SlideShare a Scribd company logo
1 of 10
Download to read offline
Optics and Photonics Journal, 2015, 5, 6-14
Published Online January 2015 in SciRes. http://www.scirp.org/journal/opj
http://dx.doi.org/10.4236/opj.2015.51002
How to cite this paper: Takeda, M., Nakano, K., Suzuki, H. and Yamaguchi, M. (2015) Encrypted Sensing Based on Digital
Holography for Fingerprint Images. Optics and Photonics Journal, 5, 6-14. http://dx.doi.org/10.4236/opj.2015.51002
Encrypted Sensing Based on Digital
Holography for Fingerprint Images
Masafumi Takeda1*, Kazuya Nakano2, Hiroyuki Suzuki3, Masahiro Yamaguchi4
1
Graduate School of Science & Engineering, Tokyo Institute of Technology, 4259 Nagatsuta-cho, Midori-ku,
Yokohama, Japan
2
Nippon Sport Science University, 1221-1 Kamoshida-cho, Aoba-ku, Yokohama, Japan
3
Imaging Science & Engineering Laboratory, Tokyo Institute of Technology, 4259 Nagatsuta-cho, Midori-ku,
Yokohama, Japan
4
Global Scientific Information and Computing Center, Tokyo Institute of Technology, 2-12-1 Ookayama,
Meguro-ku, Tokyo, Japan
Email:
*
takeda.m.ad@hotmail.com
Received 23 November 2014; accepted 5 December 2014; published 13 January 2015
Copyright © 2015 by authors and Scientific Research Publishing Inc.
This work is licensed under the Creative Commons Attribution International License (CC BY).
http://creativecommons.org/licenses/by/4.0/
Abstract
We propose a novel biometric sensing technique for personal authentication in which fingerprint
images are captured using an optical encryption method. This method can reduce the risk of data
theft or leakage of personal information captured by biometric sensing. This method, termed en-
crypted sensing, is implemented using digital holography with double random phase encoding. We
demonstrate experimentally that a fingerprint image can be captured as an optically encrypted
image and can be restored correctly only when the correct cipher key is used. Moreover, we inves-
tigate experimentally the verification accuracy of the decrypted images.
Keywords
Biometric Authentication, Digital Holography, Double Random Phase Encoding, Fingerprinting
1. Introduction
Recently, there has been a rise in the use of biometric authentication systems in a wide variety of secure in-
terfaces, including computer logins, banking systems, automated teller machines, and building entrance man-
agement. Because biometric information represents important personal data, and because enrolled biometric
information, unlike most personal authentication information such as passwords, cannot be altered, it is ne-
cessary to take great care to prevent leakage of these data. Correspondingly, template protection techniques
*
Corresponding author.
M. Takeda et al.
7
for biometric authentication have been actively pursued through the development of cryptographic algorithms
that protect raw biometric information obtained using a sensor while preserving high verification accuracy
[1]-[4]. However, particular threats, such as side-channel attacks [5] occurring while raw biometric informa-
tion is being transformed into a protected template, are becoming increasingly realistic. It is believed that
threats such as these can be avoided by encrypting biometric images prior to image sensing, i.e., optical en-
cryption.
Optical encryption techniques apply optical calculation methods such as optical wave propagation oroptical
phase modulation for image encryption and decryption. These techniques are advantageous not only for rapid
calculations using parallel processing, but also security enhancement due to non-electronic computation methods,
because there is less risk of optical information being read, as opposed to digital data in electronic devices,
which are inevitably exposed to a number of security risks. Double random phase encoding (DRPE) [6] is a
well-known optical encryption method that has been studied extensively for two decades. DRPE is an optical
symmetric-key encryption technique in which an optical image is encrypted by multiplying two random phase
masks in the spatial and Fourier or Fresnel planes. To obtain an optically-encrypted image, digital holography
(DH) [7]-[10] is commonly employed. DH makes it possible to not only capture an optical wavefront as holo-
graphic data, but also to reconstruct various styles of optical wavefront computationally from the holographic
data. DRPE has been implemented using DH [7] [11], whereby the random phase masks are typically inserted
into the object beam path. Suchan optical system requires precise alignment; however, it is challenging to recon-
struct the object image with high quality from the DH. Tajahuerce and Javidi proposed an optical encryption
system for three-dimensional (3D) objects [12], whereby an encrypted image was obtained with simple align-
ment because only the reference beam was modulated using a random phase mask, and a non-modulated wave
was used as the object beam. This optical arrangement could be implemented easily and can restore a clear ob-
ject image from a DH. However, the encrypted image was not equivalent to DRPE because the object beam was
not modulated by a random phase mask, which might decrease the security level of encryption. To obtain a fin-
gerprint image for biometric authentication, both sufficient security to prevent data leakage and sufficient image
quality for highly accurate recognition are required. Therefore, we propose an optical security system that is
suitable for obtaining fingerprint images as optically encrypted holographic data. We term this system “en-
crypted sensing”. In addition, we also propose an image reconstruction method through which we can obtain a
clear fingerprint image from the encrypted hologram. To obtain the reconstructed image with high quality, we
apply speckle reduction using multiple holograms, as well as reconstruction using a phase only mask, rather than
a complex amplitude mask. We demonstrate that improved recognition accuracy is obtained by applying only a
phase-only mask and speckle reduction.
The remainder of the paper is organized as follows. In the following section, a theoretical description of the
proposed sensing system is given. In Section 3, experiments for obtaining encrypted fingerprint images are de-
scribed, together with an investigation of the quality of the decrypted fingerprint images. Conclusions are drawn
in Section 4.
2. Method
2.1. User Authentication Scheme
Figure 1 shows a schematic diagram that illustrates the concept of biometric encrypted sensing proposed here.
During enrollment, biometric information (i.e., a fingerprint pattern) is encrypted using the optical system within
the biometric sensor, and the encrypted information is transmitted to the verification system for user authentica-
