Вы находитесь на странице: 1из 5

International Journal for Research in Technological Studies| Vol.

2, Issue 11, October 2015 | ISSN (online): 2348-1439

Securing Multimodal Biometric Template using Visual Cryptography


A.Nandhinipreetha1 Dr.N.Radha2
1
Research Scholar 2Assistant Professor
1,2
Department of Computer Science
1,2
PSGR Krishnammal College for Women, Coimbatore
Abstract Authentication of the user is the major problem encryption and the second is decryption. The process of
in todays application. Biometric system provides high level splitting the secret image into shares is called encryption.
security operations. Single biometric system has variety of Then the shares are given to n number of users. The original
problems like noisy data, non-universality, intra class image is reconstructed only by stacking the correct shares.
variants and spoof attacks. To address these issues This process is called decryption. This visual cryptographic
multimodal biometric system is used and to avoid spoof scheme is applied for the biometric template to increase the
attack visual cryptographic technique is applied to the security. The security level is increased by applying this
biometric data. In this paper iris and signature biometric scheme, by splitting up the biometric template into shares.
are used. The images are preprocessed and features are In the proposed work to combine iris and signature
extracted for iris and signature images. Then the visual biometric feature level fusion technique is used.
cryptographic scheme is applied for the biometric template
to generate the shares. Visual cryptography acts as an II. RELATED WORKS
additional layer of security for multimodal biometric To provide more security for the biometric data visual
system. The proposed work is evaluated with evaluation cryptographic scheme is used. Some of the work that is
metrics FAR, FRR and Accuracy. related technique is listed below.
Keywords Biometrics, Visual Cryptography, IRIS, Naor and et. al[1] introduced visual cryptographic
Signature scheme, it is a simple secret sharing scheme used to encrypt
the visual information and the decryption is done by human
I. INTRODUCTION visual system. The shares are generated based on the pixel.
There are numerous techniques are developed for the For example to generate two share, share 1 and share 2, if
document security. One of the universal techniques to the pixel is black one of the two rows is selected from the
achieve the security is through encryption and table and If the pixel is white one of the above two rows are
authentication. Encryption is a process of changing the selected. This scheme is proposed for the secure
actual content using the keys. Authentication is the process authentication.
of verifying the person authenticity before accessing the
system. Biometric system is used to generate the patterns
from the user and it is verified through the same user
biometric patterns. Finger print, face, iris, retina etc are the
biometric traits used for the authentication process. There
are several applications where personal identifications are
used for authentication such as bank ATM, secure electronic
banking, mobile access etc. Unimodal biometric
authentication uses single biometric character such as face,
iris, finger print, palm print. Multimodal biometrics uses
more than one trait.
In the proposed work, iris and signature biometrics
are used for authentication process. Human iris has many
special optical and physiological characteristics which can
be exploited to defend against possible spoofing. It is a
unique pattern of identification. This iris authentication is
commonly used in border crossing, airport security and in
many biometric securities. Iris segmentation is important in Table 1: Naor and Shamir technique
iris recognition, the initial stage of the segmentation is to Julien binger et. al[2] applied visual cryptographic
detect the puple-iris boundary. Signature authentication is technique to finger print features. It is proposed for enabling
mostly used in banking and finance industry to avoid a blind alignment of the fresh image and the reference
duplicate signature frauds. Is has low error rate, cheap image. The encryption process is done by dividing the finger
hardware and it only requires little storage. One of the print image into shares based on visual cryptographic
significant issues in the biometric authentication is scheme and then the shares are stored in separate database.
protecting the biometric template of the user which is stored Visual cryptography which provides storage protection for
in the database. the data stored in separate location.
Visual cryptography is one of the secret sharing Arun ross et. al[3] proposed multiple biometric
schemes, used to hide the secrets from unwanted persons. system for preserving the digital biometric data (face image)
Naor and Shamir [11] introduced simple cryptographic using visual cryptographic scheme. To improve the security
method called visual cryptography for protecting the secrets. level in biometrics multiple faces are used. Secret image is
Visual cryptography has two main processes, the first is dithered into two other images, that two shares are stored in

