SlideShare a Scribd company logo
1 of 10
Download to read offline
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 7, No. 3, September 2017, pp. 877 ~ 886
DOI: 10.11591/ijeecs.v7.i3.pp877-886  877
Received May 12, 2017; Revised July 30, 2017; Accepted August 14, 2017
Random Projection-based Cancelable Template
Generation for Sparsely Distributed Biometric Patterns
P. Punithavathi
*1
, S. Geetha
2
School of Computing Science & Engineering, VIT University Chennai Campus, Chennai, Tamil Nadu, India
*Corresponding author, e-mail: p.punithavathi2015@vit.ac.in
Abstract
Cancelable biometrics, a template transformation approach, attempts to provide robustness for
authentication services based on biometrics. Several biometric template protection techniques represent
the biometric information in binary form as it provides benefits in matching and storage. In this context, it
becomes clear that often such transformed binary representations can be easily compromised and
breached. In this paper, we propose an efficient non-invertible template transformation approach using
random projection technique and Discrete Fourier transformation to shield the binary biometric
representations. The cancelable fingerprint templates designed by the proposed technique meets the
requirements of revocability, diversity, non-invertibility and performance. The matching performance of the
cancelable fingerprint templates generated using proposed technique, have improved when compared with
the state-of-art methods.
Keywords: Cancelable fingerprint template, Discrete fourier transformation, Random projection, Random
matrix, Template transformation
Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
1.1. Biometrics
Biometrics refers to the measurable physiological (face, fingerprints, hand geometry,
iris, ear, palm prints, etc.,) and behavioral (gait, speech, signature, key stroke, etc.,)
characteristics of an individual. The biometrics has been largely employed in sensitive
applications to authenticate users, instead of passwords or tokens. The biometric system is
comprised of; 1) a sensor unit to image raw biometrics, 2) a feature extraction unit to generate
feature vector from biometric image, 3) a database to store feature vector in template format,
4) a matching unit to match user’s template with stored template, 5) a decision unit to decide
access grant.
1.2. Attacks on Biometric System
Different levels of attacks were identified by Patel et al. in [1], which can be launched
against biometric system. These attacks on the biometric system are shown in Figure 1.
Figure1. Attacks on Biometric System
 ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 877 – 886
878
a) fake biometric trait such as an artificial finger may possibly be presented at the sensor
b) illegally captured data may be resubmitted to the system
c) feature extracting module may be replaced by illegal Trojan horse program to produce
pre-determined feature sets
d) genuine feature sets may be replaced with fake feature sets
e) matcher may be replaced by illegal programs like Trojan horse which will always output
high scores thereby challenging system security
f) stored templates may be modified or removed, or new templates may be introduced into
the database
g) data within the communication channel between various modules of the system may be
modified, and the final decision of the matcher may be overwritten
Various methods such as steganography, watermarking, biometric cryptosystems and
chaotic encryption schemes, to overcome these attacks can be found respectively in [2]-[5].
Though these methods are robust against several attacks, they lack diversity and prevent each
and every user to be registered to number of applications with single biometric template alone.
Cancelable biometrics is a solution to provide diversity so that users can enrol to numerous
applications using corresponding transformed template.
1.3. Cancelable Biometrics
Cancelable biometrics (pioneered by Soutar et al. in 1998 [6], but furnished by Bolle et
al. in 2002 [7]) is a template transformation approach to secure the biometric template. These
non-invertible transformations are applied to the biometric input either at signal-level or feature-
level. The matching is performed in the transformed domain. By changing the transformation
factor, number of transformed templates can be acquired, correspondingly from single biometric
template. These transformed templates can be canceled and revoked easily like password, in
the case of biometric compromise. A transformed template must agree the following properties:
a) Diversity – Multiple transformed templates should be generated corresponding to the
enrolment of users into multiple applications using same biometrics.
b) Non-invertibility – The transformed templates once generated should not be inversed at
any point.
c) Revocable – New transformed templates must be generated to replace the compromised
template in the database.
d) Performance – The matching performance of the templates in transformed domain should
not degrade even across multiple applications, when compared to conventional biometric
template matching schemes.
2. Literature Survey
Ratha et al [8] proposed a case study of cancelable biometrics applied to fingerprint
using Cartesian, radial and functional transformations. Jin et al [9] proposed biohashing which
generates Biocodes based on the projection of an orthonormal random matrix (generated by a
pseudo random generator), on biometric features. Boult et al [10] proposed revocable fingerprint
generating system in which biometric feature is segmented into two parts. The first part is
encrypted and the second part is left to support approximate matching. Teoh and Yaung [11]
proposed multispace random projection in which a fixed-length vector acquired from raw
biometric features, are projected on a sequence of random sub-spaces derived from user-
specific pseudorandom number. Kaur and Khanna [12] proposed random projection for
generating cancelable templates of palmprint and face.
The non-invertible transformations mostly yield transformed templates in binary form,
out of the binary biometric template. The fact is that the binary representations can be easily
managed and stored. Moreover the binary representations offer simplicity in terms of matching.
But the binary representation of transformed template is highly susceptible to inversion in case if
the binary biometric template is sparsely distributed. Hence there is a strong requirement of a
template transformation technique that secures even sparsely distributed binary biometric
representations.
The cancelable templates designed by using the proposed transformation technique
meets the requirements of diversity, revocability, non-invertibility and matching performance,
IJEECS ISSN: 2502-4752 
Random Projection-based Cancelable Template Generation… (P. Punithavathi)
879
evaluated over the publicly available databases DB1 and DB2 of FVC2002 [13] and FVC2004
[14]. The contributions of the proposed technique are summarized as follows:
a) Using Discrete Fourier Transform (DFT) spreads the spectrum of sparsely distributed
binary biometric representations
b) The proposed random projection technique is effective in securing the binary biometric
templates while preserving the pair-wise distance between them even after
transformation
c) Moreover the computational complexity of the proposed technique is very less which
makes it suitable for use in mobile phones
d) The recognition performance of the proposed technique has been comparatively
analysed and shows improvement with respect to the Equal Error Rate (EER) of the
existing methods.
The paper is organised as follows: Section 3 gives an introduction to the basics of DFT
and random projection technique. Section 4 describes the proposed technique for extracting
cancelable fingerprint template. Section 5 provides an insight to the comprehensive analysis of
the results. Section 6 gives conclusion and future work.
3. Introduction to DFT and Random Projection
3.1 DFT
Let us assume that a binary fingerprint template ( bv ) shown in equation (1), denote the
binary biometric representation extracted from the biometrics, before transformation.
X1)]-b(m,……b(1),[b(0),=bv (1)
where {0,1};b(i) and i ranges from to 1)-(m , m representing the size of the template. It is
clear that bv has to be secured because it contains vital information regarding the biometrics of
user. Since it is in binary form, the transformation operations on bv can narrow down the search
space (during attempts to invert the cancelable template); especially when elements of bv are
non-uniformly and sparsely distributed. Hence DFT can be applied to bv prior to the application
of random projection, in-order to achieve dense data representation.
We now take -point DFT of bv as shown in (2).
bFv=Bv (2)
where is a DFT matrix as shown in (3), and and . The value of Bv can be
represented as shown in (4).




