tion. This encrypted biometric information is then decrypted using a corresponding decryption key and the bio-
metric information is stored in the biometric template database. During verification, encrypted biometric infor-
mation is also captured, and it is then sent to the verification system. Subsequently, it is also decrypted in the ve-
rification system, and the biometric information and the enrolled data are verified by calculating their similarity.
If both the biometric image and the encryption key are provided correctly, the user is authorized. This system
makes it possible to perform two-factor authentication that will authorize users only when both biometric and
the secret data are verified. The verification system, which is assumed to be a securely protected using, for ex-
ample, a tamper-resistant device can be located in either a centralized server or a user device. Throughout this
overall process, raw biometric information in digital form exists only in the protected verification system, and
the risk of theft or leakage of biometric data is thus significantly reduced.
M. Takeda et al.
8
2.2. Encrypted Sensing Based on DRPE
In our system, optical encryption is performed via a combination of DH and DRPE. With DH, a wavefront en-
coding the optical information from an object wave is typically captured via interference with a reference plane
wave, as shown in Figure 2. In ref. [12], random phase-modulated light was used as the reference wave, which
is used as an encryption key. In our system, both the object wave and the reference wave are modulated using
diffusers, as shown in Figure 3. To capture fingerprints stably, we place a total reflection prism in the middle of
the object wavepath. The resulting DH is captured using a charged coupled device (CCD) image sensor, and can
be expressed as follows:
( ) ( ) ( ){ } ( )
( ) ( ){ } ( )
( ) ( ){ } ( )
2 2
1 1 0 0 1 0 0 1 1
0 0 1 0 0 1 1
0 0 1 0 0 1 1
, , exp , , ,
, exp , , ,
, exp , , , ,
E
E
E
O K
K
K
I x y FsT O x y j x y z R x y
FsT O x y j x y z R x y
FsT O x y j x y z R x y
ϕ
ϕ
ϕ
∗
∗
 = + 
 +  
 +  
(1)
where ( )0 0,O x y represents the fingerprint image, ( )1 0 0,x yϕ is the phase modulation by the diffuser in the
object wavepath, ( )1 1,EKR x y is the complex amplitude distribution of the phase-modulated reference wave on
the CCD plane, ( )0 0,x y and ( )1 1,x y are coordinates of the object and the CCD planes, and *
denotes the
complex conjugate. The operator [ ],FsT f z denotes a Fresnel transform in which f and z are the original wa-
vefront and the propagation distance, respectively. ( )1 1,EKR x y is derived as the Fresnel transform of the phase
object assigned by the diffuser D2 (see Figure 3).
Figure 4 shows a flow chart of the Fresnel-type DRPE process. An encrypted image is obtained via two phase
modulations—one in the space domain, and the other in the Fresnel domain. With the approaches described in
Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system,
Figure 1. Concept of the encrypted biometric sensing system. The database (DB) in the verification system
represents the template database for user biometric information.
Figure 2. Typical optical system used in digital holography.
Figure 3. The optical system used with our encrypted sensing scheme. Here D1 and D2 are diffusers.
M. Takeda et al.
9
Figure 4. Schematic diagram illustrating the Fresnel-type DRPE scheme.
they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase
distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which
that must be provided correctly to restore the plaintext image from the encrypted image. In this paper, the laser
wavelength is assumed to be unique, whereas the other two components are employed as cipher keys.
Let us consider the third term of Equation (1), which is similar to DRPE. If the amplitude of ( )1 1,EKR x y can
be approximated to be constant, the third term of Equation (1) corresponds to the encrypted image of Fres-
nel-type DRPE. In this case, ( )1 1,EKR x y can be expressed as
( ) ( ){ }1 1 1 1, exp ,EK E ER x y A jK x y= (2)
where AE is a constant amplitude and ( )1 1,EK x y is the phase distribution of the encryption key. The encrypted
image ( )1 1,C x y is then given by
( ) ( ) ( ){ } ( )
( ) ( ){ } ( ){ }
1 1 0 0 1 0 0 1 1
0 0 1 0 0 1 1
, , exp , , ,
, exp , , exp ,
EK
E
C x y FsT O x y j x y z R x y
FsT O x y j x y z jK x y
ϕ
ϕ
∗
∗
 = − ⋅ 
 ≅ − ⋅ 
(3)
where the constant AE has been omitted for clarity. The encrypted image ( )1 1,C x y can be derived by recon-
structing the first-order diffracted wave from the digital hologram captured by the CCD sensor.
For decryption, ( )1 1,C x y is multiplied by the phase term of the decryption key image ( )1 1,DK x y as fol-
lows:
( ) ( ) ( ){ }
( ) ( ){ } ( ) ( )( ){ }
1 1 1 1 1 1
0 0 1 0 0 1 1 1 1
, , exp ,
, exp , , exp , ,
r D
E D
C x y C x y jK x y
FsT O x y j x y z j K x y K x yφ∗
= −
 = − − 
(4)
After this calculation, the complex amplitude image ( )1 1,rC x y is Fresnel-diffracted at a distance ˆz , and a
decrypted image ( )2 2
ˆ ,O x y is obtained by calculating its amplitude components as follows:
( ) ( )2 2 1 1
ˆ ˆ, , , ,rO x y FsT C x y z=    (5)
where ( )2 2,x y are coordinates on the new Fresnel transform domain. If the encryption key ( )1 1,EK x y and
the decryption key ( )1 1,DK x y are identical or very similar, ( )1 1,rC x y becomes as follows:
( ) ( ) ( ){ }1 1 0 0 1 0 0, , exp , , .rC x y FsT O x y j x y zϕ∗
 ≅ −  (6)
If ˆz z= − , this yields the following:
M. Takeda et al.
10
( ) ( ) ( ) ( ){ } ( )2 2 1 1 0 0 1 0 0 0 0
ˆ ˆ, , , , exp , , .rO x y FsT C x y z O x y j x y O x yϕ= = − =   (7)
From this equation, it follows that the original fingerprint image is obtained.
If the amplitude of ( )1 1,EKR x y cannot be approximated to be constant, the complex amplitude of
( )1 1,EKR x y must be obtained, which entails division process by its amplitude component in the decryption
process, as described in Ref. [12]. This process can lead to amplification of the error of a restored fingerprint
image, because some pixels of the amplitude component of ( )1 1,EKR x y may be very small. In our experimen-
tal analysis below, we investigate both cases in which EKR has either a constant amplitude (our method) or a
complex amplitude distribution (similar to Tajahuerce’s method).
If the encryption and decryption keys differ significantly, the decrypted image becomes a random pattern. The
diffraction distance z can be also used as a parameter to restore the correct plaintext image.
2.3. Obtaining the Decoding Key
To implement a recording system for encrypted DH, we employ off-axis holography, in contrast to the work de-
