Security performance evaluation of biometric lightweight encryption for fingerprint template protection
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.9, No. 43)Publication Date: 2019-07-22
Authors : Taqiyah Khadijah Ghazali; Nur Haryani Zakaria;
Page : 232-241
Keywords : Fingerprint template protection; Biometric cryptosystem; Key-binding; Security performance; Lightweight block cipher; Authenticated-encryption mode.;
Abstract
Due to its accuracy and convenience, the fingerprint is one of the most reliable biometric-based authentication methods for personal identification and providing access control to many applications. However, previous studies have shown that, the fingerprint template is exposed to threat in which the attackers can steal and modified the template to acquire illegal authorization. Therefore, a technique to protect the biometric template has been proposed. The proposed technique involved the biometric template binding by advanced encryption standard (AES-128) key algorithm, which is to provide confidentiality alongside with the offset codebook mode (OCB), an authenticated encryption (AE) mode to provide integrity. Hence, this paper intends to evaluate the security performance of the proposed technique. Three parameters will be analysed which are peak signal to noise ratio (PSNR), correlation coefficient and histogram. The efficiency of the proposed technique is measured by the standard of its capability to hide all the information by correlating the relationship between the original and encrypted biometric image using PSNR, correlation coefficient and histogram analysis. The experimental results show good security performance in the given parameters.
Other Latest Articles
- A case of severe dermatitis in a patient with Polycythemia Vera during cytoreductive therapy
- A new secure proxy-based distributed virtual machines management in mobile cloud computing
- A semantic event based framework for complex situations modeling and identification in smart environments
- Implementation of feature extraction algorithms for image tampering detection
- Non-preemptive chaotic cat swarm optimization scheme for task scheduling on cloud computing environment
Last modified: 2019-08-03 15:22:33