)1N)(1N(W)1N(2W)1N(W1
)1N(2W4W2W1
)1N(W2WW1
1111
F





(3)
X1)]-B(m,……B(1),[B(0),=Bv (4)
where ⁄
. The DFT matrix is a unitary matrix and the DFT operation is highly
invertible. It is to be noted that purpose of taking DFT is just to scatter the sparsely distributed
values of bv .
 ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 877 – 886
880
3.2 Random Projection Technique
The Johnson-Lindenstrauss (JL) Lemma [15] and [16] basically states that a set of
points P in a higher-dimensional Euclidean space N can be embedded into a lower-
dimensional Euclidean space n such that the pair-wise distance of any two points is
maintained approximately. The JL lemma is given as:
Let )1,0( be given. For every set P of #(P) points in N , if n is a positive integer such that,
)
2
(P))ln(#
o(n0>n

 (5)
Then it can be concluded from equation (5), that there exists a Lipschitz mapping
nN:f  such that
2yx)1(2)y(f)x(f2yx)1(   (6)
for all Py,x  .
The function f is a linear mapping represented by k×d matrix  which has its
components drawn randomly from specific probability distributions. Hence it is clear that the
statistical characteristics required for recognition can be preserved even while changing the
original form of the data. The matrices which satisfy (6) for any given set of points P are as
follows (provided n satisfies the condition of JL lemma):
a) The entries j,i of  are realizations of independent Gaussian random variables
b) The entries j,i of  are realizations of ±1 Bernoulli random variables with a probability
of 0.5
c) The entries j,i of  are realizations of related distributions including values of ±√3
(each with a probability of 0.167) and 0 (with a probability of 0.67)
All the three matrices have proved to provide successful projection matrices which end
up in similar results. But we have used Gaussian projections in our experiments. The process of
projecting the binary biometric representation on random matrix  is defined as:
N)×B(kvk)×(d=N)×B(dT  (7)
The pair-wise distances between the vectors must be preserved before and after
transformation. The extent of preservation of pair-wise distances between the vectors highly
depends upon the projection vectors . According to JL lemma, the critical property of the
random projection matrix is that its column vectors must be orthogonal to each other. This
can be achieved by using Gram Schmidt orthogonalization technique. But this technique
increases the computational complexity to a great magnitude.
Several measures have been proposed to reduce the computational complexity. In [17],
it has been reported that the condition of orthogonality must be eliminated while using random
projections to approximate nearest-neighbour in Euclidean space of higher dimension. As an
extension to proof, they used a random projection matrix whose column entries are independent
random variables with Gaussian distribution. The projection of such a matrix has possesses chi-
square distribution with k-degrees of freedom. Further the tail estimates for this distribution can
be used to prove that the pair-wise distance between any two points is not distorted by a factor
more than . Hence it is clear that a random projection matrix whose
elements are normally distributed preserve the pair-wise distance between vectors even after
transformation. This reduces the computational complexity of generating random matrix since
the orthogonality condition is dropped.
IJEECS ISSN: 2502-4752 
Random Projection-based Cancelable Template Generation… (P. Punithavathi)
881
4. Proposed System For Generation Of Complex Cancelable Fingerprint Template
4.1 Generation of Binary Fingerprint Template
The input fingerprint image from sensor is pre-processed using enhancement and
binarization techniques. Then the binarized image is subjected to thinning process so that the
ridges become one pixel wide. The ridges are thin curved lines in fingerprint, which may
bifurcate or terminate. These bifurcations and terminations are called minutia. Each and every
fingerprint has about 70-150 minutia points. Each thi minutia is represented by
]i,it,iy,i[x=iM  . Here, ix and iy , i ranging from ][0,2 , and i represent the position, the
orientation, and the type of minutiae (bifurcation or termination), respectively. The binary
fingerprint template ( bv ) is generated using these minutia points as shown in [18].
4.2 System Model Using Proposed Technique
The system model of the proposed cancelable biometric scheme (shown in Figure 2)
involves two processes namely – enrolment and verification.
(a) Enrolment Phase
(b) Verification Phase
Figure 2. Block Diagram of Proposed Technique
The enrolment process involves generation of cancelable fingerprint template from
binary fingerprint template using the proposed transformation technique. This can be modelled
mathematically with respect to the proposed system (using the equations (2), (4) and (7)) as
follows:
bFv=BT  (8)
To summarize the process, the binary fingerprint template is subjected to DFT and then random
projection to generate a cancelable fingerprint template. The verification process (performed in
transformed domain) involves transformation of query binary fingerprint template (say qv ) into
 ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 877 – 886
882
query cancelable fingerprint template (say qT ) using the equation (8). The verification process
also involves making a binary matching decision after calculating the distance between BT
and qT ( )qT,BD(T ) such that:
)qw(T+)B(w(T
)qT,Bd(T
=)qT,BD(T (9)