scribed in Ref. [12], where they used in-line holography. To reconstruct a fingerprint image from an encrypted
hologram, ( )1 1,EKR x y must be obtained in advance. To implement this with off-axis holography, a Fourier
transform-based method [13] was employed.
In the optical system shown in Figure 5, a hologram ( )1 1,EKI x y is obtained via interference between
( )1 1,EKR x y and a plane wave, i.e.,
( ) ( ) ( ) ( ) ( )
( ) ( )
22
1 1 1 1 1 1 1 1 1 1
1 1 1 1
, , , , ,
, , ,
E E E
E
K p K p K
p K
I x y A x y R x y A x y R x y
A x y R x y
∗
∗
= + +
+ (8)
Where ( ) ( ){ }1 1 1 1, exp 2πpA x y j ax by= − + is a unit-amplitude plane wave, where a and b represent the angles
between ( )1 1,EKR x y and the plane wave. To eliminate the first and second terms of Equation (8), the intensity
distribution of ( )
2
1 1,EKR x y is recorded by shielding the plane wave, and ( )
2
1 1,pA x y (which is constant)
and ( )
2
1 1,EKR x y are numerically subtracted from ( )1 1,EKI x y . Subsequently, the remaining terms are Fouri-
er-transformed and we have
( ) ( ) ( ) ( ) ( )1 1 1 1 1 1 1 1 1 1, , , , , ,E EE K Ki u v u a v b r u v u a v b r u vδ δ∗
′ = + + ⊗ − − + − − ⊗ (9)
where ( )1 1,u v are coordinates on the Fourier domain, ( )1 1,EKr u v is the Fourier transform of ( )1 1,EKR x y ,
and ⊗ denotes a convolution operator. If a and b are large enough to separate the two terms in Equation (9) in
the spectral domain, the first and second terms do not overlap, and the first term can be extracted by shielding
the second term. By calculating the inverse Fourier-transform, the complex amplitude distribution of
( )1 1,EKR x y can be determined.
3. Experiments
3.1. Optical System
We carried out several experiments in which holograms of encrypted fingerprint images were captured and the
original fingerprint images were then numerically restored. To do this, we constructed an optical system for ac-
quiring holograms, as shown in Figure 6, which used a He-Ne laser with a wavelength of 633 nm as a light
source and a CCD image sensor with 1024 × 768 pixels that was 4.65 μm × 4.65 μm. A fingerprint was placed
on a total reflection prism and the reflected light was focused using two lenses (L3 and L4) to form an image on
the CCD image sensor.
3.2. Image Reconstruction
As discussed in Section 2.2, the decrypted images were obtained so that ( )1 1,EKR x y was either treated as a
complex amplitude wave (as with Tajahuerce’s method) or with the amplitude component replaced with a con-
stant value (our method). Examples of an encrypted hologram ( )1 1,OI x y and the corresponding decrypted im-
ages are shown in Figure 7. Figure 7(a) shows that the fingerprint image is not visible in the encrypted holo-
gram ( ),OI x y . Figure 7(b) shows adecrypted image using the correct ( )1 1,EKR x y with a complex amplitude
M. Takeda et al.
11
Figure 5. Optical system for obtaining decoding key.
Figure 6. Schematic diagram showing the experimental optical system. Here f1 = 0.2 m, f2 = 0.1
m, d1 = 0.056 m, and d2 = 0.2 m.
(a) (b) (c)
(d) (e) (f)
Figure 7. Experimentally obtained images (a) An encrypted hologram; (b) A decrypted finger-
print image reconstructed using a complex amplitude wave; (c) A decrypted fingerprint recon-
structed using a constant-amplitude wave (i.e., our method); (d) A decrypted fingerprint using
constant amplitude wave with speckle noise reduction; (e) A decrypted image with an incorrect
decryption key, and (f) a decrypted image with an incorrect distance (244 mm).
component and the correct propagation distance. In this case, the fingerprint image is difficult to discern. Figure 7
(c) shows a decrypted image using the correct ( )1 1,EKR x y with a constant amplitude and the correct propagation
distance; the fingerprint pattern can be clearly seen in the decrypted image. These results indicate that better quality
M. Takeda et al.
12
fingerprints can be obtained by using a constant amplitude for ( )1 1,EKR x y than by using a complex amplitude.
However, the fingerprint pattern in Figure 7(c) contains significant speckle noise [14] [15], although it is suffi-
ciently clear to recognize using the human eye. To reduce the amount of noise, we captured multiple holograms
with differing speckle noise by changing the position of diffuser D1on the object beam path and summing the in-
tensities of the decrypted images obtained from the holograms. Figure 7(d) shows a decrypted image obtained by
summing four decrypted images, in which the restored fingerprint is more clearly visible than in Figure 7(c).
Figures 7(e) shows a decrypted image using an incorrect ( )1 1,EKR x y , and Figure 7(f) shows a decrypted
image using an incorrect propagation distance. In both cases, random patterns similar to stationary white noise
were obtained.
3.3. Verification Accuracy
We evaluated the verification accuracy of the experimental setup described above in terms of the ability to
match restored fingerprint images. Using the optical system shown in Figure 6, we captured 100 encrypted ho-
lograms of fingerprint images from 10 subjects (10 encrypted DHs per fingerprint). In these trials, five of the
fingerprint images for each subject were used for enrollment and the others were used for testing; 250 genuine
fingerprint trials (25 trials per subject) and 450 imposter trials (45 trials per subject) were carried out. Nonlinear
correlation [16] was employed in these trials for pattern matching. The nonlinear correlation n(x,y) between two
images can be expressed as follows:
( ) ( ) ( ) ( ) ( ){ }1 21 2, , , exp , ,
k
F Fn x y IFT F u v F u v j u v u vϕ ϕ  = −   
(10)
Where ( ),mF u v (m = 1, 2) denotes the Fourier transform of each image, IFT denotes inverse Fourier transform
operator, ( ),mF u vϕ is the phase distribution of ( ),mF u v and k is the degree of the applied nonlinearity. We
choose k = 0.3, which was found to provide optimal discrimination between genuine and imposter cases. Figure
8 shows the nonlinear correlation output; the correlation waveforms exhibited a sharp peak when verifying the
correct fingerprint (a genuine case) with a constant amplitude ( )1 1,EKR x y , and with speckle noise reduction,
the correlation peak became sharper. Figure 8(d) shows nonlinear correlation in case of verification between a
correct and an incorrect decryption keys. Although both decrypted images were obtained from the same en-
crypted hologram, the nonlinear correlation did not exhibit a peak. Figure 8(e) shows the correlation waveform
for imposter verification; here we also see a random pattern.
As a quantitative criterion for verification, the peak-to-side-lobe ratio (PSR) [17] was calculated as follows:
peak mean
,PSR
σ
−
= (11)
where σ denotes the standard deviation of ( ),n x y and peak and mean denote the peak value and spatial aver-