Copyright IJRTS | www.ijrts.com 85


Securing Multimodal Biometric Template using Visual Cryptography
(IJRTS/Vol. 2/Issue 11/Oct. 2015)

separate database. The secret face image is revealed only value helps to reduce the pixel expansion. As a result of
when both the shares are available simultaneously. To using these combinations of technique which helps to
recover the original template XOR operator is used. It is provide better security and it reduce the pixel expansion.
difficult to identify the secrets with one share. Shital. B. patil et. al [11] introduced biometric
Renu Poriye et. al[4] proposed visual cryptographic privacy to protect important datas from attacks. By using
scheme for binary image. Symmetric key is used to encrypt visual cryptographic technique face image is separated into
the secrets and then it is divided into shares. By stacking the two host images and these shares are saved in two different
shares alone does not give any information about the secrets. database. The original image is retrieved only by stacking
In order to get the information of secret, symmetric key both the shares .The single share which does not provide any
must be used. information about the original biometric data.
Ganthimathi amirthalingam et. al[5] used Ankita Gharat et. al [12] used visual cryptography
multimodal biometrics, which solves the problem of spoof with pixel sharing for the biometric data such as fingerprint
attacks, unacceptable error rates, intra class variations. Face image. To protect the biometric data from unavoidable
and ear biometrics are used to increase the robustness of the hacking from the attackers visual cryptographic scheme is
recognition system. The authorization is done using fuzzy applied in biometric data. Two shares are generated from the
vault. The unimodal disadvantages are rectified by this biometric image that are stored in two separate database
multimodal biometrics. after the encryption is applies. To recover the biometric
Muthukumar et. al[6] introduced multimodal image XOR operator is used.
cryptosystem to improve the authentication and security. To Sandeep katta et. al [13] uses recursive hiding
form the cryptosystem fuzzy vault is combined with two scheme for 3 out of 5 secret sharing. The secret
separate biometric images such as fingerprint and iris. informations are selected according to their size that is
Evolutionary algorithm and partial swarm optimation smaller image to larger and vice versa. At each consecutive
algorithm is used in this multimodal biometrics. level the shares are distributed, its not easy for anyone to
Vionthini et. al[7] introduced biometric based access all the shares in the smaller image. In real cyber
visual cryptography scheme to solve the authentication world the method like recursive information hiding in visual
issues. Stenographed fingerprint image is used, which is cryptography can be applied in many applications. By
separated into two shares, one is stored in the bank database implanting the final decryption process in human visual
and other one is given to the customer. Hash code is system instead of complex computation is the major
generator for each customer shares and this code is stored in advantages. The 3 out of 5 recursive hiding scheme can be
the bank database. During the transaction the customer extended to a k out of n scheme.
wants to provide the shares. The shares are verified for the
transaction with the other share that is stored in the database III. METHODOLOGY
for the access. This improves the security level in The process involved in this work is mainly for the purpose
biometrics. of secure biometric authentication. The process involved in
Bakhtiar Affendi Rosdi et. al [8] proposed personal this methodology is listed below.
verification method using finger vein to provide more
security because it is inside the human body. Local Line
IV. PREPROCESSING
Binary Pattern (LLBP) is used for the feature extraction of
the finger vein. This method (i.e) Local Line Binary Pattern The purpose of preprocessing phase is to make biometric
which provides better performance when compared to Local image standard and ready for feature extraction. The
binary pattern (LBP) and Local derivative pattern (LDP). preprocessing stage primarily involves some of the
Error rate of the Local Line Binary Pattern is lower than following steps:
LBP and LDP. 1) Segmentation: Circular Hough transform is used
Thomas monoth et. al [9] proposed visual for the segmentation of iris and also signature.
cryptographic scheme for the finger print image for provide 2) Normalization: Daughman Rubber sheet is applied
secure transmission. The fingerprint image is broken into n to normalize the iris image.
number of shares which does not provide any information 3) Binarization: Transformation from color to
about the secret image. These shares are distributed to n grayscale, and then to binary.
number of participants. The original fingerprint is recovered 4) Noise reduction: A low pass filter is applied to
only by combining min a number of shares. The remove the noise.
reconstruction of the secret image is based on XNOR A. Segmentation of IRIS
operation.
1) To detect the Circle Object
Thomas Hofmeister et. al [10] use (k, n) scheme to
Ig (x, y) = ( I2 gh (x, y) + I2 gv (x, y))1/2 --- (1)
compute exactly the best contrast of image. The optimal
trade between the contrast and the number of sub pixels will Where (a, b) is the centre of the circle, and r is the radius. If
be proved by using different approach via coding theory. a point in the (x, y) is fixed, then the parameters can be
found according to (1).
The main goal of this paper is to achieve security and
contrast. The usage of contrast optimal scheme helps to
solve the linear program problems. The efficient number of
sub pixel can be achieved by constructing contrast optimal
(k, n) scheme. By limiting the pixel value (i.e.) threshold