otherwise0,
T<)qT,BD(T1,
=V (10)
whereT is a predefined threshold. The value of )qT,BD(T is given by Equation (9). The
templates BT and qT are said to be matching only if 1V  , as represented by Equation (10).
For convenience, the binary fingerprint template, DFT matrix and random matrix are all chosen
to be of same dimension.
4.3 Steps Involved In Proposed Technique
The input to the proposed system is the features extracted from the user’s fingerprint.
The steps involved in enrolment phase and verification phase have been listed below.
Steps involved in enrolment phase:
Input: Features of fingerprint bv
Output: cancelable fingerprint template BT , and random matrix 
Step 1: DFT unit generates N-point DFT of bv by using equation (2) and outputs Bv
Step 2: Random matrix generation unit generates
Step 3: The feature transformation unit acts as random project unit which projects  on Bv ,
and generates a BT
Step 4: BT is stored in the database
Step 5: The random matrix  is given to the user for usage in verification phase
Steps involved in verification phase:
Input: Features of fingerprint bv and random matrix 
Output: Decision Yes or no based on matching probability of BT and qT
Step 1: DFT unit generates N-point DFT of bv by using equation (2) and outputs Bv
Step 2: The feature transformation unit projects  (input by user) on Bv , and generates a query
template say qT
Step 3: The matching unit matches BT and qT as in equation (10), and outputs yes or no
decision based on the matching probability
5. Results and Discussions
5.1 Image Dataset
The proposed system for generating cancelable fingerprint template has been tested on
publicly available datasets in DB1 and DB2 of FVC2002 and FVC 2004. The details of the
datasets have been given in Table 1. The experiment has been carried out using MATLAB
R2015a. Both genuine and imposter tests have been conducted on the four databases. The first
image of each finger from the databases has been used as template. The second image of
each finger from the databases has been used as query images. This has accounted to 100
genuine scores and 4950=)99)/2×((100 imposter scores for each database.
IJEECS ISSN: 2502-4752 
Random Projection-based Cancelable Template Generation… (P. Punithavathi)
883
Table 1. Details of the datasets used in experimentation
Details
FVC2002
DB1
FVC2002
DB2
FVC2004
DB1
FVC2004
DB2
No. of fingers 100 100 100 100
No. of images of
each finger
8 8 8 8
Size of image 388×374 296×560 640×480 328×364
Image format Tagged Image
File Format
Tagged Image File
Format
Tagged Image File
Format
Tagged Image File
Format
5.2 Complexity Analysis
The usage of DFT and random projection in the proposed approach leads to reduced
computational complexity. Let )(O  denote the computational complexity of an algorithm. The
proposed technique is comprised of N-point DFT and random projection. The N-point DFT can
be implemented using Radix-2FFT algorithm [19]. The computational complexity of Radix-2FFT
algorithm is estimated to be )N2logO(N . The computational complexity of random projection is
O(kdN).The overall computational complexity is calculated to be kd)]+N2O[N(log . This low
computational complexity makes the proposed technique to be suitable for memory and power
constrained devices like mobile phones.
5.3 Matching-Performance Analysis
The performance is evaluated using Equal Error Rates (EER). The EER calculated with
respect to False Rejection Rate (FRR) and False Acceptance Rate (FAR), has been used to
examine the matching performance of the original as well as the transformed templates. The
Equations (11) and (12) are used in the calculation of FRR and FAR, respectively.
100×)attemptsaccesslegitimateof)/(Numberrejectionsfailedof(Number=FRR (11)
100×)attemptsimposterofs)/(Numberacceptancefalseof(Number=FAR (12)
FRR-1=GAR (13)
For each dataset, FRR is measured by matching a selected query cancelable fingerprint
template with the same template stored templates. FAR is measured by matching a selected
query cancelable fingerprint template with all the templates in the gallery. EER can be defined
as the error trade-off between FAR and FRR i.e., FRR=FAR at particular threshold value.
The performance of a system is always inversely proportional to the value of EER. The
EER of cancelable fingerprint template is found to be better than the EER of the transformed
templates in [20, 21]. In [20], a randomized graph-based Hamming embedding technique has
been proposed to generate transformed fingerprint template in binary format. In [21] a blind
system identification approach has been proposed to generate transformed fingerprint template
in complex-vector form. Comparative results are shown in Table 2.
Table 2. EER (%) Comparison
Methods FVC2002
DB1
FVC2002
DB2
FVC2004
DB1
FVC2004
DB2
(Jin, Lim, Teoh, and Goi, 2014) [20] 4.36 1.77 - 21.82
(Wang, and Hu, 2016) [21] 3 2 - -
Proposed System 1.27 2.56 8.75 13.39
5.4 Non-Invertibility Analysis
Non-invertibility is an important characteristic of cancelable biometric system by
ensuring that the transformation applied is always one sided. It should not be reversible. In other
words, the transformed template BT should not yield any information about the original binary
biometric representation bv . Let us consider a stolen-token scenario where both BT and the
random matrix are acquired by an adversary. Now the adversary may learn the
 ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 877 – 886
884
transformation process and try to acquire the raw biometric features bv out of the possessed
evidences. But since the proposed system is an underdetermined system as proposed in [22],
there may be infinite number of solutions to bv . The chance of guessing the correct original
binary biometric representation is minimal.
The Receiver Operating Characteristic (ROC) for each dataset in stolen-token scenario
is plotted in Figure 3(a)-3(d). The ROC of the binary biometric representation (pre-
transformation) is compared with that of the cancelable fingerprint template (post-
transformation). It is clear that the recognition performance of the templates before and after
transformation is very similar for FVC2002 DB1 and DB2. But it is highly dissimilar in case of
FVC20024 DB1 and DB2. This is due to poor quality of the images of in FVC20024 DB1 and
DB2.
Figure 3. ROC Curves (a) FVC2002 DB1; (b) FVC2002 DB2; (c) FVC2004 DB1; (d) FVC2004
DB2
(a)
(b)
(c)
(d)
IJEECS ISSN: 2502-4752 
Random Projection-based Cancelable Template Generation… (P. Punithavathi)
885
5.5 Diversity Analysis
Different cancelable templates (say T1 and T2) have been generated for each database
by using corresponding random matrices. Then correlation (C) is calculated between each pair
of cancelable template using Equation (14). Let correlation index (C’) be the mean of all values
of C corresponding to the cancelable templates generated for respective fingerprint. Table 3
shows the value of C’ of cancelable templates for different FVC databases. If the value of C’ =
0.0022, then two templates generated from same biometric sample using different random
matrices share 0.22 % of mutual information.
2)T2(T22)T1(T1
)T2)(T2T1(T1
T2)C(T1,