age of ( ),n x y , respectively.
Using PSR as a verification score, the false rejection rate (FRR) of the genuine verification attempts and the
false acceptance rate (FAR) of the imposter verification attempts were calculated. In addition, we determined a
receiver operating characteristic (ROC) curve, in which each point is plotted according to the FRR (x-axis) and
FAR (y-axis) for a given threshold value, as shown in Figure 9. The equal error rate (EER) of our method with
speckle noise reduction was 12.4%, and that without speckle noise reduction was 35.0%. The EER obtained us-
ing a complex amplitude ( )1 1,EKR x y was 45.0%. These results indicate that the phase-only method proposed
here provides better image verification, and that the speckle noise reduction contributes significantly to the im-
provement in the verification accuracy.
The accuracy of our system was not better than that of image verification using a conventional sensor (i.e.,
unencrypted sensing). However, there are a number of possible causes of image degradation: first, we did not
use a guide to fix the fingerprints; and second, we did not ask the subjects to restrain the pressure that they ap-
plied. The latter issue might cause a variation in the degree of fingerprint distortion among the images. In such
cases, speckle reduction via summation may not be effective. By reducing the influence of such factors, our me-
thod has potential for further improvements in verification accuracy.
4. Conclusions
We have described an encrypted sensing system for capturing fingerprint images using digital holography and
M. Takeda et al.
13
(a) (b) (c)
(d) (e)
Figure 8. Nonlinear correlations. (a) Genuine (complex); (b) Genuine with speckle reduction
(phase only); (c) Genuine without speckle reduction (phase only); (d) Genuine with incorrect
decryption keys (phase only) and (e) Imposter (phase only).
Figure 9. ROC curves.
optical encryption. We showed experimentally that a fingerprint image could be restored correctly by decrypting
an encrypted hologram with the correct key and propagation distance. The quality of the restored fingerprint im-
age could be more clearly visible than that when using a conventional method by improving the calculation me-
thod for restoring a fingerprint image from an encrypted digital hologram. The verification performance of the
restored fingerprint images was investigated, and we demonstrated that our method has favorable verification ac-
curacy.
The principal advantage of the system described here is that it can enhance the security of biometric authenti-
cation by capturing optically encrypted images rather than raw fingerprints. Combining physically unclonable
functions (PUFs) [18] with our system might enable the development of very secure user authentication methods.
M. Takeda et al.
14
For example, the use of an encoding key provided by a diffuser as a PUF may provide a secure key based on the
physical features of an individual object.
References
[1] Ratha, N.K., Connell, J.H. and Jain, A.K. (2001) Enhancing Security and Privacy in Biometrics-Based Authentication
Systems. IBM Systems Journal, 40, 614-634. http://dx.doi.org/10.1147/sj.403.0614
[2] Uludag, U., Pankanti, S. and Jain, A.K. (2005) Fuzzy Vault for Fingerprints. Audio- and Video-Based Biometric Per-
son Authentication Lecture Notes in Computer Science, 3546, 310-319. http://dx.doi.org/10.1007/11527923_32
[3] Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1999) Biometric EncryptionTM
.
http://www.cse.lehigh.edu/prr/Biometrics/Archive/Papers/BiometricEncryption.pdf
[4] Hirata, S. and Takahashi, K. (2009) Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. Ad-
vances in Biometrics Lecture Notes in Computer Science, 5558, 868-878.
http://link.springer.com/chapter/10.1007%2F978-3-642-01793-3_88
[5] Clancy, T.C., Kiyavash, N. and Lin, D.J. (2003) Secure Smartcard Based Fingerprint Authentication. Proceedings of
the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications—WBMA, 45.
https://www.cs.umd.edu/~clancy/docs/bio-wbma2003.pdf
[6] Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane. Optics Letters, 20, 767-769.
http://dx.doi.org/10.1364/OL.20.000767
[7] Javidi, B. and Nomura, T. (2000) Securing Information by Use of Digital Holography. Optics Letters, 25, 28-30.
http://dx.doi.org/10.1364/OL.25.000028
[8] Yamaguchi, I., Yamamoto, K., Mills, G.A. and Yokota, M. (2006) Image Reconstruction Only by Phase Data in Phase-
Shifting Digital Holography. Applied Optics, 45, 975-983. http://dx.doi.org/10.1364/AO.45.000975
[9] Javidi, B. and Nomura, T. (2000) Three-Dimensional Object Recognition by Use of Digital Holography. Optics Letters,
25, 28-30. http://dx.doi.org/10.1364/OL.25.000028
[10] Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M.S. and Javidi, B. (2009) Optical Techniques for Information Secu-
rity. Proceedings of IEEE, 97, 1128-1148. http://dx.doi.org/10.1109/JPROC.2009.2018367
[11] Liu, S., Guo, C.L. and Sheridan, J.T. (2014) A Review of Optical Image Encryption Techniques. Optics & Laser
Technology, 57, 327-342. http://dx.doi.org/10.1016/j.optlastec.2013.05.023
[12] Tajahuerce, E. and Javidi, B. (2000) Encrypting Three-Dimensional Information with Digital Holography. Applied Op-
tics, 39, 6595-6601. http://dx.doi.org/10.1364/AO.39.006595
[13] Takeda, M., Ina, H. and Kobayashi, S. (1982) Fourier-Transform Method of Fringe-Pattern Analysis for Computer-
Based Topography and Interferometry. Journal of the Optical Society of America, 72, 156-160.
http://dx.doi.org/10.1364/JOSA.72.000156
[14] Spagnolo, G.S. and Cozzella, L. (2012) Laser Speckle Decorrelation for Fingerprint Acquisition. Journal of Optics, 14,
094006. http://dx.doi.org/10.1088/2040-8978/14/9/094006
[15] Utsugi, T. and Yamaguchi, M. (2013) Reduction of the Recorded Speckle Noise in Holographic 3D Printer. Optics
Express, 21, 662-674. http://dx.doi.org/10.1364/OE.21.000662
[16] Javidi, B. (1989) Nonlinear Joint Power Spectrum Based Optical Correlation. Applied Optics, 28, 2358-2367.
http://dx.doi.org/10.1364/AO.28.002358
[17] Kumar, B.V.K.V., Savvides, M., Xie, C., Venkataramani, K., Thornton, J. and Mahalanobis, A. (2004) Biometric Veri-
fication with Correlation Filters. Applied Optics, 43, 391-402. http://dx.doi.org/10.1364/AO.43.000391
[18] Helinski, R., Acharyya, D. and Plusquellic, J. (2009) A Physical Unclonable Function Defined Using Power Distribu-
tion System Equivalent Resistance Variations. Proceedings of the 46th Annual Design Automation Conference on
ZZZ-DAC’09, 676.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5227103&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%
2Fabs_all.jsp%3Farnumber%3D5227103
Encrypted sensing of fingerprint image

