A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-i...A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from a digital certificate. In the proposed biometric-PKI authentication system, an au- thentication process performs that it extracts consistent features of fingerprint images, encrypts consistent features, and matches features with prepared templates. The simulation results of the proposed authentication system prove that our system achieves low false acceptance rate and high accuracy rate.展开更多
Minutiae-based fingerprint matching is the most commonly used in an automatic fingerprint identification system. In this paper, we propose a minutia matching method based on line segment vector. This method uses all t...Minutiae-based fingerprint matching is the most commonly used in an automatic fingerprint identification system. In this paper, we propose a minutia matching method based on line segment vector. This method uses all the detected minutiae (the ridge ending and the ridge bifurcation) in a fingerprint image to create a set of new vectors (line segment vector). Using these vectors, we can determine a truer reference point more efficiently. In addition, this new minutiae vector can also increase the accuracy of the minutiae matching. By experiment on the public domain collections of fingerprint images fvc2004 DID set A and DB4 set A, the result shows that our algorithm can obtain an improved verification performance.展开更多
Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger...Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger impression picture isn’t that simple. So we must process unique finger impression picture before coordinating. A crucial advance in measurements of fingerprint minutiae is to obtain minutiae from the finger impression pictures dependably. However, fingerprint images are occasionally of perfect quality. They might be debased and defiled because of varieties in skin and impression conditions. Along these lines, image enhancement strategies utilize other details extraction to acquire a more reliable estimation of minutiae areas. The primary objective of this research work is to introduce a superior and improved unique fingerprint image. We studied the elements identifying with getting elite component focuses detection algorithm, for example, picture quality, segmentation, picture upgrade and highlight recognition. Usually utilized features for enhancing unique finger impression picture quality are Fourier spectrum energy, Sobel filter energy, and local orientation. Precise segmentation of unique finger impression edges from a broad foundation is vital. For productive improvement and feature extraction algorithms, we zero the commotion in segmented features. As a pre-processing method, we need to perform comprising of field introduction, ridge frequency estimation, Sobel filtering, division. Then connect the resulting picture to a thinning algorithm and consequent minutiae extraction. After resultant extraction of these minutiae focuses, we will utilize the picture with focuses for coordinating or finding the offenders and also for other security issues. The procedure of image pre-processing and minutiae extraction is explored. The simulations are performed in the MATLAB environment to assess the execution of the implemented algorithm.展开更多
Nowadays, it is a new technology era. Fingerprint is necessary identification recognition of citizens. Fingerprint technology has become more popular and connected to human being life and come to replace traditional i...Nowadays, it is a new technology era. Fingerprint is necessary identification recognition of citizens. Fingerprint technology has become more popular and connected to human being life and come to replace traditional identification and verifying recognition today. The fingerprint will continue to substitute the ID of citizens as soon as possible in the future. Fingerprint refers to a complex of combination between gap of ridges and valleys on all of the fingertips. Clearer ridges quality is more convenient to analyze who you are and system can recognize your unique identity. Poorer ridges quality image is a significant problem that system has to improve and enhance the images quality before analyzing the results. Dry and wet ridges are the main issues that developers and researchers need to work on as it provides poor quality image. Medium ridge image is a good condition for analysis, but it also needs to be improved. Therefore, fingerprint images have to control the clearer quality and computing minutiae result and then comparing to templates, which stored in the database. The result will display if it is matched but it will not appear when that person has not yet registered. The paper proposed three algorithms to enhance image, extract minutiae and match with fingerprint templates. The first step, is used to enhance the image quality using brightness and Gabor filters on the fingerprint surface to make ridgelines darker. The second step is to extract minutia. It used to convert the images to binary (0 and 1) and process thinning image with Zhang Suen algorithms. Then, the pictures go through the fixing procedure to correct any missed links, error ridges or spurious minutiae that generated by fingerprint algorithms before they undergo final analysis, calculate location of minutiae and the total of the minutiae on the fingerprint surface. The last step is matching algorithms that can be proof of a person identity by comparing minutiae result with those in the database. If a person has already enrolled, the result will confirm.展开更多
This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are ...This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.展开更多
A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to ...A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.展开更多
In the Automatic Fingerprint Identification Syst e m (AFIS), extracting the feature of fingerprint is very important. The local cur vature of ridges of fingerprint is irregular, so people have the barrier to effe ctiv...In the Automatic Fingerprint Identification Syst e m (AFIS), extracting the feature of fingerprint is very important. The local cur vature of ridges of fingerprint is irregular, so people have the barrier to effe ctively extract the fingerprint curve features to describe fingerprint. This art icle proposes a novel algorithm; it embraces information of few nearby fingerpri nt ridges to extract a new characteristic which can describe the curvature featu re of fingerprint. Experimental results show the algorithm is feasible, and the characteristics extracted by it can clearly show the inner macroscopic curve pro perties of fingerprint. The result also shows that this kind of characteristic i s robust to noise and pollution.展开更多
文摘A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from a digital certificate. In the proposed biometric-PKI authentication system, an au- thentication process performs that it extracts consistent features of fingerprint images, encrypts consistent features, and matches features with prepared templates. The simulation results of the proposed authentication system prove that our system achieves low false acceptance rate and high accuracy rate.