 
 (14)
Table 3. Correlation Coefficients of Templates
Database C’
FVC2002 DB1 0.0022
FVC2002 DB2 0.0024
FVC2004 DB1 0.0019
FVC2004 DB2 0.0023
6. Conclusion
We have proposed a random projection-based approach for designing cancelable
fingerprint templates containing complex biometric representations. The feature templates of a
fingerprint may be sparse. The proposed technique is robust even in such situations because
the DFT spreads the spectrum and reduces the sparsity greatly. The cancelable fingerprint
templates generated using the proposed approach, satisfy the basic properties of cancelable
biometrics-revocability, diversity, non-invertibility and matching performance. By using random
projection-based approach for transformation of binary biometric features, it becomes
computationally efficient; and highly suitable for resource-limited applications, e.g., mobile
phones. The effectiveness of the proposed technique can be tested on different modalities in
future.
Acknowledgements
Authors are thankful to the Management of VIT University-Chennai Campus. The first
author has been supported by Visvesvaraya PhD Scheme funded by Media Lab Asia, DeitY,
Government of India.
References
[1] Patel VM, Ratha NK, Chellappa R. Cancelable biometrics: A review. IEEE Signal Processing
Magazine. 2015 Sep;32(5):54-65.
[2] Balasubramanian C, Selvakumar S, Geetha S. High payload image steganography with reduced
distortion using octonary pixel pairing scheme. Multimedia tools and applications. 2014 Dec
1;73(3):2223-45.
[3] Thanki R, Borisagar K. Security of Biometric Data Using Compressed Watermarking Technique.
International Journal of Electrical and Computer Engineering. 2014 Oct 1;4(5):758.
[4] Jin Z, Teoh AB, Goi BM, Tay YH. Biometric cryptosystems: A new biometric key binding and its
implementation for fingerprint minutiae-based representation. Pattern Recognition. 2016 Aug
31;56:50-62.
[5] Abundiz-Pérez F, Cruz-Hernández C, Murillo-Escobar MA, López-Gutiérrez RM, Arellano-Delgado A.
A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map. Mathematical
Problems in Engineering. 2016 Jul 31;2016.
[6] Stojanov R, Gilroy Soutar G, Roberge D, Kumar V. Biometric encryption using image processing.
SPIE, Optical Security and Counterfeit Deterrence Techniques H. 1998;3314:178-88.
[7] Bolle RM, Connell JH, Ratha NK. Biometric perils and patches. Pattern Recognition. 2002 Dec
31;35(12):2727-38.
 ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 877 – 886
886
[8] Ratha N, Connell J, Bolle RM, Chikkerur S. Cancelable biometrics: A case study in fingerprints.
InPattern Recognition, 2006. ICPR 2006. 18th International Conference on 2006 Aug 20 (Vol. 4, pp.
370-373). IEEE.
[9] Jin AT, Ling DN, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised
random number. Pattern recognition. 2004 Nov 30;37(11):2245-55.
[10] Boult TE, Scheirer WJ, Woodworth R. Revocable fingerprint biotokens: Accuracy and security
analysis. InComputer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference on 2007 Jun
17 (pp. 1-8). IEEE.
[11] Teoh AB, Yuang CT. Cancelable biometrics realization with multispace random projections. IEEE
Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). 2007 Oct;37(5):1096-106.
[12] Kaur H, Khanna P. Gaussian random projection based non-invertible cancelable biometric templates.
Procedia Computer Science. 2015 Jan 1;54:661-70.
[13] "FingerprintVerification Competition," 2002. [Online]. Available: http://bias.csr.unibo.it/fvc2002/.
[14] "FingerprintVerification Competition," 2004. [Online]. Available: http://bias.csr.unibo.it/fvc2004/.
[15] Johnson WB, Lindenstrauss J. Extensions of Lipschitz mappings into a Hilbert space. Contemporary
mathematics. 1984 May;26(189-206):1.
[16] Bingham E, Mannila H. Random projection in dimensionality reduction: applications to image and text
data. InProceedings of the seventh ACM SIGKDD international conference on Knowledge discovery
and data mining 2001 Aug 26 (pp. 245-250). ACM.
[17] Har-Peled S, Indyk P, Motwani R. Approximate Nearest Neighbor: Towards Removing the Curse of
Dimensionality. Theory of computing. 2012 Jan 12;8(1):321-50.
[18] Wang S, Hu J. Design of alignment-free cancelable fingerprint templates via curtailed circular
convolution. Pattern Recognition. 2014 Mar 31;47(3):1321-9.
[19] Proakis JG, Manolakis DG. Digital Signal Processing: Principles, Algotithms, and Applications,
Prentice Hall, 1996.
[20] Jin Z, Lim MH, Teoh AB, Goi BM. A non-invertible randomized graph-based hamming embedding for
generating cancelable fingerprint template. Pattern Recognition Letters. 2014 Jun 1;42:137-47.
[21] Wang S, Hu J. A blind system identifaication approach to cancelable fingerprint templates. Pattern
Recognition. 2016 Jun 30;54:14-22.
[22] Wang S, Hu J. Alignment-free cancelable fingerprint template design: A densely infinite-to-one
mapping (DITOM) approach. Pattern Recognition. 2012 Dec 31;45(12):4129-37.

More Related Content

What's hot

3ways to improve semantic segmentation
3ways to improve semantic segmentation3ways to improve semantic segmentation
3ways to improve semantic segmentationFrozen Paradise
 
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTFuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTSalahdeen Nasiru Kehinde
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...ijesajournal
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingPriyanka Wagh
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...eSAT Publishing House
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...IDES Editor
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger imageseSAT Publishing House
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text ConverterDhiraj Raj
 

What's hot (18)

3ways to improve semantic segmentation
3ways to improve semantic segmentation3ways to improve semantic segmentation
3ways to improve semantic segmentation
 
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICTFuzzy Logic and Biometrics Traits Evaluation_AJOCICT
Fuzzy Logic and Biometrics Traits Evaluation_AJOCICT
 
B280916
B280916B280916
B280916
 
649 652
649 652649 652
649 652
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Lv3421272135
Lv3421272135Lv3421272135
Lv3421272135
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with Smoothing
 
40120140505005
4012014050500540120140505005
40120140505005
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...Design issues and challenges of reliable and secure transmission of medical i...
Design issues and challenges of reliable and secure transmission of medical i...
 
