A linear convolution-based cancelable fingerprint biometric authentication system

Article


Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583
Article Title

A linear convolution-based cancelable fingerprint biometric
authentication system

ERA Journal ID17813
Article CategoryArticle
AuthorsYang, Wencheng (Author), Wang, Song (Author), Kang, James Jin (Author), Johnstone, Michael N. (Author) and Bedari, Aseel (Author)
Journal TitleComputers and Security
Journal Citation114, pp. 1-14
Article Number102583
Number of Pages14
Year2022
Place of PublicationUnited Kingdom
ISSN0167-4048
1872-6208
Digital Object Identifier (DOI)https://doi.org/10.1016/j.cose.2021.102583
Web Address (URL)https://www.sciencedirect.com/science/article/pii/S0167404821004065
Abstract

Authentication is a critical requirement of many systems, in domains such as law enforcement, financial services and consumer devices. Due to poor user practices, especially regarding passwords, biometric technologies have been presented as a viable solution, and have been constantly evolving to meet this requirement. It is important to consider the security aspects of any proposed biometric authentication system, as threats targeting biometric template data are serious. Given that the original biometric data are not revocable, if compromised, they are lost (or tainted) forever. To prevent biometric template data from being compromised by attackers, we propose a new linear convolution-based cancelable fingerprint authentication system. In the proposed system, instead of using the original feature data themselves as the inputs to the linear convolution function, the second input is replaced by a help vector, which guarantees that errors from one part of the template data do not impact other parts. Moreover, to ensure the safety of the help vector chosen from a help vector pool in the lost-key scenario, a feature-guided index generation algorithm is developed. The experimental results show that the proposed system achieves satisfactory recognition accuracy, while providing strong protection to fingerprint template data.

KeywordsAuthentication; Biometrics; Fingerprint; Linear convolution; Template protection
ANZSRC Field of Research 2020460402. Data and information privacy
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsEdith Cowan University
La Trobe University
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q7v21/a-linear-convolution-based-cancelable-fingerprint-biometric-authentication-system

  • 167
    total views
  • 3
    total downloads
  • 3
    views this month
  • 0
    downloads this month

Export as

Related outputs

Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. https://doi.org/10.1049/cit2.12283
An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction
Wei, Shicheng, Li, Yan and Yang, Wencheng. 2023. "An Adaptive Feature Fusion Network for Alzheimer’s Disease Prediction." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Germany. https://doi.org/10.1007/978-981-99-7108-4
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things
Wang, Nai, Chen, Junjun, Wu, Di, Yang, Wencheng, Xiang, Yong and Sajjanhar, Atul. 2023. "Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things." Journal of Information Security and Applications. 75. https://doi.org/10.1016/j.jisa.2023.103483
A review of multi-factor authentication in the Internet of Healthcare Things
Suleski, Tance, Ahmed, Mohiuddin, Yang, Wencheng and Wang, Eugene. 2023. "A review of multi-factor authentication in the Internet of Healthcare Things." Digital Health. 9, pp. 1-20. https://doi.org/10.1177/20552076231177144
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439
A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003
Network Forensics in the Era of Artificial Intelligence
Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats
Karie, Nickson M., Bin Sahri, Nor Masri Bin, Yang, Wencheng and Johnstone, Michael N.. 2022. "Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 141-169