Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,

Slides:



Advertisements
Similar presentations
Image Registration  Mapping of Evolution. Registration Goals Assume the correspondences are known Find such f() and g() such that the images are best.
Advertisements

More Vectors.
Alignment Visual Recognition “Straighten your paths” Isaiah.
Medical Image Registration Kumar Rajamani. Registration Spatial transform that maps points from one image to corresponding points in another image.
1 Is your biometric data safe? Alex Kot School of Electrical & Electronic Engineering Nanyang Technological University Singapore.
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
IIIT Hyderabad Pose Invariant Palmprint Recognition Chhaya Methani and Anoop Namboodiri Centre for Visual Information Technology IIIT, Hyderabad, INDIA.
Mapping: Scaling Rotation Translation Warp
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
A Versatile Depalletizer of Boxes Based on Range Imagery Dimitrios Katsoulas*, Lothar Bergen*, Lambis Tassakos** *University of Freiburg **Inos Automation-software.
Shape and Dynamics in Human Movement Analysis Ashok Veeraraghavan.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Shape and Dynamics in Human Movement Analysis Ashok Veeraraghavan.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Symmetric hash functions for fingerprint minutiae
Indexing and Binning Large Databases
1 Extracting Discriminative Binary Template for Face Template Protection Feng Yicheng Supervisor: Prof. Yuen August 31 st, 2009.
Biometrics II CUBS, University at Buffalo
CS485/685 Computer Vision Prof. George Bebis
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Object Recognition Using Geometric Hashing
Scale Invariant Feature Transform (SIFT)
Fingerprint Matching Chapter On-Line Fingerprint Verification Anil Jain, Fellow, IEEE, Lin Hong, and Ruud Bolle, Fellow, IEEE Presented by Chris.
MSU CSE 803 Fall 2008 Stockman1 CV: 3D sensing and calibration Coordinate system changes; perspective transformation; Stereo and structured light.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Securing Pervasive Networks Using Biometrics
IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
Introduction to Biometric Systems
Chapter 9 Superposition and Dynamic Programming 1 Chapter 9 Superposition and dynamic programming Most methods for comparing structures use some sorts.
CRYPTO KEY GENERATION USING SLICING WINDOW ALGORITHM M.S. Altarawneh, L.C. Khor, W.L. Woo, and S.S. Dlay School of Electrical, Electronic and Computer.
1 Preview At least two views are required to access the depth of a scene point and in turn to reconstruct scene structure Multiple views can be obtained.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Kumar Srijan ( ) Syed Ahsan( ). Problem Statement To create a Neural Networks based multiclass object classifier which can do rotation,
Ajay Kumar, Member, IEEE, and David Zhang, Senior Member, IEEE.
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Digital Image Processing Lecture 7: Geometric Transformation March 16, 2005 Prof. Charlene Tsai.
Line detection Assume there is a binary image, we use F(ά,X)=0 as the parametric equation of a curve with a vector of parameters ά=[α 1, …, α m ] and X=[x.
ECE738 Advanced Image Processing Face Detection IEEE Trans. PAMI, July 1997.
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
CS 376b Introduction to Computer Vision 04 / 28 / 2008 Instructor: Michael Eckmann.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Biometric for Network Security. Finger Biometrics.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Extending a displacement A displacement defined by a pair where l is the length of the displacement and  the angle between its direction and the x-axix.
Secure Biometric Authentication for Weak Computational Devices Mikhail Atallah (Purdue),Keith Frikken (Purdue), Michael Goodrich (UC- Irvine), Roberto.
Deformation Modeling for Robust 3D Face Matching Xioguang Lu and Anil K. Jain Dept. of Computer Science & Engineering Michigan State University.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Fingerprint Identification
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Nearest-neighbor matching to feature database
Improving the Performance of Fingerprint Classification
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Multimodal Biometric Security
René Vidal and Xiaodong Fan Center for Imaging Science
Secure and Privacy-Preserving User Authentication Using Biometrics
Nearest-neighbor matching to feature database
Hybrid Finger print recognition
Presentation transcript:

Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo, New York, USA

Securing password information It is impossible to learn the original password given stored hash value of it.

Securing fingerprint information Wish to use similar functions for fingerprint data:

Obstacles in finding fingerprint hash functions Since match algorithm will work with the values of hash functions, similar fingerprints should have similar hash values rotation and translation of original image should not have big impact on hash values partial fingerprints should be matched Fingerprint spaceHash space h f1f1 f2f2 h(f 1 ) h(f 2 )

Existing Approaches Davida, Frankel, Matt (1998) - use error correcting codes, features should be ordered Biometric encryption (Soutar et al., 1998) - use filters for Fourier transform of fingerprint image - need images referencing same parts of fingerprint? (example of such filters for face verification)

Existing Approaches Ratha, Connell, Bolle (2001) - polynomial transform; need alignment. Juels, Sudan (2002) - map points to the values of error correcting codes, introduce variation by adding some other points. Follow-ups: Clancy et al, 2003 Uludag, Jain (2004)

Minutia points of the fingerprint Minutia points - points where ridge structure changes: end of the ridge and branching of the ridge. The positions of minutia points uniquely identifies the fingerprint.