Bd25328332
Bd25328332Bd25328332
Bd25328332
 
Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...Performance Evaluation of Classifiers used for Identification of Encryption A...
Performance Evaluation of Classifiers used for Identification of Encryption A...
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text Converter
 

Similar to 31 8949 punithavathi ramesh sub.id.69 (edit)new

Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identificationijeei-iaes
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA cscpconf
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAcsandit
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithmeSAT Publishing House
 
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...An Intelligent Approach for Effective Retrieval of Content from Large Data Se...
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...IJCSIS Research Publications
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
Efficient video compression using EZWT
Efficient video compression using EZWTEfficient video compression using EZWT
Efficient video compression using EZWTIJERA Editor
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...IJECEIAES
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...CSCJournals
 

Similar to 31 8949 punithavathi ramesh sub.id.69 (edit)new (20)

Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
G017544855
G017544855G017544855
G017544855
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identification
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDAA NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
 
Optimized block size based video coding algorithm
Optimized block size based video coding algorithmOptimized block size based video coding algorithm
Optimized block size based video coding algorithm
 
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...An Intelligent Approach for Effective Retrieval of Content from Large Data Se...
An Intelligent Approach for Effective Retrieval of Content from Large Data Se...
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
R01754129132
R01754129132R01754129132
R01754129132
 
Efficient video compression using EZWT
Efficient video compression using EZWTEfficient video compression using EZWT
Efficient video compression using EZWT
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion Methods
 
G0333946
G0333946G0333946
G0333946
 
E1083237
E1083237E1083237
E1083237
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...Design and implementation of a java based virtual laboratory for data communi...
Design and implementation of a java based virtual laboratory for data communi...
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
Shallow vs. Deep Image Representations: A Comparative Study with Enhancements...
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on applicationIAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-edIAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reductionIAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power lossIAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reductionIAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural networkIAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancementIAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijictIAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijictIAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijictIAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijictIAESIJEECS
 
04 18696 ijict
04 18696 ijict04 18696 ijict
04 18696 ijictIAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 
04 18696 ijict
04 18696 ijict04 18696 ijict
04 18696 ijict
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