More Related Content

What's hot

Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...eSAT Publishing House
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionIOSR Journals
 
Whiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabWhiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabeSAT Publishing House
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet TransformIRJET Journal
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...IOSR Journals
 
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...TELKOMNIKA JOURNAL
 
Automatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliencyAutomatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliencyeSAT Publishing House
 

What's hot (20)

Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...Applying edge density based region growing with frame difference for detectin...
Applying edge density based region growing with frame difference for detectin...
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
L0816166
L0816166L0816166
L0816166
 
Ag044216224
Ag044216224Ag044216224
Ag044216224
 
Cb35446450
Cb35446450Cb35446450
Cb35446450
 
A Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot DetectionA Novel Approach for Tracking with Implicit Video Shot Detection
A Novel Approach for Tracking with Implicit Video Shot Detection
 
Whiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabWhiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlab
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
K42016368
K42016368K42016368
K42016368
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
Development of Human Tracking in Video Surveillance System for Activity Anal...
Development of Human Tracking in Video Surveillance System  for Activity Anal...Development of Human Tracking in Video Surveillance System  for Activity Anal...
Development of Human Tracking in Video Surveillance System for Activity Anal...
 
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
 
Automatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliencyAutomatic identification of animal using visual and motion saliency
Automatic identification of animal using visual and motion saliency
 

Similar to Encrypted sensing of fingerprint image

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGYA REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGYIRJET Journal
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...eSAT Publishing House
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
Goal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D cameraGoal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D camerajournalBEEI
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringIRJET Journal
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueIRJET Journal
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
 
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...sipij
 
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...IRJET Journal
 

Similar to Encrypted sensing of fingerprint image (20)

A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGYA REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
A REVIEW PAPER ON THE OPTICAL ENCRYPTION AND DECRYPTION TECHNOLOGY
 
D04432528
D04432528D04432528
D04432528
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
Goal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D cameraGoal location prediction based on deep learning using RGB-D camera
Goal location prediction based on deep learning using RGB-D camera
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health Monitoring
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
 
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
IRJET-  	  Low Band Width High Secured Image Transmission in Robust ChannelsIRJET-  	  Low Band Width High Secured Image Transmission in Robust Channels
IRJET- Low Band Width High Secured Image Transmission in Robust Channels
 
B280916
B280916B280916
B280916
 
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
S IGNAL A ND I MAGE P ROCESSING OF O PTICAL C OHERENCE T OMOGRAPHY AT 1310 NM...
 
Gr3511821184
Gr3511821184Gr3511821184
Gr3511821184
 
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...
IRJET- Image Fusion using Lifting Wavelet Transform with Neural Networks for ...
 

Recently uploaded

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Encrypted sensing of fingerprint image

