Professional Documents
Culture Documents
FINGERPRINT BIOMETRICS
Bachelor of Technology
in
Computer Science & Engineering
By
Signature of Supervisor
Dr.A.Suresh, M E.,Ph.D
Assistant professor
Computer Science & Engineering
School of Computing
Vel Tech Rangarajan Dr.Sagunthala R&D
Institute of Science and Technology
June, 2022
i
DECLARATION
We declare that this written submission represents our ideas in our own words and
where others’ ideas or words have been included, we have adequately cited and ref-
erenced the original sources. We also declare that we have adhered to all principles
of academic honesty and integrity and have not misrepresented or fabricated or fal-
sified any idea/data/fact/source in our submission. We understand that any violation
of the above will be cause for disciplinary action by the Institute and can also evoke
penal action from the sources which have thus not been properly cited or from whom
proper permission has not been taken when needed.
(Signature)
((G.BHARGAVA KUMAR)
Date: / /
(Signature)
(M.VISHAL GOUD)
Date: / /
(Signature)
(P.AJAY KUMAR)
Date: / /
ii
APPROVAL SHEET
Signature of Supervisor
Dr.A.Suresh, M E.,Ph.D
Assistant Professor
Computer Science & Engineering
School of Computing
Vel Tech Rangarajan Dr.Sagunthala R&D
Institute of Science and Technology
Date: / /
Place:
iii
ACKNOWLEDGEMENT
We express our deepest gratitude to our respected Founder Chancellor and Pres-
ident Col. Prof. Dr. R. RANGARAJAN B.E. (EEE), B.E. (MECH), M.S (AUTO).
DSc., Foundress President Dr. R. SAGUNTHALA RANGARAJAN M.B.B.S.,
Chairperson Managing Trustee and Vice President.
We take this opportunity to express our gratitude to Our Internal Supervisor Su-
pervisor name,degree.,(in capital letters) for his/her cordial support, valuable in-
formation and guidance, he/she helped us in completing this seminar through various
stages.
A special thanks to our Seminar Coordinator Dr. G. Tamilmani, Ph.D., for her
valuable guidance and support throughout the course of the seminar.
We thank our department faculty, supporting staff and friends for their help and
guidance to complete this project.
iv
ABSTRACT
v
LIST OF FIGURES
1.1 Symmetric-Encryption . . . . . . . . . . . . . . . . 3
1.2 Asymmetric-Encryption . . . . . . . . . . . . . . . . 4
vi
LIST OF ACRONYMS AND
ABBREVIATIONS
vii
TABLE OF CONTENTS
Page.No
ABSTRACT v
LIST OF FIGURES vi
1 INTRODUCTION 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Aim of the Seminar . . . . . . . . . . . . . . . . . . . 2
1.3 Scope of the Seminar . . . . . . . . . . . . . . . . . . 2
1.4 Methodology . . . . . . . . . . . . . . . . . . . . . . 2
1.4.1 Symmetric Cryptography . . . . . . . . . . . . 2
1.4.2 Asymmetric Cryptography . . . . . . . . . . . 3
2 LITERATURE REVIEW 5
3 SEMINAR DESCRIPTION 7
3.1 Existing System of Disadvantages . . . . . . . . . . . 7
3.2 Advantages . . . . . . . . . . . . . . . . . . . . . . . 8
3.3 Feasibility Study . . . . . . . . . . . . . . . . . . . . 8
4 METHODOLOGIES 9
4.1 Proposed System . . . . . . . . . . . . . . . . . . . . 9
4.1.1 Secure Storage Process . . . . . . . . . . . . . 9
4.1.2 Minutiae Extraction . . . . . . . . . . . . . . 10
4.1.3 Cryptographic Key Generation Using Gray Code 11
4.1.4 Euclidean Distance Between Pair of Minutiae
Points . . . . . . . . . . . . . . . . . . . . . . 11
4.1.5 Sorting the Distances . . . . . . . . . . . . . . 12
4.1.6 Converting Euclidean Distance into Gray Code 12
4.1.7 Concatenation of Gray Codes to Generate the
Key . . . . . . . . . . . . . . . . . . . . . . . 12
References 16
Chapter 1
INTRODUCTION
1.1 Introduction
1
cryptographic key by a genuine user and an impostor is eradicated.