Copyright IJRTS | www.ijrts.com 86


Securing Multimodal Biometric Template using Visual Cryptography
(IJRTS/Vol. 2/Issue 11/Oct. 2015)

2) The operator finds the maximum pixel intensity value 2) This Min-Max normalization is used to obtain
change (J) by searching the image within the defined radius normalized cross correlation and is used to maintain the
parameters with a circular integral centred on the point (x0, original data values.
y0), with radius r of the radial derivate of the original image
E. Binarization
blurred with a Gaussian kernel G.
3) J, in this case corresponds to the iris-sclera (white) Binarization is the process of converting original image into
boundary. The pixel intensity change is so great between binary image.
those regions. 1) Feature Extraction of IRIS
4) The pupil boundary is then found within the iris-sclera Iris feature extraction is done using Gabor Filter by
boundary. The pupil boundary corresponds to the second convolving the normalized iris pattern into one dimensional
largest value of J. Log-Gabor wavelets.
G (u, v) = exp {-(log (u1/u0)2/2log (k/u0)2)} exp (-v12/2v)
(2) (6)
5) Eyelid Removal In the above equation represents orientation of
An edge map of the image is created using canny modified Gabor filter, u0 represents center frequency, k
edge detection. represents the bandwidth of the filter in the u1 direction and
v represents the bandwidth of the filter in v1 direction.
A line is fitted to both eyelids using the Linear
Hough Transform. F. Feature Extraction of Signature
Another line is drawn to bisect the first line at the The feature extraction of the signature is done using
iris edge closest to the pupil. principle component analysis. The sign of the signed
6) Eyelashes are removed by thresholding since they are curvature k indicates the direction in which the unit tangent
usually darker than the eyes. All values less than the vector rotates as a function of the parameter along the curve.
threshold value were set to N. If the unit tangent rotates counter clockwise, then k > 0. If it
B. Normalization of IRIS rotates clockwise, then k < 0.The signed curvature depends
on the particular parameterization chosen for a curve.
1) The segmented iris is normalized using

(3) (7)
where
Emin = the minimum value for variable E
Emax = the maximum value for variable E
If Emax is equal to Emin then Normalized (ei) is set to 0.5.
C. Segmentation of Signature

(4)
Where
i= selected writing point
()= angle with the left(right) neighbourhood
k= selected neighboring writing point
n=first observed neighboring writing point
max=limiting angle
1) This separates the curve lines of a signature in
areas of nonzero values spaced by areas of zero
values.
2) Nonzero domain is used to characterize the
important area of signature and it is represented by
the point of maximum significance.
3) (s) of a writing angle depends on the neighboring
angle. Fig. 1: Enrolment process of proposed work
D. Normalization of Signature G. Fusion
1) The signature is normalized using Feature level fusion is obtained by concatenating the
features points obtained from both the iris and signature
images. In the iris and signature, features were extracted for
(5) each biometric image. Both features are concatenated and
stored for the authentication purpose.
H. Share Generation
Every secret pixel of the image is converted into four sub
pixels of two share images and is recovered by using the
logical OR operation between the shares as illustrated in

Copyright IJRTS | www.ijrts.com 87


Securing Multimodal Biometric Template using Visual Cryptography
(IJRTS/Vol. 2/Issue 11/Oct. 2015)

