3/2021 - 3 |
An Efficient Biocrypto-system Using Least Square Polynomial Curve Fitting with Interpolation Based New Chaff-Points Generation MethodTANTUBAY, N. , BHARTI, J. |
Extra paper information in |
Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science |
Download PDF (1,792 KB) | Citation | Downloads: 1,145 | Views: 1,582 |
Author keywords
cryptography, curve fitting, information security, interpolation, least squares
References keywords
vault(12), fuzzy(12), biometric(12), fingerprint(7), scheme(6), chaff(6), security(5), generation(5), system(4), sciences(4)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2021-08-31
Volume 21, Issue 3, Year 2021, On page(s): 21 - 30
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2021.03003
Web of Science Accession Number: 000691632000003
SCOPUS ID: 85114832016
Abstract
Large cryptographic-key ensures high security and robustness of asymmetric and symmetric cryptography. The conventional Fuzzy Vault Scheme (FVS) biocrypto-system is employed to shield private or secret-key using biometric features. The strength of FVS consists in its polynomial degree and chaff-points. In FVS, the system's performance is degraded with increment in the polynomial degree to make system robust against attacks. Similarly, valid chaff-point generation is also a crucial task that needs to be considered in the conventional FVS. Therefore, an efficient and more secure Modified FVS (MFVS) using Least Square Polynomial Curve Fitting (LSPC) is proposed in this paper to enhance the security of conventional FVS. Moreover, Newtons Divided Difference Interpolation (NDDI) based new chaff-points generation method is also proposed to minimize the number of required candidate points. The proposed system demonstrations average accuracy as 100%, Genuine Acceptance Rate (GAR) as 99%, False Rejection Rate (FRR) as 1%, and False Acceptance Rate (FAR) as 0%. Security of MFVS is analyzed against brute-force attack, it evident that 10-Million more combinations are required to break the generated Fuzzy Vault as compared to prior research. Consequently, proposed chaff-point generation reduces required candidate points by 13-times than existing methods. |
References | | | Cited By «-- Click to see who has cited this paper |
[1] D. Sadhya, S. K. Singh, and B. Chakraborty, "Review of key-binding-based biometric data protection schemes," IET biom., vol. 5, no. 4, pp. 263-275, Dec. 2016, [CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 18] [2] Z. Jin, A. B. J. Teoh, B.-M. Goi, and Y.-H. Tay, "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation," Pattern Recognition, vol. 56, pp. 50-62, Aug. 2016, [CrossRef] [Web of Science Times Cited 68] [SCOPUS Times Cited 84] [3] Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh, "Symmetric keyring encryption scheme for biometric cryptosystem," Information Sciences, vol. 502, pp. 492-509, Oct. 2019, [CrossRef] [Web of Science Times Cited 14] [SCOPUS Times Cited 20] [4] N. Tantubay and J. Bharti , "Multimodal Key-Binding Biocrypto-System Using Leastsquare Polynomial Curvefitting Based New Featurelevel Fusion Method," INDJCSE, vol. 12, no. 1, pp. 10-20, Feb. 2021, [CrossRef] [SCOPUS Times Cited 2] [5] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Des Codes Crypt, vol. 38, no. 2, pp. 237-257, Feb. 2006, [CrossRef] [Web of Science Times Cited 448] [SCOPUS Times Cited 580] [6] B. Tams, P. Mihailescu, and A. Munk, "Security Considerations in Minutiae-Based Fuzzy Vaults," IEEE Trans.Inform.Forensic Secur., vol. 10, no. 5, pp. 985-998, May 2015, [CrossRef] [Web of Science Times Cited 63] [SCOPUS Times Cited 76] [7] V. Alarcon-Aquino, J. Ramirez-Cortes, O. Starostenko, H. Garcia-Baleon, and P. Gomez-Gil, "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids," IETE J Res, vol. 57, no. 4, p. 385, 2011, [CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 3] [8] D. Chang, S. Garg, M. Ghosh, and M. Hasan, "BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level," Information Sciences, vol. 546, pp. 481-511, Feb. 2021, [CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 24] [9] F. Benhammadi and K. Beghdad Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, vol. 32, no. 8, pp. 487-496, Aug. 2014, [CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 30] [10] T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," IET biom., vol. 5, no. 3, pp. 229-235, Sep. 2016, [CrossRef] [Web of Science Times Cited 32] [SCOPUS Times Cited 39] [11] T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication," in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications - WBMA '03, Berkley, California, 2003, p. 45. [CrossRef] [SCOPUS Times Cited 421] [12] M. Khalil-Hani and R. Bakhteri, "Securing cryptographic key with fuzzy vault based on a new chaff generation method," in 2010 