• Title/Summary/Keyword: Minutiae

Search Result 127, Processing Time 0.031 seconds

Fingerprint overlay technique of mobile OTP to extent seed of password (모바일 OTP의 패스워드 Seed 확장을 위한 지문 중첩 기법)

  • Kim, Nam-Ho;Hwang, Bu-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.375-385
    • /
    • 2012
  • The fingerprint is the identity authentication method which is representative uses biometrics. Compared with password methods there is a feature where the dangerousness of embezzling or lossing is few. With like these features using the fingerprint in OTP creations. In this paper, we introduce the developed prototype of OTP system using fingerprint. And the overcome method of OTP system's demerit using fingerprint which extracts few minutiae points into a whole fingerprint image is proposed. A few minutiae points wasn't generated many encryption key for OTP session. The proposed method is overlaid the same fingerprint simply and added many minutiae points as biased overlaid fingerprints. Hence the security of OTP using fingerprint and the randomness over password-guessing are strengthened.

Fingerprint Matching Algorithm using String-Based MHC Detector Set

  • Ko, Kwang-Eun;Cho, Young-Im;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.109-114
    • /
    • 2007
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Lately, the speed of identification has become a very important aspect in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. A fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system was proposed. The proposed algorithm is organized by two-matching stages. The 1st matching stage utilized the self-space and MHC detector string set that are generated from the information of the minutiae and the values of the directional field. The 2nd matching stage was made based on the local-structure of the minutiae. The proposed matching algorithm reduces matching time while maintaining the reliability of the matching algorithm.

High Speed and Low Power Scheme for a Fingerprint Identification Algorithm (고속 저전력 지문인식 알고리즘 처리용 회로)

  • Yoo, Min-Hee;Jung, Seung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.111-114
    • /
    • 2008
  • This paper proposes an effective hardware scheme for gabor filter and thinning stage processing of a fingerprint identification algorithm based on minutiae with 80% cycle occupation of 32-bit RISC microprocessor. The algorithm was developed based on minutiae with bifurcation and ending point. The analysis of an algorithm source rode was performed using ARM emulator.

  • PDF

Fingerprint Identification Based on Hierarchical Triangulation

  • Elmouhtadi, Meryam;El Fkihi, Sanaa;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.435-447
    • /
    • 2018
  • Fingerprint-based biometric identification is one of the most interesting automatic systems for identifying individuals. Owing to the poor sensing environment and poor quality of skin, biometrics remains a challenging problem. The main contribution of this paper is to propose a new approach to recognizing a person's fingerprint using the fingerprint's local characteristics. The proposed approach introduces the barycenter notion applied to triangles formed by the Delaunay triangulation once the extraction of minutiae is achieved. This ensures the exact location of similar triangles generated by the Delaunay triangulation in the recognition process. The results of an experiment conducted on a challenging public database (i.e., FVC2004) show significant improvement with regard to fingerprint identification compared to simple Delaunay triangulation, and the obtained results are very encouraging.

Fingerprint Template Protection Using One-Time Fuzzy Vault

  • Choi, Woo-Yong;Chung, Yong-Wha;Park, Jin-Won;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2221-2234
    • /
    • 2011
  • The fuzzy vault scheme has emerged as a promising solution to user privacy and fingerprint template security problems. Recently, however, the fuzzy vault scheme has been shown to be susceptible to a correlation attack. This paper proposes a novel scheme for one-time templates for fingerprint authentication based on the fuzzy vault scheme. As in one-time passwords, the suggested method changes templates after each completion of authentication, and thus the compromised templates cannot be reused. Furthermore, a huge number of chaff minutiae can be added by expanding the size of the fingerprint image. Therefore, the proposed method can protect a user's fingerprint minutiae against the correlation attack. In our experiments, the proposed approach can improve the security level of a typical approach against brute-force attack by the factor of $10^{34}$.

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2237-2253
    • /
    • 2017
  • For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

A Novel Preprocessing Algorithm for Fingerprint

  • Nam, Jin-Moon
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.442-448
    • /
    • 2009
  • This paper proposes a fingerprint image processing algorithm to accurately extract minutiae in the process of fingerprint recognition. We improved the matching accuracy of low quality fingerprint images by using effective ridge vector and ridge probability. The proposed algorithm improves the clarity of ridge structures and reduces undesired noise. We collected thumb print images from 10 individuals 5 separate times each, in total using 50 thumbprints. We registered one of the five thumbprint images from each individual to match the registered one with the other four thumbprint images, and alternated the registered thumbprint image. We matched thumbprints 20 times for each individual. In total, we conducted 200 matches for the thumbprints from the 10 individuals. We improved the verification accuracy and reliability compared to conventional methods.

Fingerprint Identification System Using Ridge Direction Extraction by Index Table (Index table에 의한 융선의 방향성 추출을 이용한 지문 인식 시스템)

  • Lee, Jee-Won;Ahn, Do-Rang;Lee, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.180-182
    • /
    • 2005
  • Fingerprint-based identification is known to be used for a very long time. Owing to their uniqueness and immutability, fingerprints are today the most widely used biometric features. Therefore, recognition using fingerprints is one of the safest methods as a way of personal identification. But fingerprint identification system has a critical weakness. Since the fingerprint identification time dramatically increase when we compare the unknown fingerprint's minutiae with fingerprint database's minutiae. In this paper, a ridge orientation extraction method using Index table is proposed to solve the problem. The goal of fast direction image extraction is to reduce the identification time and to improve the clarity of ridge and valley structures of input fingerprint image.

  • PDF

A Study on CRM(Center of Rotation Method) based on MST(Minimum Spanning Tree) Matching Algorithm for Fingerprint Recognition

  • Kwon, Hyoung-Ki;Lee, Jun-Ho;Ryu, Young-Kee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.55.5-55
    • /
    • 2001
  • The MST (Minimum Spanning Tree) matching algorithm had been used for searching the part accord points extracted from the gray level fingerprint image. The method, however, had some limitations. To obtain the relationship between enrolled and inputted fingerprint, the MST was used to generate the tree graph that represent the unique graph for given fingerprint data. From the graph, the accord points are estimated. However, the shape of the graph highly depends on the positions of the minutiae. If there are some pseudo minutiae caused by noise, the shape of the graph will be different In this paper, to overcome the limitations of the MST, we proposed CRM (Center of Rotation Method) algorithm that found the true part accord points. The proposed method is based on the assumption ...

  • PDF

Study on Design of Fingerprint Recognition Embedded System using Neural Network (신경망을 이용한 지문인식 임베디드 시스템 설계에 관한 연구)

  • Lee Jae-Hyun;Kim Dong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.775-782
    • /
    • 2006
  • We generated blocks from the direction-extracted fingerprint during the pre-process of the fingerprint recognition algorithm and performed training by using the direction minutiae of each block as the input pattern of the neural network, so that we extracted the core points to use in the matching. Based on this, we designed the fingerprint recognition embedded system and tested it using the control board and the serial communication to utilize it for a variety of application systems. As a result, we can verify the reliance satisfactorily.