Assumptions on minutiae sets extracted from the same finger Assume that two fingerprints originating from one finger differ by scale and rotation. Thus the set of minutia points of one fingerprint image can be obtained from the set of minutia points of another fingerprint image by scaling and rotating.

Transformation of minutiae set If we represent minutia points as points on a complex plane, then scaling and rotation can be expressed by function: where is the complex number determining rotation and scaling, and is the complex number determining translation of minutia point. Multiplying by r means rotating by angle and scaling by factor.

Transformation function If is a set of minutia points of first fingerprint and is a set of minutia points of second fingerprint (same finger), then we assume that there is a transformation such that for any.

Hash functions of minutia points Consider following functions of minutia positions: The values of these symmetric functions do not depend on the order of minutia points.

Hash functions of transformed minutiae What happens with hash functions if minutia point set is transformed?

Finding transformation parameters from hash function values Thus can be expressed as a linear combinations of with coefficients depending on transformation parameters r and t. Denote: Thus And r,t can be calculated given

Verifying fingerprint match using hash functions When r and t are found we can use higher order hash functions to check if fingerprints match. For example, if extracted minutia set is identical to the stored in the database, then for the hash function of third order we should get: The difference between two parts of above equation can serve as a confidence measure for matching two sets of minutia points. Subsequently, similar confidence measures for hash functions of other orders should be combined in one confidence measure.

Fingerprint matching algorithm Enrollment: 1.Minutia positions are extracted (n positions) 2.K symmetric hash functions are evaluated and results are stored in the database. Matching: 1.Minutia positions are extracted (n positions) 2.K symmetric hash functions are evaluated and passed to the server for matching. 3.Using values of first two hash functions (stored in the server database and just extracted) the transformation parameters r and t are found. 4.Remaining K-2 hash function values are used to verify minutia set matching.

Privacy issues If the number of stored hash functions is less than the number of minutia points, it is not possible to find the positions of minutia points. This also implies that it is possible for two different sets of minutia points to have same hash function values. To prevent such mismatches, we might want to consider multiple subsets of minutia points for matching. If fingerprint database is compromised, the different set of symmetric hash functions should be chosen. Need more research here. Similarly, different set of hash functions can be chosen for each individual, resulting in cancelable fingerprint templates.

Practical considerations for matching localized hash values The small changes in locations of minutia points result in big changes of symmetric functions of higher orders. Thus we limited ourselves to the symmetric functions of 1 st and 2 nd orders. Since direction of the minutia (direction of the ridge where minutia is located) is also important in fingerprint matching, we consider unit direction vectors and same hash functions of that vectors: The matching of hash values can be reformulated as a problem of minimizing (with respect to and ) some distance function:

Subsets of minutia points. Since it is rare situation when two fingerprint images contain same minutia points, consideration of subsets of minutia points is required. Due to the privacy issues we need to have less symmetric functions than points in the minutia subset Considered configurations: 2 minutiae & 1 function 3 minutiae & 1 function 3 minutiae & 2 functions Matching of two fingerprints consists in matching all possible localized minutiae subsets, seeing how many subsets are matched and whether values of and are similar.

Partial fingerprint matching algorithm Enrollment: 1.For each minutia point of the fingerprint find its 2 nearest neighbors. 2.Evaluate hash functions and store results in the database. Matching: 1.As for enrollment, evaluate hash functions for all minutia points 2.For each pair of hash values find the confidence of their match together with rotation angle best fit for this match. 3.Consider the set of matching angles and determine if there are any clusters in this set. The presence of the cluster would indicate that there were many matches with particular rotation angles, hence same fingerprints.

Experimental results Using 3 minutiae in a subset and 2 hash functions gives the best performance so far with equal error rate of 3%, while original no-hash matching has equal error rate of 1.7%, (tested on FVC2002 set, with 2800 genuine tests and 4950 impostor tests)

Algorithm limitations Usually there are less matching hash values than matching minutiae. This means bigger difficulty in producing good match score, and setting match thresholds. 3 matching minutiae can result in only one matching hash pair

Thank you ! References 1. Davide Maltoni, Dario Maio, Anil K. Jain and Salil Prabhakar, Handbook of Fingerprint Recognition, Springer- Verlag, New York, Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy and B.V.K. Vijaya Kumar, “Biometric Encryption”, in ICSA Guide to Cryptography, R.Nichols, ed. (McGraw-Hill, 1999) 3.G.I. Davida, Y. Frankel, and B.J. Matt. “On enabling secure applications through offline biometric identification”. In IEEE Symposium on Privacy and Security, Tsai-Yang Jea, Viraj S. Chavan, Venu Govindaraju and John K. Schneider, “Security and matching of partial fingerprint recognition systems”, In SPIE Defense and Security Symposium, 2004.