31 8949 punithavathi ramesh sub.id.69 (edit)new

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 7, No. 3, September 2017, pp. 877 ~ 886 DOI: 10.11591/ijeecs.v7.i3.pp877-886  877 Received May 12, 2017; Revised July 30, 2017; Accepted August 14, 2017 Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns P. Punithavathi *1 , S. Geetha 2 School of Computing Science & Engineering, VIT University Chennai Campus, Chennai, Tamil Nadu, India *Corresponding author, e-mail: p.punithavathi2015@vit.ac.in Abstract Cancelable biometrics, a template transformation approach, attempts to provide robustness for authentication services based on biometrics. Several biometric template protection techniques represent the biometric information in binary form as it provides benefits in matching and storage. In this context, it becomes clear that often such transformed binary representations can be easily compromised and breached. In this paper, we propose an efficient non-invertible template transformation approach using random projection technique and Discrete Fourier transformation to shield the binary biometric representations. The cancelable fingerprint templates designed by the proposed technique meets the requirements of revocability, diversity, non-invertibility and performance. The matching performance of the cancelable fingerprint templates generated using proposed technique, have improved when compared with the state-of-art methods. Keywords: Cancelable fingerprint template, Discrete fourier transformation, Random projection, Random matrix, Template transformation Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction 1.1. Biometrics Biometrics refers to the measurable physiological (face, fingerprints, hand geometry, iris, ear, palm prints, etc.,) and behavioral (gait, speech, signature, key stroke, etc.,) characteristics of an individual. The biometrics has been largely employed in sensitive applications to authenticate users, instead of passwords or tokens. The biometric system is comprised of; 1) a sensor unit to image raw biometrics, 2) a feature extraction unit to generate feature vector from biometric image, 3) a database to store feature vector in template format, 4) a matching unit to match user’s template with stored template, 5) a decision unit to decide access grant. 1.2. Attacks on Biometric System Different levels of attacks were identified by Patel et al. in [1], which can be launched against biometric system. These attacks on the biometric system are shown in Figure 1. Figure1. Attacks on Biometric System
  • 2.  ISSN: 2502-4752 IJEECS Vol. 7, No. 3, September 2017 : 877 – 886 878 a) fake biometric trait such as an artificial finger may possibly be presented at the sensor b) illegally captured data may be resubmitted to the system c) feature extracting module may be replaced by illegal Trojan horse program to produce pre-determined feature sets d) genuine feature sets may be replaced with fake feature sets e) matcher may be replaced by illegal programs like Trojan horse which will always output high scores thereby challenging system security f) stored templates may be modified or removed, or new templates may be introduced into the database g) data within the communication channel between various modules of the system may be modified, and the final decision of the matcher may be overwritten Various methods such as steganography, watermarking, biometric cryptosystems and chaotic encryption schemes, to overcome these attacks can be found respectively in [2]-[5]. Though these methods are robust against several attacks, they lack diversity and prevent each and every user to be registered to number of applications with single biometric template alone. Cancelable biometrics is a solution to provide diversity so that users can enrol to numerous applications using corresponding transformed template. 1.3. Cancelable Biometrics Cancelable biometrics (pioneered by Soutar et al. in 1998 [6], but furnished by Bolle et al. in 2002 [7]) is a template transformation approach to secure the biometric template. These non-invertible transformations are applied to the biometric input either at signal-level or feature- level. The matching is performed in the transformed domain. By changing the transformation factor, number of transformed templates can be acquired, correspondingly from single biometric template. These transformed templates can be canceled and revoked easily like password, in the case of biometric compromise. A transformed template must agree the following properties: a) Diversity – Multiple transformed templates should be generated corresponding to the enrolment of users into multiple applications using same biometrics. b) Non-invertibility – The transformed templates once generated should not be inversed at any point. c) Revocable – New transformed templates must be generated to replace the compromised template in the database. d) Performance – The matching performance of the templates in transformed domain should not degrade even across multiple applications, when compared to conventional biometric template matching schemes. 2. Literature Survey Ratha et al [8] proposed a case study of cancelable biometrics applied to fingerprint using Cartesian, radial and functional transformations. Jin et al [9] proposed biohashing which generates Biocodes based on the projection of an orthonormal random matrix (generated by a pseudo random generator), on biometric features. Boult et al [10] proposed revocable fingerprint generating system in which biometric feature is segmented into two parts. The first part is encrypted and the second part is left to support approximate matching. Teoh and Yaung [11] proposed multispace random projection in which a fixed-length vector acquired from raw biometric features, are projected on a sequence of random sub-spaces derived from user- specific pseudorandom number. Kaur and Khanna [12] proposed random projection for generating cancelable templates of palmprint and face. The non-invertible transformations mostly yield transformed templates in binary form, out of the binary biometric template. The fact is that the binary representations can be easily managed and stored. Moreover the binary representations offer simplicity in terms of matching. But the binary representation of transformed template is highly susceptible to inversion in case if the binary biometric template is sparsely distributed. Hence there is a strong requirement of a template transformation technique that secures even sparsely distributed binary biometric representations. The cancelable templates designed by using the proposed transformation technique meets the requirements of diversity, revocability, non-invertibility and matching performance,
  • 3. IJEECS ISSN: 2502-4752  Random Projection-based Cancelable Template Generation… (P. Punithavathi) 879 evaluated over the publicly available databases DB1 and DB2 of FVC2002 [13] and FVC2004 [14]. The contributions of the proposed technique are summarized as follows: a) Using Discrete Fourier Transform (DFT) spreads the spectrum of sparsely distributed binary biometric representations b) The proposed random projection technique is effective in securing the binary biometric templates while preserving the pair-wise distance between them even after transformation c) Moreover the computational complexity of the proposed technique is very less which makes it suitable for use in mobile phones d) The recognition performance of the proposed technique has been comparatively analysed and shows improvement with respect to the Equal Error Rate (EER) of the existing methods. The paper is organised as follows: Section 3 gives an introduction to the basics of DFT and random projection technique. Section 4 describes the proposed technique for extracting cancelable fingerprint template. Section 5 provides an insight to the comprehensive analysis of the results. Section 6 gives conclusion and future work. 3. Introduction to DFT and Random Projection 3.1 DFT Let us assume that a binary fingerprint template ( bv ) shown in equation (1), denote the binary biometric representation extracted from the biometrics, before transformation. X1)]-b(m,……b(1),[b(0),=bv (1) where {0,1};b(i) and i ranges from to 1)-(m , m representing the size of the template. It is clear that bv has to be secured because it contains vital information regarding the biometrics of user. Since it is in binary form, the transformation operations on bv can narrow down the search space (during attempts to invert the cancelable template); especially when elements of bv are non-uniformly and sparsely distributed. Hence DFT can be applied to bv prior to the application of random projection, in-order to achieve dense data representation. We now take -point DFT of bv as shown in (2). bFv=Bv (2) where is a DFT matrix as shown in (3), and and . The value of Bv can be represented as shown in (4).                     )1N)(1N(W)1N(2W)1N(W1 )1N(2W4W2W1 )1N(W2WW1 1111 F      (3) X1)]-B(m,……B(1),[B(0),=Bv (4) where ⁄ . The DFT matrix is a unitary matrix and the DFT operation is highly invertible. It is to be noted that purpose of taking DFT is just to scatter the sparsely distributed values of bv .
