5 CONCLUSION
In this paper, we have proposed a method for
generating cancellable fingerprint templates to pro-
vide protection to minutiae-based fingerprint data.
The notable contributions of our method are two
folds: alignment-free and excellent recognition per-
formance. The proposed construct preserves the ge-
ometric relationships among the original fingerprint
image in the transformed templates and hence does
not cause performance degradation. Further, the pro-
posed scheme ensures strong security in that given
both the user key and the transformed template, re-
vealing raw fingerprint data is not be feasible. The
stored and user-specific keys are employed to trans-
form the invariant feature vector and thus diversity
and revocability can be vindicated. Experiments con-
ducted on the public domain database FVC2002-DB1
demonstrate the excellent performance of the pro-
posed method in recognition accuracy, computational
complexity and security.
REFERENCES
Ang, R., Safavi-Naini, R., and McAven, L. (2005). Cance-
lable key-based fingerprint templates. In Australasian
conference on information security and privacy, pages
242–252. Springer.
Das, P., Karthik, K., and Garai, B. C. (2012). A robust
alignment-free fingerprint hashing algorithm based
on minimum distance graphs. Pattern Recognition,
45(9):3373–3388.
Farooq, S. T. F., Mansukhani, P., and Govindaraju, V.
(1991). Symmetric hash functions for secure finger-
print biometric systems. In Pattern Recognition Let-
ters.
Jin, Z., Lim, M.-H., Teoh, A. B. J., and Goi, B.-M. (2014).
A non-invertible randomized graph-based hamming
embedding for generating cancelable fingerprint tem-
plate. Pattern Recognition Letters, 42:137–147.
Jin, Z., Teoh, A. B. J., Goi, B.-M., and Tay, Y.-H. (2016).
Biometric cryptosystems: A new biometric key bind-
ing and its implementation for fingerprint minutiae-
based representation. Pattern Recognition, 56:50–62.
Jin, Z., Teoh, A. B. J., Ong, T. S., and Tee, C. (2010). A
revocable fingerprint template for security and privacy
preserving. TIIS, 4(6):1327–1342.
Jin, Z., Teoh, A. B. J., Ong, T. S., and Tee, C. (2012). Fin-
gerprint template protection with minutiae-based bit-
string for security and privacy preserving. Expert sys-
tems with applications, 39(6):6157–6167.
Lee, C., Choi, J.-Y., Toh, K.-A., Lee, S., and Kim, J. (2007).
Alignment-free cancelable fingerprint templates based
on local minutiae information. IEEE Transactions on
Systems, Man, and Cybernetics, Part B (Cybernetics),
37(4):980–992.
Lee, C. and Kim, J. (2010). Cancelable fingerprint tem-
plates using minutiae-based bit-strings. Journal of
Network and Computer Applications, 33(3):236–246.
Maltoni, D., Maio, D., Jain, A., and Prabhakar, S. (2003).
Handbook of fingerprint recognition springer. New
York.
Nagar, A., Nandakumar, K., and Jain, A. K. (2010). A
hybrid biometric cryptosystem for securing finger-
print minutiae templates. Pattern Recognition Letters,
31(8):733–741.
Quan, F., Fei, S., Anni, C., and Feifei, Z. (2008). Crack-
ing cancelable fingerprint template of ratha. In Com-
puter Science and Computational Technology, 2008.
ISCSCT’08. International Symposium on, volume 2,
pages 572–575. IEEE.
Ratha, N. K., Chikkerur, S., Connell, J. H., and Bolle, R. M.
(2007). Generating cancelable fingerprint templates.
IEEE Transactions on pattern analysis and machine
intelligence, 29(4):561–572.
Thai, R. (2003). Fingerprint image enhancement and minu-
tiae extraction. The University of Western Australia.
Tulyakov, S., Farooq, F., Mansukhani, P., and Govindaraju,
V. (2007). Symmetric hash functions for secure finger-
print biometric systems. Pattern Recognition Letters,
28(16):2427–2436.
Wang, S. and Hu, J. (2012). Alignment-free cancelable
fingerprint template design: A densely infinite-to-
one mapping (ditom) approach. Pattern Recognition,
45(12):4129–4137.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
366