  • 1. Optics and Photonics Journal, 2015, 5, 6-14 Published Online January 2015 in SciRes. http://www.scirp.org/journal/opj http://dx.doi.org/10.4236/opj.2015.51002 How to cite this paper: Takeda, M., Nakano, K., Suzuki, H. and Yamaguchi, M. (2015) Encrypted Sensing Based on Digital Holography for Fingerprint Images. Optics and Photonics Journal, 5, 6-14. http://dx.doi.org/10.4236/opj.2015.51002 Encrypted Sensing Based on Digital Holography for Fingerprint Images Masafumi Takeda1*, Kazuya Nakano2, Hiroyuki Suzuki3, Masahiro Yamaguchi4 1 Graduate School of Science & Engineering, Tokyo Institute of Technology, 4259 Nagatsuta-cho, Midori-ku, Yokohama, Japan 2 Nippon Sport Science University, 1221-1 Kamoshida-cho, Aoba-ku, Yokohama, Japan 3 Imaging Science & Engineering Laboratory, Tokyo Institute of Technology, 4259 Nagatsuta-cho, Midori-ku, Yokohama, Japan 4 Global Scientific Information and Computing Center, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo, Japan Email: * takeda.m.ad@hotmail.com Received 23 November 2014; accepted 5 December 2014; published 13 January 2015 Copyright © 2015 by authors and Scientific Research Publishing Inc. This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ Abstract We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed en- crypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate experimentally that a fingerprint image can be captured as an optically encrypted image and can be restored correctly only when the correct cipher key is used. Moreover, we inves- tigate experimentally the verification accuracy of the decrypted images. Keywords Biometric Authentication, Digital Holography, Double Random Phase Encoding, Fingerprinting 1. Introduction Recently, there has been a rise in the use of biometric authentication systems in a wide variety of secure in- terfaces, including computer logins, banking systems, automated teller machines, and building entrance man- agement. Because biometric information represents important personal data, and because enrolled biometric information, unlike most personal authentication information such as passwords, cannot be altered, it is ne- cessary to take great care to prevent leakage of these data. Correspondingly, template protection techniques * Corresponding author.
  • 2. M. Takeda et al. 7 for biometric authentication have been actively pursued through the development of cryptographic algorithms that protect raw biometric information obtained using a sensor while preserving high verification accuracy [1]-[4]. However, particular threats, such as side-channel attacks [5] occurring while raw biometric informa- tion is being transformed into a protected template, are becoming increasingly realistic. It is believed that threats such as these can be avoided by encrypting biometric images prior to image sensing, i.e., optical en- cryption. Optical encryption techniques apply optical calculation methods such as optical wave propagation oroptical phase modulation for image encryption and decryption. These techniques are advantageous not only for rapid calculations using parallel processing, but also security enhancement due to non-electronic computation methods, because there is less risk of optical information being read, as opposed to digital data in electronic devices, which are inevitably exposed to a number of security risks. Double random phase encoding (DRPE) [6] is a well-known optical encryption method that has been studied extensively for two decades. DRPE is an optical symmetric-key encryption technique in which an optical image is encrypted by multiplying two random phase masks in the spatial and Fourier or Fresnel planes. To obtain an optically-encrypted image, digital holography (DH) [7]-[10] is commonly employed. DH makes it possible to not only capture an optical wavefront as holo- graphic data, but also to reconstruct various styles of optical wavefront computationally from the holographic data. DRPE has been implemented using DH [7] [11], whereby the random phase masks are typically inserted into the object beam path. Suchan optical system requires precise alignment; however, it is challenging to recon- struct the object image with high quality from the DH. Tajahuerce and Javidi proposed an optical encryption system for three-dimensional (3D) objects [12], whereby an encrypted image was obtained with simple align- ment because only the reference beam was modulated using a random phase mask, and a non-modulated wave was used as the object beam. This optical arrangement could be implemented easily and can restore a clear ob- ject image from a DH. However, the encrypted image was not equivalent to DRPE because the object beam was not modulated by a random phase mask, which might decrease the security level of encryption. To obtain a fin- gerprint image for biometric authentication, both sufficient security to prevent data leakage and sufficient image quality for highly accurate recognition are required. Therefore, we propose an optical security system that is suitable for obtaining fingerprint images as optically encrypted holographic data. We term this system “en- crypted sensing”. In addition, we also propose an image reconstruction method through which we can obtain a clear fingerprint image from the encrypted hologram. To obtain the reconstructed image with high quality, we apply speckle reduction using multiple holograms, as well as reconstruction using a phase only mask, rather than a complex amplitude mask. We demonstrate that improved recognition accuracy is obtained by applying only a phase-only mask and speckle reduction. The remainder of the paper is organized as follows. In the following section, a theoretical description of the proposed sensing system is given. In Section 3, experiments for obtaining encrypted fingerprint images are de- scribed, together with an investigation of the quality of the decrypted fingerprint images. Conclusions are drawn in Section 4. 2. Method 2.1. User Authentication Scheme Figure 1 shows a schematic diagram that illustrates the concept of biometric encrypted sensing proposed here. During enrollment, biometric information (i.e., a fingerprint pattern) is encrypted using the optical system within the biometric sensor, and the encrypted information is transmitted to the verification system for user authentica- tion. This encrypted biometric information is then decrypted using a corresponding decryption key and the bio- metric information is stored in the biometric template database. During verification, encrypted biometric infor- mation is also captured, and it is then sent to the verification system. Subsequently, it is also decrypted in the ve- rification system, and the biometric information and the enrolled data are verified by calculating their similarity. If both the biometric image and the encryption key are provided correctly, the user is authorized. This system makes it possible to perform two-factor authentication that will authorize users only when both biometric and the secret data are verified. The verification system, which is assumed to be a securely protected using, for ex- ample, a tamper-resistant device can be located in either a centralized server or a user device. Throughout this overall process, raw biometric information in digital form exists only in the protected verification system, and the risk of theft or leakage of biometric data is thus significantly reduced.
  • 3. M. Takeda et al. 8 2.2. Encrypted Sensing Based on DRPE In our system, optical encryption is performed via a combination of DH and DRPE. With DH, a wavefront en- coding the optical information from an object wave is typically captured via interference with a reference plane wave, as shown in Figure 2. In ref. [12], random phase-modulated light was used as the reference wave, which is used as an encryption key. In our system, both the object wave and the reference wave are modulated using diffusers, as shown in Figure 3. To capture fingerprints stably, we place a total reflection prism in the middle of the object wavepath. The resulting DH is captured using a charged coupled device (CCD) image sensor, and can be expressed as follows: ( ) ( ) ( ){ } ( ) ( ) ( ){ } ( ) ( ) ( ){ } ( ) 2 2 1 1 0 0 1 0 0 1 1 0 0 1 0 0 1 1 0 0 1 0 0 1 1 , , exp , , , , exp , , , , exp , , , , E E E O K K K I x y FsT O x y j x y z R x y FsT O x y j x y z R x y FsT O x y j x y z R x y ϕ ϕ ϕ ∗ ∗  = +   +    +   (1) where ( )0 0,O x y represents the fingerprint image, ( )1 0 0,x yϕ is the phase modulation by the diffuser in the object wavepath, ( )1 1,EKR x y is the complex amplitude distribution of the phase-modulated reference wave on the CCD plane, ( )0 0,x y and ( )1 1,x y are coordinates of the object and the CCD planes, and * denotes the complex conjugate. The operator [ ],FsT f z denotes a Fresnel transform in which f and z are the original wa- vefront and the propagation distance, respectively. ( )1 1,EKR x y is derived as the Fresnel transform of the phase object assigned by the diffuser D2 (see Figure 3). Figure 4 shows a flow chart of the Fresnel-type DRPE process. An encrypted image is obtained via two phase modulations—one in the space domain, and the other in the Fresnel domain. With the approaches described in Refs. [7] and [11], two phase masks were inserted in the object wave path for DRPE; however, with our system, Figure 1. Concept of the encrypted biometric sensing system. The database (DB) in the verification system represents the template database for user biometric information. Figure 2. Typical optical system used in digital holography. Figure 3. The optical system used with our encrypted sensing scheme. Here D1 and D2 are diffusers.