  • 4.  ISSN: 2502-4752 IJEECS Vol. 7, No. 3, September 2017 : 877 – 886 880 3.2 Random Projection Technique The Johnson-Lindenstrauss (JL) Lemma [15] and [16] basically states that a set of points P in a higher-dimensional Euclidean space N can be embedded into a lower- dimensional Euclidean space n such that the pair-wise distance of any two points is maintained approximately. The JL lemma is given as: Let )1,0( be given. For every set P of #(P) points in N , if n is a positive integer such that, ) 2 (P))ln(# o(n0>n   (5) Then it can be concluded from equation (5), that there exists a Lipschitz mapping nN:f  such that 2yx)1(2)y(f)x(f2yx)1(   (6) for all Py,x  . The function f is a linear mapping represented by k×d matrix  which has its components drawn randomly from specific probability distributions. Hence it is clear that the statistical characteristics required for recognition can be preserved even while changing the original form of the data. The matrices which satisfy (6) for any given set of points P are as follows (provided n satisfies the condition of JL lemma): a) The entries j,i of  are realizations of independent Gaussian random variables b) The entries j,i of  are realizations of ±1 Bernoulli random variables with a probability of 0.5 c) The entries j,i of  are realizations of related distributions including values of ±√3 (each with a probability of 0.167) and 0 (with a probability of 0.67) All the three matrices have proved to provide successful projection matrices which end up in similar results. But we have used Gaussian projections in our experiments. The process of projecting the binary biometric representation on random matrix  is defined as: N)×B(kvk)×(d=N)×B(dT  (7) The pair-wise distances between the vectors must be preserved before and after transformation. The extent of preservation of pair-wise distances between the vectors highly depends upon the projection vectors . According to JL lemma, the critical property of the random projection matrix is that its column vectors must be orthogonal to each other. This can be achieved by using Gram Schmidt orthogonalization technique. But this technique increases the computational complexity to a great magnitude. Several measures have been proposed to reduce the computational complexity. In [17], it has been reported that the condition of orthogonality must be eliminated while using random projections to approximate nearest-neighbour in Euclidean space of higher dimension. As an extension to proof, they used a random projection matrix whose column entries are independent random variables with Gaussian distribution. The projection of such a matrix has possesses chi- square distribution with k-degrees of freedom. Further the tail estimates for this distribution can be used to prove that the pair-wise distance between any two points is not distorted by a factor more than . Hence it is clear that a random projection matrix whose elements are normally distributed preserve the pair-wise distance between vectors even after transformation. This reduces the computational complexity of generating random matrix since the orthogonality condition is dropped.
  • 5. IJEECS ISSN: 2502-4752  Random Projection-based Cancelable Template Generation… (P. Punithavathi) 881 4. Proposed System For Generation Of Complex Cancelable Fingerprint Template 4.1 Generation of Binary Fingerprint Template The input fingerprint image from sensor is pre-processed using enhancement and binarization techniques. Then the binarized image is subjected to thinning process so that the ridges become one pixel wide. The ridges are thin curved lines in fingerprint, which may bifurcate or terminate. These bifurcations and terminations are called minutia. Each and every fingerprint has about 70-150 minutia points. Each thi minutia is represented by ]i,it,iy,i[x=iM  . Here, ix and iy , i ranging from ][0,2 , and i represent the position, the orientation, and the type of minutiae (bifurcation or termination), respectively. The binary fingerprint template ( bv ) is generated using these minutia points as shown in [18]. 4.2 System Model Using Proposed Technique The system model of the proposed cancelable biometric scheme (shown in Figure 2) involves two processes namely – enrolment and verification. (a) Enrolment Phase (b) Verification Phase Figure 2. Block Diagram of Proposed Technique The enrolment process involves generation of cancelable fingerprint template from binary fingerprint template using the proposed transformation technique. This can be modelled mathematically with respect to the proposed system (using the equations (2), (4) and (7)) as follows: bFv=BT  (8) To summarize the process, the binary fingerprint template is subjected to DFT and then random projection to generate a cancelable fingerprint template. The verification process (performed in transformed domain) involves transformation of query binary fingerprint template (say qv ) into
  • 6.  ISSN: 2502-4752 IJEECS Vol. 7, No. 3, September 2017 : 877 – 886 882 query cancelable fingerprint template (say qT ) using the equation (8). The verification process also involves making a binary matching decision after calculating the distance between BT and qT ( )qT,BD(T ) such that: )qw(T+)B(w(T )qT,Bd(T =)qT,BD(T (9)    otherwise0, T<)qT,BD(T1, =V (10) whereT is a predefined threshold. The value of )qT,BD(T is given by Equation (9). The templates BT and qT are said to be matching only if 1V  , as represented by Equation (10). For convenience, the binary fingerprint template, DFT matrix and random matrix are all chosen to be of same dimension. 4.3 Steps Involved In Proposed Technique The input to the proposed system is the features extracted from the user’s fingerprint. The steps involved in enrolment phase and verification phase have been listed below. Steps involved in enrolment phase: Input: Features of fingerprint bv Output: cancelable fingerprint template BT , and random matrix  Step 1: DFT unit generates N-point DFT of bv by using equation (2) and outputs Bv Step 2: Random matrix generation unit generates Step 3: The feature transformation unit acts as random project unit which projects  on Bv , and generates a BT Step 4: BT is stored in the database Step 5: The random matrix  is given to the user for usage in verification phase Steps involved in verification phase: Input: Features of fingerprint bv and random matrix  Output: Decision Yes or no based on matching probability of BT and qT Step 1: DFT unit generates N-point DFT of bv by using equation (2) and outputs Bv Step 2: The feature transformation unit projects  (input by user) on Bv , and generates a query template say qT Step 3: The matching unit matches BT and qT as in equation (10), and outputs yes or no decision based on the matching probability 5. Results and Discussions 5.1 Image Dataset The proposed system for generating cancelable fingerprint template has been tested on publicly available datasets in DB1 and DB2 of FVC2002 and FVC 2004. The details of the datasets have been given in Table 1. The experiment has been carried out using MATLAB R2015a. Both genuine and imposter tests have been conducted on the four databases. The first image of each finger from the databases has been used as template. The second image of each finger from the databases has been used as query images. This has accounted to 100 genuine scores and 4950=)99)/2×((100 imposter scores for each database.