The randomness test and the various security analysis methods ensure
the security of the generated cryptographic key. Finally, this crypto-
graphic key is used in a symmetric key set up for secure storage of
sensitive data.
1.4 Methodology
2
cryptography use the same key, making this the easiest form of cryp-
tography. The cryptographic algorithm utilizes the key in a cipher to
encrypt the data, and when the data must be accessed again, a person
entrusted with the secret key can decrypt the data. Secret Key Cryptog-
raphy can be used on both in-transit and at-rest data, but is commonly
only used on at-rest data, as sending the secret to the recipient of the
message can lead to compromise.
3
the public key, but the public key can be derived from the private. The
private key should not be distributed and should remain with the owner
only. The public key can be given to any other entity.
4
Chapter 2
LITERATURE REVIEW
[1] Z., Teoh, A.B.J., Goi, B.M., Tay, Y.H.: Biometric cryptosystems:
a new biometric key binding and its implementation for fingerprint
minutiae-based representation. Pattern Recogn. 56, 50–62 (2016). If
an attacker is able to recover the secret cryptographic key through so-
cial engineering or dictionary attacks, it is possible to recover the bio-
metrics in a key binding scheme usingthe cryptographic key and the
helper data (Scheirer and Boult, (2007); Tams et al., (2015).
[2] In Barman et al., (2015), distances between every pair of minu-
tiae points are estimated. Subsequently, unique distances are sorted in
ascending order. A binary string is generated whose length equals to
the maximum distance value. If the index value of an element in the
string is present in the sorted sequence of distances, then the bit in the
string at the index position is set as 1. If the index value is not present
in the sorted sequence of distances, then the concerned bit is set as
0. A random permutation of this binary string is used as the crypto-
graphic key. The permuted bit positions of the binary string are stored
as helper data.
[3] In Panchal and Samanta, (2016), the fingerprint image is parti-
tioned into a set of nonoverlapping blocks. The minutiae points are
extracted from each block. Every pair of minutiae points from two
5
neighboring blocks is joined using straight line. Lengths and orien-
tations of these straight lines are calculated. From these length and
orientation values, the length and angle ratios are calculated and are
converted into binary string. Length ratios are calculated by consider-
ing the ratio of lengths of each pair of straight lines. The angle ratios
are also calculated similarly by considering the ratio of angles / orien-
tations of each pair of straight lines.
[4]In Panchal and Samanta, (2018), the binary representations of
orientation angle and length of each straight line are XORed. Then,
these XORed strings of all straight lines are concatenated. A sequence
of substitution, expansion and permutation of the concatenated string
generates a cryptographic key. The length and the angle values of
these straight lines are used to generate a helper data. Involvement
of orientation of a line joining two minutiae points makes these two
schemes unacceptable against rotation of fingerprint.
6
Chapter 3
SEMINAR DESCRIPTION
7
3.2 Advantages
-less memory
-Confidentiality
-Authentication
8
Chapter 4
METHODOLOGIES
9
code, usage of Reed-Solomon code to generate parity symbols and en-
cryption of the sensitive personal data. Each step is discussed in detail
as given below.
10
or furrows. The widths of the binarized ridge lines are reduced into
1-pixel using thinning. Minutiae points are extracted from a thinned
binary image. There exists varieties of minutiae points in a fingerprint
image like lake, island, ridge bifurcation, ridge ending, dots, pore, core
point, delta point, crossover, etc. Ridge bifurcation and ridge ending
are most widely accepted minutiae points
Sorting the Distances IfN minutiae points are finally selected from
a fingerprint, N C2 such distances are calculated from the coordinate
values of selected consistent set of minutiae points. To generate the
consistent key bit string, these N C2 Euclidean distance values are
sorted in ascending order.
12
exist N C2 distance values for the selected N minutiae points. Hence,
the length of key is m × N C2 bits.
13
Chapter 5
14
Chapter 6
6.1 Conclusion
15
6.2 Future Enhancements
16
Reference
[1] Anees, A., and Chen, Y-P. P. (2018) ’Discriminative binary fea-
ture learning and quantization in biometric key generation’, Pattern
Recognition, Vol. 77, pp.289–305.
[6] Hoque, S., Fairhurst, M., and Howells, G. (2008) ’Evaluating bio-
metric encryption key generation using handwritten signatures’,
ECSIS Symposium on Bio-inspired, Learning.
17
18