table.1. The four sub pixels are generated from a pixel of the cryptographic scheme and decrease the FAR and FRR
secret image in a way that two sub pixels are white and two which will improve the authentication level.
sub pixels are black. The black or white pixel selection is
based on random selection. REFERENCES
[1] Naor, shamir, Visual cryptography Advances in
cryptology- Eurocrypt94, pp. 1-12.
[2] Julien binger, Herve chambanne, visual cryptography
applied to finger print features as a solution for pre-
alignment, International journal of research studies in
computer science and engineering, 2013, Vol. 1, No. 4,
pp. 46-52.
[3] Arun Ross, Asem Othman, Visual cryptogrphy for
biometric privacy, IEEE Transactions on Information
Forensics and Security, 2011, Vol. 6, No. 1, pp. 70-80.
[4] Renu poriye, Tyagi, secret sharing using visual
cryptography, International journal of research studies
in computer science and engineering, 2014,Vol.1,
No.4, pp.46-52.
[5] Gandhimathi, Radhamani, A Multimodal approach
for face and ear biometric system, International
journal of computer science, 2013, Vol. 10, No. 2, pp.
234-241.
[6] Muthukumar, Kasthuri, Kannan, Multimodal
biometric authendication using particle swarm
optimization algorithm with fingerprint and iris,
ICTACT Journal of image and video processing, 2012,
Vol. 2, No. 3, pp. 369-374.
Fig. 2 Authentication process of proposed work [7] Vinodhini, Premanand, Natrajan, Visual cryptography
using two factor biometric system for trust worthy
V. EXPERIMENTAL RESULTS authendication, International journal of scientific and
The proposed system is evaluated in MATLAB 2014a. research publications, 2012, Vol. 3, No. 3, pp. 1-5.
Evaluation of the system is done by measuring False [8] Bakhtiar Affendi Rosdi, Chai Wuh Shing, Shahrel
Acceptance Rate (FAR), False Rejection Rate (FRR) and Azmin Suandi, Finger vein recognition using local
Genuine Acceptance Rate (GAR). Visual cryptographic line binary pattern, sensors, 2011, Vol. 11, No. 12,
scheme is applied for the fused template for preserving the pp. 11357-11371.
original biometric data. So, that the security of the system is [9] Thomas Monoth, Babu Anto, Tamper proof
increased with low FAR of 3%, FRR of 2.7% and accuracy transmission of fingerprints using visual cryptography
of 97%. The result of the proposed system is mentioned in schemes, ELSEVEIR, 2010, Vol. 2, No. 3, pp. 143-
figure.5. 148.
[10] Thomas Hofmeister, contrast-optimal k out of n secret
sharing schemes in visual cryptography, Elsevier,
2000, Vol.5, No.4, pp.471-485.
[11] Shitlal Patil, Um nagaraj, Preservation of biometric
data using visual cryptography, International journal
of computer technology and applications, 2014, Vol. 5,
No. 3, pp. 937-940.
[12] Ankita Gharat, Preeti Tambre, Biometric privacy
using visual cryptography, International journal of
Fig. 3 Performance of proposed system advanced research in computer engineering and
technology, 2013, Vol. 2, No. 1, pp. 180-185.
VI. CONCLUSION AND FUTURE WORK [13] Sandeep Katta, Visual secret sharing scheme using
grayscale images, International journal of Information
The proposed work is to improve the accuracy of the Processing Letters, 2009, Vol. 27, No. 6, pp.255-259.
secured biometric system with iris and signature. The [14] Anjali Varshini, Dinesh Goyal, Analysis and design
biometric images are pre-processed and features are of multishare secret message sharing using visual
extracted from iris and signature images using Gabor filter cryptography, International journal of computer
and principle component analysis simultaneously. By application, 2014, Vol. 102, No. 13, pp. 19-23.
applying visual cryptographic technique, security level gets [15] Archana Dolly, Nithin Janwe, An implementation of
increased. Thus the experimental result of the proposed algorithm in visual cryptography in image,
system achieves secure authentication result. In future, the International journal of scientific and research
proposed work can be done by applying different visual publication, 2013, Vol.3, No.3, pp. 1-4.

Copyright IJRTS | www.ijrts.com 88


Securing Multimodal Biometric Template using Visual Cryptography
(IJRTS/Vol. 2/Issue 11/Oct. 2015)

[16] Jinfeng Yang, Yihua Shi, Jinli Yang, Finger vein


regonization based on a bank of Gabor filters,
Springer, 2010, Vol. 5994, pp. 374-383.
[17] Lakshmi Deepika, Kandaswamy, An algorithm for
improved accuracy in unimodal biometric systems
through fusion of multiple feature sets, 2009, Vol. 9,
No. 3, pp. 33-40.
[18] Pandey, Neeraj shukla, Visual cryptography scheme
using compressed random share, International journal
of advance researchs in computer science and
management studies,2013, Vol. 1, No. 4, pp. 62-66.
[19] Revenkar, Anisha anjun, Gandhare, Secure iris
authendication using visual cryptography,
International journal of computer science and
information security, 2010, Vol. 7 , No. 3, pp. 217-221.
[20] Satyendra Nath Mandal, Subhankar Dutta and Ritam
Sarkar, Block based symmetric key visual
cryptography, International journal of computer
network and information security, 2012, Vol. 9, N0. 4,
pp. 10-19.
[21] Zhi Liu, Jinan, Shangling Song, An embedded real-
time finger-vein recognition system for mobile
devices, IEEE transactions, 2012, Vol. 52, No. 2, pp.
522-527.

Copyright IJRTS | www.ijrts.com 89

Вам также может понравиться