Title: Finger multibiometric cryptosystem based on score-level fusion

Authors: Jialiang Peng; Qiong Li; Ahmed A. Abd El-Latif; Xiamu Niu

Addresses: School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150080, China; Information and Network Administration Center, Heilongjiang University, Harbin 150080, China ' School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150080, China ' Department of Mathematics, Faculty of Science, Menoufia University, 32511 Shebin El-Koom, Egypt ' School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150080, China

Abstract: As a very promising approach, multibiometrics has been extensively studied to overcome the limitations of unibiometrics for high recognition performance in recent years. However, multibiometric systems always store multiple biometric templates for each user, which causes significant risks to user privacy and system security. In this paper, we address two critical issues in the design of finger multibiometric system, i.e., fusion methodology and template security. First, the score-level fusion framework using Fuzzy Commitment Scheme is proposed to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print and finger shape traits. Second, the security of the proposed multibiometric cryptosystem is analysed on the basis of the correcting capacity of Error Correcting Code. The experimental results and security evaluation are conducted on a merged finger multimodal biometrics database. The comparative experiments show that the proposed finger multibiometric cryptosystem outperforms the unibiometric counterparts in terms of verification performance and template security.

Keywords: multibiometrics; template protection; finger recognition; score-level fusion; FCS; fuzzy commitment scheme; biometrics; cryptosystems; template security; fingerprints; finger veins; knuckle prints finger shapes; error correcting code; ECC.

DOI: 10.1504/IJCAT.2015.068923

International Journal of Computer Applications in Technology, 2015 Vol.51 No.2, pp.120 - 130

Published online: 20 Apr 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article