|3/2021 - 3|
An Efficient Biocrypto-system Using Least Square Polynomial Curve Fitting with Interpolation Based New Chaff-Points Generation MethodTANTUBAY, N. , BHARTI, J.
|View the paper record and citations in|
|Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science|
|Download PDF (1,792 KB) | Citation | Downloads: 566 | Views: 378|
cryptography, curve fitting, information security, interpolation, least squares
vault(12), fuzzy(12), biometric(12), fingerprint(7), scheme(6), chaff(6), security(5), generation(5), system(4), sciences(4)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2021-08-31
Volume 21, Issue 3, Year 2021, On page(s): 21 - 30
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2021.03003
Web of Science Accession Number: 000691632000003
SCOPUS ID: 85114832016
Large cryptographic-key ensures high security and robustness of asymmetric and symmetric cryptography. The conventional Fuzzy Vault Scheme (FVS) biocrypto-system is employed to shield private or secret-key using biometric features. The strength of FVS consists in its polynomial degree and chaff-points. In FVS, the system's performance is degraded with increment in the polynomial degree to make system robust against attacks. Similarly, valid chaff-point generation is also a crucial task that needs to be considered in the conventional FVS. Therefore, an efficient and more secure Modified FVS (MFVS) using Least Square Polynomial Curve Fitting (LSPC) is proposed in this paper to enhance the security of conventional FVS. Moreover, Newtons Divided Difference Interpolation (NDDI) based new chaff-points generation method is also proposed to minimize the number of required candidate points. The proposed system demonstrations average accuracy as 100%, Genuine Acceptance Rate (GAR) as 99%, False Rejection Rate (FRR) as 1%, and False Acceptance Rate (FAR) as 0%. Security of MFVS is analyzed against brute-force attack, it evident that 10-Million more combinations are required to break the generated Fuzzy Vault as compared to prior research. Consequently, proposed chaff-point generation reduces required candidate points by 13-times than existing methods
|References|||||Cited By «-- Click to see who has cited this paper|
| D. Sadhya, S. K. Singh, and B. Chakraborty, "Review of key-binding-based biometric data protection schemes," IET biom., vol. 5, no. 4, pp. 263-275, Dec. 2016, |
[CrossRef] [Web of Science Times Cited 11] [SCOPUS Times Cited 13]
 Z. Jin, A. B. J. Teoh, B.-M. Goi, and Y.-H. Tay, "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation," Pattern Recognition, vol. 56, pp. 50-62, Aug. 2016,
[CrossRef] [Web of Science Times Cited 55] [SCOPUS Times Cited 64]
 Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh, "Symmetric keyring encryption scheme for biometric cryptosystem," Information Sciences, vol. 502, pp. 492-509, Oct. 2019,
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 8]
 N. Tantubay and J. Bharti , "Multimodal Key-Binding Biocrypto-System Using Leastsquare Polynomial Curvefitting Based New Featurelevel Fusion Method," INDJCSE, vol. 12, no. 1, pp. 10-20, Feb. 2021,
[CrossRef] [SCOPUS Times Cited 1]
 A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Des Codes Crypt, vol. 38, no. 2, pp. 237-257, Feb. 2006,
[CrossRef] [Web of Science Times Cited 369] [SCOPUS Times Cited 486]
 B. Tams, P. Mihailescu, and A. Munk, "Security Considerations in Minutiae-Based Fuzzy Vaults," IEEE Trans.Inform.Forensic Secur., vol. 10, no. 5, pp. 985-998, May 2015,
[CrossRef] [Web of Science Times Cited 49] [SCOPUS Times Cited 55]
 V. Alarcon-Aquino, J. Ramirez-Cortes, O. Starostenko, H. Garcia-Baleon, and P. Gomez-Gil, "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids," IETE J Res, vol. 57, no. 4, p. 385, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 3]
 D. Chang, S. Garg, M. Ghosh, and M. Hasan, "BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level," Information Sciences, vol. 546, pp. 481-511, Feb. 2021,
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 8]
 F. Benhammadi and K. Beghdad Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, vol. 32, no. 8, pp. 487-496, Aug. 2014,
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 28]
 T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," IET biom., vol. 5, no. 3, pp. 229-235, Sep. 2016,
[CrossRef] [Web of Science Times Cited 21] [SCOPUS Times Cited 28]
 T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication," in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications - WBMA '03, Berkley, California, 2003, p. 45.