  • 4. M. Takeda et al. 9 Figure 4. Schematic diagram illustrating the Fresnel-type DRPE scheme. they are applied to the object and reference waves. The Fresnel-type DRPE uses three cipher keys: the phase distribution on the Fresnel domain, the distance of Fresnel diffraction, and the wavelength of laser; all of which that must be provided correctly to restore the plaintext image from the encrypted image. In this paper, the laser wavelength is assumed to be unique, whereas the other two components are employed as cipher keys. Let us consider the third term of Equation (1), which is similar to DRPE. If the amplitude of ( )1 1,EKR x y can be approximated to be constant, the third term of Equation (1) corresponds to the encrypted image of Fres- nel-type DRPE. In this case, ( )1 1,EKR x y can be expressed as ( ) ( ){ }1 1 1 1, exp ,EK E ER x y A jK x y= (2) where AE is a constant amplitude and ( )1 1,EK x y is the phase distribution of the encryption key. The encrypted image ( )1 1,C x y is then given by ( ) ( ) ( ){ } ( ) ( ) ( ){ } ( ){ } 1 1 0 0 1 0 0 1 1 0 0 1 0 0 1 1 , , exp , , , , exp , , exp , EK E C x y FsT O x y j x y z R x y FsT O x y j x y z jK x y ϕ ϕ ∗ ∗  = − ⋅   ≅ − ⋅  (3) where the constant AE has been omitted for clarity. The encrypted image ( )1 1,C x y can be derived by recon- structing the first-order diffracted wave from the digital hologram captured by the CCD sensor. For decryption, ( )1 1,C x y is multiplied by the phase term of the decryption key image ( )1 1,DK x y as fol- lows: ( ) ( ) ( ){ } ( ) ( ){ } ( ) ( )( ){ } 1 1 1 1 1 1 0 0 1 0 0 1 1 1 1 , , exp , , exp , , exp , , r D E D C x y C x y jK x y FsT O x y j x y z j K x y K x yφ∗ = −  = − −  (4) After this calculation, the complex amplitude image ( )1 1,rC x y is Fresnel-diffracted at a distance ˆz , and a decrypted image ( )2 2 ˆ ,O x y is obtained by calculating its amplitude components as follows: ( ) ( )2 2 1 1 ˆ ˆ, , , ,rO x y FsT C x y z=    (5) where ( )2 2,x y are coordinates on the new Fresnel transform domain. If the encryption key ( )1 1,EK x y and the decryption key ( )1 1,DK x y are identical or very similar, ( )1 1,rC x y becomes as follows: ( ) ( ) ( ){ }1 1 0 0 1 0 0, , exp , , .rC x y FsT O x y j x y zϕ∗  ≅ −  (6) If ˆz z= − , this yields the following:
  • 5. M. Takeda et al. 10 ( ) ( ) ( ) ( ){ } ( )2 2 1 1 0 0 1 0 0 0 0 ˆ ˆ, , , , exp , , .rO x y FsT C x y z O x y j x y O x yϕ= = − =   (7) From this equation, it follows that the original fingerprint image is obtained. If the amplitude of ( )1 1,EKR x y cannot be approximated to be constant, the complex amplitude of ( )1 1,EKR x y must be obtained, which entails division process by its amplitude component in the decryption process, as described in Ref. [12]. This process can lead to amplification of the error of a restored fingerprint image, because some pixels of the amplitude component of ( )1 1,EKR x y may be very small. In our experimen- tal analysis below, we investigate both cases in which EKR has either a constant amplitude (our method) or a complex amplitude distribution (similar to Tajahuerce’s method). If the encryption and decryption keys differ significantly, the decrypted image becomes a random pattern. The diffraction distance z can be also used as a parameter to restore the correct plaintext image. 2.3. Obtaining the Decoding Key To implement a recording system for encrypted DH, we employ off-axis holography, in contrast to the work de- scribed in Ref. [12], where they used in-line holography. To reconstruct a fingerprint image from an encrypted hologram, ( )1 1,EKR x y must be obtained in advance. To implement this with off-axis holography, a Fourier transform-based method [13] was employed. In the optical system shown in Figure 5, a hologram ( )1 1,EKI x y is obtained via interference between ( )1 1,EKR x y and a plane wave, i.e., ( ) ( ) ( ) ( ) ( ) ( ) ( ) 22 1 1 1 1 1 1 1 1 1 1 1 1 1 1 , , , , , , , , E E E E K p K p K p K I x y A x y R x y A x y R x y A x y R x y ∗ ∗ = + + + (8) Where ( ) ( ){ }1 1 1 1, exp 2πpA x y j ax by= − + is a unit-amplitude plane wave, where a and b represent the angles between ( )1 1,EKR x y and the plane wave. To eliminate the first and second terms of Equation (8), the intensity distribution of ( ) 2 1 1,EKR x y is recorded by shielding the plane wave, and ( ) 2 1 1,pA x y (which is constant) and ( ) 2 1 1,EKR x y are numerically subtracted from ( )1 1,EKI x y . Subsequently, the remaining terms are Fouri- er-transformed and we have ( ) ( ) ( ) ( ) ( )1 1 1 1 1 1 1 1 1 1, , , , , ,E EE K Ki u v u a v b r u v u a v b r u vδ δ∗ ′ = + + ⊗ − − + − − ⊗ (9) where ( )1 1,u v are coordinates on the Fourier domain, ( )1 1,EKr u v is the Fourier transform of ( )1 1,EKR x y , and ⊗ denotes a convolution operator. If a and b are large enough to separate the two terms in Equation (9) in the spectral domain, the first and second terms do not overlap, and the first term can be extracted by shielding the second term. By calculating the inverse Fourier-transform, the complex amplitude distribution of ( )1 1,EKR x y can be determined. 3. Experiments 3.1. Optical System We carried out several experiments in which holograms of encrypted fingerprint images were captured and the original fingerprint images were then numerically restored. To do this, we constructed an optical system for ac- quiring holograms, as shown in Figure 6, which used a He-Ne laser with a wavelength of 633 nm as a light source and a CCD image sensor with 1024 × 768 pixels that was 4.65 μm × 4.65 μm. A fingerprint was placed on a total reflection prism and the reflected light was focused using two lenses (L3 and L4) to form an image on the CCD image sensor. 3.2. Image Reconstruction As discussed in Section 2.2, the decrypted images were obtained so that ( )1 1,EKR x y was either treated as a complex amplitude wave (as with Tajahuerce’s method) or with the amplitude component replaced with a con- stant value (our method). Examples of an encrypted hologram ( )1 1,OI x y and the corresponding decrypted im- ages are shown in Figure 7. Figure 7(a) shows that the fingerprint image is not visible in the encrypted holo- gram ( ),OI x y . Figure 7(b) shows adecrypted image using the correct ( )1 1,EKR x y with a complex amplitude
  • 6. M. Takeda et al. 11 Figure 5. Optical system for obtaining decoding key. Figure 6. Schematic diagram showing the experimental optical system. Here f1 = 0.2 m, f2 = 0.1 m, d1 = 0.056 m, and d2 = 0.2 m. (a) (b) (c) (d) (e) (f) Figure 7. Experimentally obtained images (a) An encrypted hologram; (b) A decrypted finger- print image reconstructed using a complex amplitude wave; (c) A decrypted fingerprint recon- structed using a constant-amplitude wave (i.e., our method); (d) A decrypted fingerprint using constant amplitude wave with speckle noise reduction; (e) A decrypted image with an incorrect decryption key, and (f) a decrypted image with an incorrect distance (244 mm). component and the correct propagation distance. In this case, the fingerprint image is difficult to discern. Figure 7 (c) shows a decrypted image using the correct ( )1 1,EKR x y with a constant amplitude and the correct propagation distance; the fingerprint pattern can be clearly seen in the decrypted image. These results indicate that better quality
