All Title Author
Keywords Abstract


Encrypted Sensing Based on Digital Holography for Fingerprint Images

DOI: 10.4236/opj.2015.51002, PP. 6-14

Keywords: Biometric Authentication, Digital Holography, Double Random Phase Encoding, Fingerprinting

Full-Text   Cite this paper   Add to My Lib

Abstract:

We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed encrypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate experimentally that a fingerprint image can be captured as an optically encrypted image and can be restored correctly only when the correct cipher key is used. Moreover, we investigate experimentally the verification accuracy of the decrypted images.

References

[1]  Ratha, N.K., Connell, J.H. and Jain, A.K. (2001) Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal, 40, 614-634.
http://dx.doi.org/10.1147/sj.403.0614
[2]  Uludag, U., Pankanti, S. and Jain, A.K. (2005) Fuzzy Vault for Fingerprints. Audio- and Video-Based Biometric Person Authentication Lecture Notes in Computer Science, 3546, 310-319.
http://dx.doi.org/10.1007/11527923_32
[3]  Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1999) Biometric EncryptionTM.
http://www.cse.lehigh.edu/prr/Biometrics/Archive/Papers/BiometricEncryption.pdf
[4]  Hirata, S. and Takahashi, K. (2009) Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. Advances in Biometrics Lecture Notes in Computer Science, 5558, 868-878.
http://link.springer.com/chapter/10.1007%2F978-3-642-01793-3_88
[5]  Clancy, T.C., Kiyavash, N. and Lin, D.J. (2003) Secure Smartcard Based Fingerprint Authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications—WBMA, 45.
https://www.cs.umd.edu/~clancy/docs/bio-wbma2003.pdf
[6]  Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane. Optics Letters, 20, 767-769.
http://dx.doi.org/10.1364/OL.20.000767
[7]  Javidi, B. and Nomura, T. (2000) Securing Information by Use of Digital Holography. Optics Letters, 25, 28-30.
http://dx.doi.org/10.1364/OL.25.000028
[8]  Yamaguchi, I., Yamamoto, K., Mills, G.A. and Yokota, M. (2006) Image Reconstruction Only by Phase Data in Phase-Shifting Digital Holography. Applied Optics, 45, 975-983.
http://dx.doi.org/10.1364/AO.45.000975
[9]  Javidi, B. and Nomura, T. (2000) Three-Dimensional Object Recognition by Use of Digital Holography. Optics Letters, 25, 28-30.
http://dx.doi.org/10.1364/OL.25.000028
[10]  Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M.S. and Javidi, B. (2009) Optical Techniques for Information Security. Proceedings of IEEE, 97, 1128-1148.
http://dx.doi.org/10.1109/JPROC.2009.2018367
[11]  Liu, S., Guo, C.L. and Sheridan, J.T. (2014) A Review of Optical Image Encryption Techniques. Optics & Laser Technology, 57, 327-342.
http://dx.doi.org/10.1016/j.optlastec.2013.05.023
[12]  Tajahuerce, E. and Javidi, B. (2000) Encrypting Three-Dimensional Information with Digital Holography. Applied Optics, 39, 6595-6601.
http://dx.doi.org/10.1364/AO.39.006595
[13]  Takeda, M., Ina, H. and Kobayashi, S. (1982) Fourier-Transform Method of Fringe-Pattern Analysis for Computer-Based Topography and Interferometry. Journal of the Optical Society of America, 72, 156-160.
http://dx.doi.org/10.1364/JOSA.72.000156
[14]  Spagnolo, G.S. and Cozzella, L. (2012) Laser Speckle Decorrelation for Fingerprint Acquisition. Journal of Optics, 14, 094006.
http://dx.doi.org/10.1088/2040-8978/14/9/094006
[15]  Utsugi, T. and Yamaguchi, M. (2013) Reduction of the Recorded Speckle Noise in Holographic 3D Printer. Optics Express, 21, 662-674.
http://dx.doi.org/10.1364/OE.21.000662
[16]  Javidi, B. (1989) Nonlinear Joint Power Spectrum Based Optical Correlation. Applied Optics, 28, 2358-2367.
http://dx.doi.org/10.1364/AO.28.002358
[17]  Kumar, B.V.K.V., Savvides, M., Xie, C., Venkataramani, K., Thornton, J. and Mahalanobis, A. (2004) Biometric Verification with Correlation Filters. Applied Optics, 43, 391-402.
http://dx.doi.org/10.1364/AO.43.000391
[18]  Helinski, R., Acharyya, D. and Plusquellic, J. (2009) A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations. Proceedings of the 46th Annual Design Automation Conference on ZZZ-DAC’09, 676.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5227103&url=http%3A
%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5227103

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

微信:OALib Journal