[CrossRef] [SCOPUS Times Cited 403]
 M. Khalil-Hani and R. Bakhteri, "Securing cryptographic key with fuzzy vault based on a new chaff generation method," in 2010 International Conference on High Performance Computing & Simulation, Caen, France, Jun. 2010, pp. 259-265.
[CrossRef] [SCOPUS Times Cited 20]
 M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, vol. 29, no. 3, pp. 800-810, Mar. 2013,
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 33]
 G. Amirthalingam and G. Radhamani, "New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization," Journal of King Saud University - Computer and Information Sciences, vol. 28, no. 4, pp. 381-394, Oct. 2016,
[CrossRef] [SCOPUS Times Cited 20]
 G. S. Eskander, R. Sabourin, and E. Granger, "A bio-cryptographic system based on offline signature images," Information Sciences, vol. 259, pp. 170-191, Feb. 2014,
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 27]
 S. S. Ali, I. I. Ganapathi, S. Prakash, P. Consul, and S. Mahyo, "Securing biometric user template using modified minutiae attributes," Pattern Recognition Letters, vol. 129, pp. 263-270, Jan. 2020,
[CrossRef] [Web of Science Times Cited 12] [SCOPUS Times Cited 14]
 C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. on Info. Security, vol. 2011, no. 1, p. 3, Dec. 2011,
[CrossRef] [SCOPUS Times Cited 440]
 A. I. Arrahmah, Y. S. Gondokaryono, and K.-H. Rhee, "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems," in 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, Oct. 2016, pp. 199-204.
 L. You, L. Yang, W. Yu, and Z. Wu, "A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features," Chin. j. electron, vol. 26, no. 2, pp. 236-243, Mar. 2017,
[CrossRef] [Web of Science Times Cited 8] [SCOPUS Times Cited 13]
 A. Kharab and R. Guenther, "The Method of Least-Squares," in An Introduction to Numerical Methods: A MATLABÂ® Approach, Fourth Edition, Boca Raton, Floridaâ¯: CRC Press,  CRC Press, 2018, pp. 209-234.
 A. K. Jaiswal and A. Khandelwal, "Curve fitting," in A textbook of computer based numerical and statistical techniques, New Delhi: New Age International Pvt. Ltd., 2009, pp. 387-424.
 A. P. de Camargo, "On the numerical stability of Newton's formula for Lagrange interpolation," Journal of Computational and Applied Mathematics, vol. 365, p. 112369, Feb. 2020,
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 5]
 R. Douaifia, S. Bendoukha, and S. Abdelmalek, "A Newton interpolation based predictor-corrector numerical method for fractional differential equations with an activator-inhibitor case study," Mathematics and Computers in Simulation, vol. 187, pp. 391-413, Sep. 2021,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2]
 L. Gupta, L. Barash, and I. Hen, "Calculating the divided differences of the exponential function by addition and removal of inputs," Computer Physics Communications, vol. 254, p. 107385, Sep. 2020,
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 7]
 J. Abraham, P. Kwan, and J. Gao, "Fingerprint Matching using A Hybrid Shape and Orientation Descriptor," in State of the art in Biometrics, J. Yang, Ed. InTech, 2011.
 T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET biom., vol. 4, no. 1, pp. 29-39, Mar. 2015,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 19]
 T. K. Dang, M. T. Nguyen, and Q. H. Truong, "Chaff point generation mechanism for improving fuzzy vault security," IET Biometrics, vol. 5, no. 2, pp. 147-153, Jun. 2016,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 6]
 D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme," Cluster Comput, vol. 22, no. S5, pp. 12817-12825, Sep. 2019,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 4]
 H. Choi, Y. Chung, W. Choi, S. Lee, H. Cho, and S. Pan, "Smartcard-based Secret Distribution for Secure Fingerprint Verification," IETE J Res, vol. 57, no. 4, p. 299, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2]
 T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Improved chaff point generation for vault scheme in bio-cryptosystems," IET biom., vol. 2, no. 2, pp. 48-55, Jun. 2013,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 20]
Web of Science® Citations for all references: 664 TCR
SCOPUS® Citations for all references: 1,729 TCR
Web of Science® Average Citations per reference: 21 ACR
SCOPUS® Average Citations per reference: 56 ACR
TCR = Total Citations for References / ACR = Average Citations per Reference
We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more
Citations for references updated on 2022-06-29 12:58 in 177 seconds.
Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.