文摘Minutiae-based fingerprint matching is the most commonly used in an automatic fingerprint identification system. In this paper, we propose a minutia matching method based on line segment vector. This method uses all the detected minutiae (the ridge ending and the ridge bifurcation) in a fingerprint image to create a set of new vectors (line segment vector). Using these vectors, we can determine a truer reference point more efficiently. In addition, this new minutiae vector can also increase the accuracy of the minutiae matching. By experiment on the public domain collections of fingerprint images fvc2004 DID set A and DB4 set A, the result shows that our algorithm can obtain an improved verification performance.
文摘Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger impression picture isn’t that simple. So we must process unique finger impression picture before coordinating. A crucial advance in measurements of fingerprint minutiae is to obtain minutiae from the finger impression pictures dependably. However, fingerprint images are occasionally of perfect quality. They might be debased and defiled because of varieties in skin and impression conditions. Along these lines, image enhancement strategies utilize other details extraction to acquire a more reliable estimation of minutiae areas. The primary objective of this research work is to introduce a superior and improved unique fingerprint image. We studied the elements identifying with getting elite component focuses detection algorithm, for example, picture quality, segmentation, picture upgrade and highlight recognition. Usually utilized features for enhancing unique finger impression picture quality are Fourier spectrum energy, Sobel filter energy, and local orientation. Precise segmentation of unique finger impression edges from a broad foundation is vital. For productive improvement and feature extraction algorithms, we zero the commotion in segmented features. As a pre-processing method, we need to perform comprising of field introduction, ridge frequency estimation, Sobel filtering, division. Then connect the resulting picture to a thinning algorithm and consequent minutiae extraction. After resultant extraction of these minutiae focuses, we will utilize the picture with focuses for coordinating or finding the offenders and also for other security issues. The procedure of image pre-processing and minutiae extraction is explored. The simulations are performed in the MATLAB environment to assess the execution of the implemented algorithm.
文摘Nowadays, it is a new technology era. Fingerprint is necessary identification recognition of citizens. Fingerprint technology has become more popular and connected to human being life and come to replace traditional identification and verifying recognition today. The fingerprint will continue to substitute the ID of citizens as soon as possible in the future. Fingerprint refers to a complex of combination between gap of ridges and valleys on all of the fingertips. Clearer ridges quality is more convenient to analyze who you are and system can recognize your unique identity. Poorer ridges quality image is a significant problem that system has to improve and enhance the images quality before analyzing the results. Dry and wet ridges are the main issues that developers and researchers need to work on as it provides poor quality image. Medium ridge image is a good condition for analysis, but it also needs to be improved. Therefore, fingerprint images have to control the clearer quality and computing minutiae result and then comparing to templates, which stored in the database. The result will display if it is matched but it will not appear when that person has not yet registered. The paper proposed three algorithms to enhance image, extract minutiae and match with fingerprint templates. The first step, is used to enhance the image quality using brightness and Gabor filters on the fingerprint surface to make ridgelines darker. The second step is to extract minutia. It used to convert the images to binary (0 and 1) and process thinning image with Zhang Suen algorithms. Then, the pictures go through the fixing procedure to correct any missed links, error ridges or spurious minutiae that generated by fingerprint algorithms before they undergo final analysis, calculate location of minutiae and the total of the minutiae on the fingerprint surface. The last step is matching algorithms that can be proof of a person identity by comparing minutiae result with those in the database. If a person has already enrolled, the result will confirm.
基金Supported by the National Natural Science Foundation of China (No.60472069)
文摘This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First, the minutiae data are bound by a set of random data through the linear function. The number of the function’s variables is determined by the required number of matched minutiae. Then, a new key de- rived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.
文摘A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security.
文摘In the Automatic Fingerprint Identification Syst e m (AFIS), extracting the feature of fingerprint is very important. The local cur vature of ridges of fingerprint is irregular, so people have the barrier to effe ctively extract the fingerprint curve features to describe fingerprint. This art icle proposes a novel algorithm; it embraces information of few nearby fingerpri nt ridges to extract a new characteristic which can describe the curvature featu re of fingerprint. Experimental results show the algorithm is feasible, and the characteristics extracted by it can clearly show the inner macroscopic curve pro perties of fingerprint. The result also shows that this kind of characteristic i s robust to noise and pollution.