International Conference on High Performance Computing & Simulation, Caen, France, Jun. 2010, pp. 259-265. [CrossRef] [SCOPUS Times Cited 21] [13] M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, vol. 29, no. 3, pp. 800-810, Mar. 2013, [CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 36] [14] G. Amirthalingam and G. Radhamani, "New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization," Journal of King Saud University - Computer and Information Sciences, vol. 28, no. 4, pp. 381-394, Oct. 2016, [CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 23] [15] G. S. Eskander, R. Sabourin, and E. Granger, "A bio-cryptographic system based on offline signature images," Information Sciences, vol. 259, pp. 170-191, Feb. 2014, [CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 30] [16] S. S. Ali, I. I. Ganapathi, S. Prakash, P. Consul, and S. Mahyo, "Securing biometric user template using modified minutiae attributes," Pattern Recognition Letters, vol. 129, pp. 263-270, Jan. 2020, [CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 28] [17] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. on Info. Security, vol. 2011, no. 1, p. 3, Dec. 2011, [CrossRef] [Web of Science Times Cited 440] [SCOPUS Times Cited 540] [18] A. I. Arrahmah, Y. S. Gondokaryono, and K.-H. Rhee, "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems," in 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, Oct. 2016, pp. 199-204. [CrossRef] [19] L. You, L. Yang, W. Yu, and Z. Wu, "A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features," Chin. j. electron, vol. 26, no. 2, pp. 236-243, Mar. 2017, [CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 15] [20] A. Kharab and R. Guenther, "The Method of Least-Squares," in An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition, Boca Raton, Floridaâ¯: CRC Press, [2018] CRC Press, 2018, pp. 209-234. [CrossRef] [21] A. K. Jaiswal and A. Khandelwal, "Curve fitting," in A textbook of computer based numerical and statistical techniques, New Delhi: New Age International Pvt. Ltd., 2009, pp. 387-424. [22] A. P. de Camargo, "On the numerical stability of Newton's formula for Lagrange interpolation," Journal of Computational and Applied Mathematics, vol. 365, p. 112369, Feb. 2020, [CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 12] [23] R. Douaifia, S. Bendoukha, and S. Abdelmalek, "A Newton interpolation based predictor-corrector numerical method for fractional differential equations with an activator-inhibitor case study," Mathematics and Computers in Simulation, vol. 187, pp. 391-413, Sep. 2021, [CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 9] [24] L. Gupta, L. Barash, and I. Hen, "Calculating the divided differences of the exponential function by addition and removal of inputs," Computer Physics Communications, vol. 254, p. 107385, Sep. 2020, [CrossRef] [Web of Science Times Cited 8] [SCOPUS Times Cited 9] [25] J. Abraham, P. Kwan, and J. Gao, "Fingerprint Matching using A Hybrid Shape and Orientation Descriptor," in State of the art in Biometrics, J. Yang, Ed. InTech, 2011. [CrossRef] [26] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET biom., vol. 4, no. 1, pp. 29-39, Mar. 2015, [CrossRef] [Web of Science Times Cited 19] [SCOPUS Times Cited 21] [27] T. K. Dang, M. T. Nguyen, and Q. H. Truong, "Chaff point generation mechanism for improving fuzzy vault security," IET Biometrics, vol. 5, no. 2, pp. 147-153, Jun. 2016, [CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 8] [28] D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme," Cluster Comput, vol. 22, no. S5, pp. 12817-12825, Sep. 2019, [CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 8] [29] H. Choi, Y. Chung, W. Choi, S. Lee, H. Cho, and S. Pan, "Smartcard-based Secret Distribution for Secure Fingerprint Verification," IETE J Res, vol. 57, no. 4, p. 299, 2011, [CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2] [30] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Improved chaff point generation for vault scheme in bio-cryptosystems," IET biom., vol. 2, no. 2, pp. 48-55, Jun. 2013, [CrossRef] [Web of Science Times Cited 21] [SCOPUS Times Cited 24] Web of Science® Citations for all references: 1,298 TCR SCOPUS® Citations for all references: 2,083 TCR Web of Science® Average Citations per reference: 42 ACR SCOPUS® Average Citations per reference: 67 ACR TCR = Total Citations for References / ACR = Average Citations per Reference We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more Citations for references updated on 2024-12-06 16:56 in 197 seconds. Note1: Web of Science® is a registered trademark of Clarivate Analytics. Note2: SCOPUS® is a registered trademark of Elsevier B.V. Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site. |
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.