期刊论文详细信息
ETRI Journal
An Efficient Selective Encryption of Fingerprint Images for Embedded Processors
关键词: partial encryption;    fingerprint protection;    Biometrics;   
Others  :  1185381
DOI  :  10.4218/etrij.06.0106.0013
PDF
【 摘 要 】

Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

【 授权许可】

   

【 预 览 】
附件列表
Files Size Format View
20150520110815746.pdf 685KB PDF download
【 参考文献 】
  • [1]A. Jain, R. Bole, and S. Panakanti, Biometrics: Personal Identification in Networked Society, Kluwer Academic Publishers, 1999.
  • [2]D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
  • [3]R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, vol. 35, 2002, pp. 2727-2738.
  • [4]N. Ratha, J. Connell, and R. Bolle, "An Analysis of Minutiae Matching Strength," LNCS 2091 - Proc. of AVBPA, 2001, pp. 223-228.
  • [5]W. Stallings, Cryptography and Network Security: Principals and Practice, Pearson Ed. Inc., 2003.
  • [6]D. Maio and D. Maltoni, "A Secure Protocol for Electronic Commerce Based on Fingerprints and Encryption," Proc. of Conf. on Systems, Cybernetics, and Informatics, 1999, pp. 519-525.
  • [7]D. Moon, Y. Gil, S. Pan, Y. Chung, and H. Kim, "Performance Analysis of the Match-on-Card System for the Fingerprint Authentication," Proc. of International Workshop on Information Security Applications, 2001, pp. 449-459.
  • [8]Y. Moon, H. Ho, K. Ng, S. Wan, and S. Wong, "Collaborative Fingerprint Authentication by Smart Card and a Trusted Host," Electrical and Computer Engineering, vol. 1, 2000, pp. 108-112.
  • [9]S. Pan, Y. Gil, D. Moon, Y. Chung, and C. Park, "A Memory-Efficient Fingerprint Verification Algorithm using a Multi-Resolution Accumulator Array for Match-on-Card," ETRI Journal, vol. 25, no. 3, 2003, pp. 179-186.
  • [10]A. Jain, S. Prabhakar, and A. Ross, "Biometrics-Based Web Access," Technical Report, Michigan State U., 1998.
  • [11]L. Rila and C. Mitchell, "Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication," Proc. of CARDIS, 2002, pp. 19-28.
  • [12]M. Yeung and S. Pankanti, "Verification Watermarks on Fingerprint Recognition and Retrieval," Journal of Electronic Imaging, vol. 9, no. 4, 2002, pp. 468-476.
  • [13]A. Jain and U. Uludag, "Hiding Fingerprint Minutiae in Images," Proc. of AutoID, 2002, pp. 97-102.
  • [14]G. Davida, Y. Frankel, and B. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," Proc. of Symp. on Privacy and Security, 1998, pp. 148-157.
  • [15]R. Pfarrhofer and A. Uhl, "Selective Image Encryption using JBIG," LNCS 3677 - Proc. of CMS, 2005, pp. 98-107.
  • [16]S. Lian, J. Sun, D. Zhang, and Z. Wang, "A Selective Image Encryption based on JPEG2000 Codec," LNCS 3332 - Proc. of PCM, 2004, pp. 65-72.
  • [17]Z. Liu, X. Li, and Z. Dong, "A Lightweight Encryption Algorithm for Mobile Online Multimedia Devices," LNCS 3306 - Proc. of WISE, 2004, pp. 653-658.
  • [18]M. Podesser, H. Schmidt, and A. Uhl, "Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environments," Proc. of the 5th IEEE Nordic Signal Processing Symposium, 2002.
  • [19]R. Gonzalez, Digital Image Processing, Addison Wesley, 1992.
  • [20]M. Droogenbroeck and R. Benedett, "Techniques for a Selective Encryption of Uncompressed and Compressed Images," Proc. of ACIVS, 2002, pp. 90-97.
  • [21]Testech, http://www.testech.co.kr
  • [22]ATMEL, http://www.atmel.com
  • [23]NiGen, http://www.nitgen.com
  • [24]Analog Device, http://www.analog.com
  文献评价指标  
  下载次数:3次 浏览次数:10次