  • 7. M. Takeda et al. 12 fingerprints can be obtained by using a constant amplitude for ( )1 1,EKR x y than by using a complex amplitude. However, the fingerprint pattern in Figure 7(c) contains significant speckle noise [14] [15], although it is suffi- ciently clear to recognize using the human eye. To reduce the amount of noise, we captured multiple holograms with differing speckle noise by changing the position of diffuser D1on the object beam path and summing the in- tensities of the decrypted images obtained from the holograms. Figure 7(d) shows a decrypted image obtained by summing four decrypted images, in which the restored fingerprint is more clearly visible than in Figure 7(c). Figures 7(e) shows a decrypted image using an incorrect ( )1 1,EKR x y , and Figure 7(f) shows a decrypted image using an incorrect propagation distance. In both cases, random patterns similar to stationary white noise were obtained. 3.3. Verification Accuracy We evaluated the verification accuracy of the experimental setup described above in terms of the ability to match restored fingerprint images. Using the optical system shown in Figure 6, we captured 100 encrypted ho- lograms of fingerprint images from 10 subjects (10 encrypted DHs per fingerprint). In these trials, five of the fingerprint images for each subject were used for enrollment and the others were used for testing; 250 genuine fingerprint trials (25 trials per subject) and 450 imposter trials (45 trials per subject) were carried out. Nonlinear correlation [16] was employed in these trials for pattern matching. The nonlinear correlation n(x,y) between two images can be expressed as follows: ( ) ( ) ( ) ( ) ( ){ }1 21 2, , , exp , , k F Fn x y IFT F u v F u v j u v u vϕ ϕ  = −    (10) Where ( ),mF u v (m = 1, 2) denotes the Fourier transform of each image, IFT denotes inverse Fourier transform operator, ( ),mF u vϕ is the phase distribution of ( ),mF u v and k is the degree of the applied nonlinearity. We choose k = 0.3, which was found to provide optimal discrimination between genuine and imposter cases. Figure 8 shows the nonlinear correlation output; the correlation waveforms exhibited a sharp peak when verifying the correct fingerprint (a genuine case) with a constant amplitude ( )1 1,EKR x y , and with speckle noise reduction, the correlation peak became sharper. Figure 8(d) shows nonlinear correlation in case of verification between a correct and an incorrect decryption keys. Although both decrypted images were obtained from the same en- crypted hologram, the nonlinear correlation did not exhibit a peak. Figure 8(e) shows the correlation waveform for imposter verification; here we also see a random pattern. As a quantitative criterion for verification, the peak-to-side-lobe ratio (PSR) [17] was calculated as follows: peak mean ,PSR σ − = (11) where σ denotes the standard deviation of ( ),n x y and peak and mean denote the peak value and spatial aver- age of ( ),n x y , respectively. Using PSR as a verification score, the false rejection rate (FRR) of the genuine verification attempts and the false acceptance rate (FAR) of the imposter verification attempts were calculated. In addition, we determined a receiver operating characteristic (ROC) curve, in which each point is plotted according to the FRR (x-axis) and FAR (y-axis) for a given threshold value, as shown in Figure 9. The equal error rate (EER) of our method with speckle noise reduction was 12.4%, and that without speckle noise reduction was 35.0%. The EER obtained us- ing a complex amplitude ( )1 1,EKR x y was 45.0%. These results indicate that the phase-only method proposed here provides better image verification, and that the speckle noise reduction contributes significantly to the im- provement in the verification accuracy. The accuracy of our system was not better than that of image verification using a conventional sensor (i.e., unencrypted sensing). However, there are a number of possible causes of image degradation: first, we did not use a guide to fix the fingerprints; and second, we did not ask the subjects to restrain the pressure that they ap- plied. The latter issue might cause a variation in the degree of fingerprint distortion among the images. In such cases, speckle reduction via summation may not be effective. By reducing the influence of such factors, our me- thod has potential for further improvements in verification accuracy. 4. Conclusions We have described an encrypted sensing system for capturing fingerprint images using digital holography and
  • 8. M. Takeda et al. 13 (a) (b) (c) (d) (e) Figure 8. Nonlinear correlations. (a) Genuine (complex); (b) Genuine with speckle reduction (phase only); (c) Genuine without speckle reduction (phase only); (d) Genuine with incorrect decryption keys (phase only) and (e) Imposter (phase only). Figure 9. ROC curves. optical encryption. We showed experimentally that a fingerprint image could be restored correctly by decrypting an encrypted hologram with the correct key and propagation distance. The quality of the restored fingerprint im- age could be more clearly visible than that when using a conventional method by improving the calculation me- thod for restoring a fingerprint image from an encrypted digital hologram. The verification performance of the restored fingerprint images was investigated, and we demonstrated that our method has favorable verification ac- curacy. The principal advantage of the system described here is that it can enhance the security of biometric authenti- cation by capturing optically encrypted images rather than raw fingerprints. Combining physically unclonable functions (PUFs) [18] with our system might enable the development of very secure user authentication methods.
  • 9. M. Takeda et al. 14 For example, the use of an encoding key provided by a diffuser as a PUF may provide a secure key based on the physical features of an individual object. References [1] Ratha, N.K., Connell, J.H. and Jain, A.K. (2001) Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal, 40, 614-634. http://dx.doi.org/10.1147/sj.403.0614 [2] Uludag, U., Pankanti, S. and Jain, A.K. (2005) Fuzzy Vault for Fingerprints. Audio- and Video-Based Biometric Per- son Authentication Lecture Notes in Computer Science, 3546, 310-319. http://dx.doi.org/10.1007/11527923_32 [3] Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1999) Biometric EncryptionTM . http://www.cse.lehigh.edu/prr/Biometrics/Archive/Papers/BiometricEncryption.pdf [4] Hirata, S. and Takahashi, K. (2009) Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. Ad- vances in Biometrics Lecture Notes in Computer Science, 5558, 868-878. http://link.springer.com/chapter/10.1007%2F978-3-642-01793-3_88 [5] Clancy, T.C., Kiyavash, N. and Lin, D.J. (2003) Secure Smartcard Based Fingerprint Authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications—WBMA, 45. https://www.cs.umd.edu/~clancy/docs/bio-wbma2003.pdf [6] Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane. Optics Letters, 20, 767-769. http://dx.doi.org/10.1364/OL.20.000767 [7] Javidi, B. and Nomura, T. (2000) Securing Information by Use of Digital Holography. Optics Letters, 25, 28-30. http://dx.doi.org/10.1364/OL.25.000028 [8] Yamaguchi, I., Yamamoto, K., Mills, G.A. and Yokota, M. (2006) Image Reconstruction Only by Phase Data in Phase- Shifting Digital Holography. Applied Optics, 45, 975-983. http://dx.doi.org/10.1364/AO.45.000975 [9] Javidi, B. and Nomura, T. (2000) Three-Dimensional Object Recognition by Use of Digital Holography. Optics Letters, 25, 28-30. http://dx.doi.org/10.1364/OL.25.000028 [10] Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M.S. and Javidi, B. (2009) Optical Techniques for Information Secu- rity. Proceedings of IEEE, 97, 1128-1148. http://dx.doi.org/10.1109/JPROC.2009.2018367 [11] Liu, S., Guo, C.L. and Sheridan, J.T. (2014) A Review of Optical Image Encryption Techniques. Optics & Laser Technology, 57, 327-342. http://dx.doi.org/10.1016/j.optlastec.2013.05.023 [12] Tajahuerce, E. and Javidi, B. (2000) Encrypting Three-Dimensional Information with Digital Holography. Applied Op- tics, 39, 6595-6601. http://dx.doi.org/10.1364/AO.39.006595 [13] Takeda, M., Ina, H. and Kobayashi, S. (1982) Fourier-Transform Method of Fringe-Pattern Analysis for Computer- Based Topography and Interferometry. Journal of the Optical Society of America, 72, 156-160. http://dx.doi.org/10.1364/JOSA.72.000156 [14] Spagnolo, G.S. and Cozzella, L. (2012) Laser Speckle Decorrelation for Fingerprint Acquisition. Journal of Optics, 14, 094006. http://dx.doi.org/10.1088/2040-8978/14/9/094006 [15] Utsugi, T. and Yamaguchi, M. (2013) Reduction of the Recorded Speckle Noise in Holographic 3D Printer. Optics Express, 21, 662-674. http://dx.doi.org/10.1364/OE.21.000662 [16] Javidi, B. (1989) Nonlinear Joint Power Spectrum Based Optical Correlation. Applied Optics, 28, 2358-2367. http://dx.doi.org/10.1364/AO.28.002358 [17] Kumar, B.V.K.V., Savvides, M., Xie, C., Venkataramani, K., Thornton, J. and Mahalanobis, A. (2004) Biometric Veri- fication with Correlation Filters. Applied Optics, 43, 391-402. http://dx.doi.org/10.1364/AO.43.000391 [18] Helinski, R., Acharyya, D. and Plusquellic, J. (2009) A Physical Unclonable Function Defined Using Power Distribu- tion System Equivalent Resistance Variations. Proceedings of the 46th Annual Design Automation Conference on ZZZ-DAC’09, 676. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5227103&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls% 2Fabs_all.jsp%3Farnumber%3D5227103