  • 7. IJEECS ISSN: 2502-4752  Random Projection-based Cancelable Template Generation… (P. Punithavathi) 883 Table 1. Details of the datasets used in experimentation Details FVC2002 DB1 FVC2002 DB2 FVC2004 DB1 FVC2004 DB2 No. of fingers 100 100 100 100 No. of images of each finger 8 8 8 8 Size of image 388×374 296×560 640×480 328×364 Image format Tagged Image File Format Tagged Image File Format Tagged Image File Format Tagged Image File Format 5.2 Complexity Analysis The usage of DFT and random projection in the proposed approach leads to reduced computational complexity. Let )(O  denote the computational complexity of an algorithm. The proposed technique is comprised of N-point DFT and random projection. The N-point DFT can be implemented using Radix-2FFT algorithm [19]. The computational complexity of Radix-2FFT algorithm is estimated to be )N2logO(N . The computational complexity of random projection is O(kdN).The overall computational complexity is calculated to be kd)]+N2O[N(log . This low computational complexity makes the proposed technique to be suitable for memory and power constrained devices like mobile phones. 5.3 Matching-Performance Analysis The performance is evaluated using Equal Error Rates (EER). The EER calculated with respect to False Rejection Rate (FRR) and False Acceptance Rate (FAR), has been used to examine the matching performance of the original as well as the transformed templates. The Equations (11) and (12) are used in the calculation of FRR and FAR, respectively. 100×)attemptsaccesslegitimateof)/(Numberrejectionsfailedof(Number=FRR (11) 100×)attemptsimposterofs)/(Numberacceptancefalseof(Number=FAR (12) FRR-1=GAR (13) For each dataset, FRR is measured by matching a selected query cancelable fingerprint template with the same template stored templates. FAR is measured by matching a selected query cancelable fingerprint template with all the templates in the gallery. EER can be defined as the error trade-off between FAR and FRR i.e., FRR=FAR at particular threshold value. The performance of a system is always inversely proportional to the value of EER. The EER of cancelable fingerprint template is found to be better than the EER of the transformed templates in [20, 21]. In [20], a randomized graph-based Hamming embedding technique has been proposed to generate transformed fingerprint template in binary format. In [21] a blind system identification approach has been proposed to generate transformed fingerprint template in complex-vector form. Comparative results are shown in Table 2. Table 2. EER (%) Comparison Methods FVC2002 DB1 FVC2002 DB2 FVC2004 DB1 FVC2004 DB2 (Jin, Lim, Teoh, and Goi, 2014) [20] 4.36 1.77 - 21.82 (Wang, and Hu, 2016) [21] 3 2 - - Proposed System 1.27 2.56 8.75 13.39 5.4 Non-Invertibility Analysis Non-invertibility is an important characteristic of cancelable biometric system by ensuring that the transformation applied is always one sided. It should not be reversible. In other words, the transformed template BT should not yield any information about the original binary biometric representation bv . Let us consider a stolen-token scenario where both BT and the random matrix are acquired by an adversary. Now the adversary may learn the
  • 8.  ISSN: 2502-4752 IJEECS Vol. 7, No. 3, September 2017 : 877 – 886 884 transformation process and try to acquire the raw biometric features bv out of the possessed evidences. But since the proposed system is an underdetermined system as proposed in [22], there may be infinite number of solutions to bv . The chance of guessing the correct original binary biometric representation is minimal. The Receiver Operating Characteristic (ROC) for each dataset in stolen-token scenario is plotted in Figure 3(a)-3(d). The ROC of the binary biometric representation (pre- transformation) is compared with that of the cancelable fingerprint template (post- transformation). It is clear that the recognition performance of the templates before and after transformation is very similar for FVC2002 DB1 and DB2. But it is highly dissimilar in case of FVC20024 DB1 and DB2. This is due to poor quality of the images of in FVC20024 DB1 and DB2. Figure 3. ROC Curves (a) FVC2002 DB1; (b) FVC2002 DB2; (c) FVC2004 DB1; (d) FVC2004 DB2 (a) (b) (c) (d)
  • 9. IJEECS ISSN: 2502-4752  Random Projection-based Cancelable Template Generation… (P. Punithavathi) 885 5.5 Diversity Analysis Different cancelable templates (say T1 and T2) have been generated for each database by using corresponding random matrices. Then correlation (C) is calculated between each pair of cancelable template using Equation (14). Let correlation index (C’) be the mean of all values of C corresponding to the cancelable templates generated for respective fingerprint. Table 3 shows the value of C’ of cancelable templates for different FVC databases. If the value of C’ = 0.0022, then two templates generated from same biometric sample using different random matrices share 0.22 % of mutual information. 2)T2(T22)T1(T1 )T2)(T2T1(T1 T2)C(T1,     (14) Table 3. Correlation Coefficients of Templates Database C’ FVC2002 DB1 0.0022 FVC2002 DB2 0.0024 FVC2004 DB1 0.0019 FVC2004 DB2 0.0023 6. Conclusion We have proposed a random projection-based approach for designing cancelable fingerprint templates containing complex biometric representations. The feature templates of a fingerprint may be sparse. The proposed technique is robust even in such situations because the DFT spreads the spectrum and reduces the sparsity greatly. The cancelable fingerprint templates generated using the proposed approach, satisfy the basic properties of cancelable biometrics-revocability, diversity, non-invertibility and matching performance. By using random projection-based approach for transformation of binary biometric features, it becomes computationally efficient; and highly suitable for resource-limited applications, e.g., mobile phones. The effectiveness of the proposed technique can be tested on different modalities in future. Acknowledgements Authors are thankful to the Management of VIT University-Chennai Campus. The first author has been supported by Visvesvaraya PhD Scheme funded by Media Lab Asia, DeitY, Government of India. References [1] Patel VM, Ratha NK, Chellappa R. Cancelable biometrics: A review. IEEE Signal Processing Magazine. 2015 Sep;32(5):54-65. [2] Balasubramanian C, Selvakumar S, Geetha S. High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimedia tools and applications. 2014 Dec 1;73(3):2223-45. [3] Thanki R, Borisagar K. Security of Biometric Data Using Compressed Watermarking Technique. International Journal of Electrical and Computer Engineering. 2014 Oct 1;4(5):758. [4] Jin Z, Teoh AB, Goi BM, Tay YH. Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recognition. 2016 Aug 31;56:50-62. [5] Abundiz-Pérez F, Cruz-Hernández C, Murillo-Escobar MA, López-Gutiérrez RM, Arellano-Delgado A. A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map. Mathematical Problems in Engineering. 2016 Jul 31;2016. [6] Stojanov R, Gilroy Soutar G, Roberge D, Kumar V. Biometric encryption using image processing. SPIE, Optical Security and Counterfeit Deterrence Techniques H. 1998;3314:178-88. [7] Bolle RM, Connell JH, Ratha NK. Biometric perils and patches. Pattern Recognition. 2002 Dec 31;35(12):2727-38.
  • 10.  ISSN: 2502-4752 IJEECS Vol. 7, No. 3, September 2017 : 877 – 886 886 [8] Ratha N, Connell J, Bolle RM, Chikkerur S. Cancelable biometrics: A case study in fingerprints. InPattern Recognition, 2006. ICPR 2006. 18th International Conference on 2006 Aug 20 (Vol. 4, pp. 370-373). IEEE. [9] Jin AT, Ling DN, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition. 2004 Nov 30;37(11):2245-55. [10] Boult TE, Scheirer WJ, Woodworth R. Revocable fingerprint biotokens: Accuracy and security analysis. InComputer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference on 2007 Jun 17 (pp. 1-8). IEEE. [11] Teoh AB, Yuang CT. Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). 2007 Oct;37(5):1096-106. [12] Kaur H, Khanna P. Gaussian random projection based non-invertible cancelable biometric templates. Procedia Computer Science. 2015 Jan 1;54:661-70. [13] "FingerprintVerification Competition," 2002. [Online]. Available: http://bias.csr.unibo.it/fvc2002/. [14] "FingerprintVerification Competition," 2004. [Online]. Available: http://bias.csr.unibo.it/fvc2004/. [15] Johnson WB, Lindenstrauss J. Extensions of Lipschitz mappings into a Hilbert space. Contemporary mathematics. 1984 May;26(189-206):1. [16] Bingham E, Mannila H. Random projection in dimensionality reduction: applications to image and text data. InProceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining 2001 Aug 26 (pp. 245-250). ACM. [17] Har-Peled S, Indyk P, Motwani R. Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality. Theory of computing. 2012 Jan 12;8(1):321-50. [18] Wang S, Hu J. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recognition. 2014 Mar 31;47(3):1321-9. [19] Proakis JG, Manolakis DG. Digital Signal Processing: Principles, Algotithms, and Applications, Prentice Hall, 1996. [20] Jin Z, Lim MH, Teoh AB, Goi BM. A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recognition Letters. 2014 Jun 1;42:137-47. [21] Wang S, Hu J. A blind system identifaication approach to cancelable fingerprint templates. Pattern Recognition. 2016 Jun 30;54:14-22. [22] Wang S, Hu J. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognition. 2012 Dec 31;45(12):4129-37.