kumar, "An Efficient Automatic Attendence System Using Fingerprint
Verification Technnique," in Chitresh Saraswat et al, 2010.
[4] A.Jaya Lakshmi and I. Ramesh Babu, "Design of Secured Key Generation Algorithm
Using Fingerprint Based Biometric Modality," in IOSR Journal of Engineering, 2012.
[5] Colin Soutar, Danny Roberge, Alex Stoianov, Rane Gilroy and B.V.K. Vijayakumar,
"Biometric Encryption," in Bioscrypt Inc, Mississauga, ONT.
[6] Dr.R.Seshadri and T.Raghu Trivedi, "Efiicient Cryptographic Key Generation Using
Biometrics," in Int.J.Comp.Tech.AppL.
[8] Yao-Jen Chang, Wende Zhang and Tsuhan Chen, "Biometric-Based Cryptographic Key
Generation".
[9] Manju Mandot, S.S. Sarangdevot and Sharad Verma, "Fusion Encryption Technique for
Finger Print Matching with Text," in Int'l Journal of Computing, Communications &
Instrumentation Engg, 2016.
[10] Davide Maltoni, Dario Maio, Anil K. Jain and Salil Prabhakar, in Handbook of Fingerprint
Recognition, Springer, 2009.
[11] Roli Bansal, Priti Sehgal and Punam Bedi, "Minutiae Extraction from Fingerprint Images -
a Review," IJCSI International Journal of Computer Science Issues, vol. 8, no. 5, 2011.
[12] Zain S. Barham and Dr. Allam Mousa, "Fingerprint Recognition Using Matlab," 2011.
[14] Fengling Han, Jiankun Hu and Xinghuo Yu, "A Biometric Encryption Approach
Incorporating Fingerprint Indexing in Key Generation".
[15] Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, "Biometric Template Security,"
EURASIP Advances in Signal Processing, no. Biometrics, 2008.
[16] Aniket Kore, Shiwani Gupta and Kiran Bhandari, "Symmetric Encryption Algorithm Based
on Keys Generated from Biometrics," International Journal of Recent Trends in
Engineering & Research , no. 2455-1457.
[17] B. Raja Rao, Dr. E.V.V.Krishna Rao, S.V.Rama Rao and M. Rama mohan rao, "Finger
Print Parameter Based Cryptographic Key Generation," International Journal of
Engineering Research and Applications, vol. 2, no. 6, pp. 1598-1604, 2012.
[18] Sayani Chandra, . Sayan Paul, Bidyutmala Saha and Sourish Mitra, "Generate an
Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a
Network," IOSR Journal of Computer Engineering , vol. 12, no. 1, pp. 16-22, 2013.
[19] Ann Cavoukian and Alex Stoianov, "Biometric Encryption Chapter from the Encyclopedia
of Biometrics," [Online]. Available: www.ijcaonline.org. [Accessed 20 January 2016].
[20] Ann Cavoukian, Ph.D. and Alex Stoianov, Ph.D., "Biometric Encryption: A Positive-Sum
Technology that Achieves Strong Authentication, Security AND Privacy," March 2007.
[Online]. Available: www.ipc.on.ca. [Accessed 20 January 2016].
VITA
Engineering from the SRM University, Kattankulathur, India, in 2012. He is currently a master
student in the College of Computing, Engineering & Construction at University of North Florida,
Jacksonville, FL. His research interests include pattern recognition, computer vision and image