Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Experimental evaluation of fingerprint verification system based on double random phase encoding

Open Access Open Access

Abstract

We proposed a smart card holder authentication system that combines fingerprint verification with PIN verification by applying a double random phase encoding scheme. In this system, the probability of accurate verification of an authorized individual reduces when the fingerprint is shifted significantly. In this paper, a review of the proposed system is presented and preprocessing for improving the false rejection rate is proposed. In the proposed method, the position difference between two fingerprint images is estimated by using an optimized template for core detection. When the estimated difference exceeds the permissible level, the user inputs the fingerprint again. The effectiveness of the proposed method is confirmed by a computational experiment; its results show that the false rejection rate is improved.

©2006 Optical Society of America

Full Article  |  PDF Article
More Like This
Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack

Hideaki Tashima, Masafumi Takeda, Hiroyuki Suzuki, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama
Opt. Express 18(13) 13772-13781 (2010)

Cancelable biometric system for IoT applications based on optical double random phase encoding

Gerges M. Salama, Safaa El-Gazar, Basma Omar, Rana M. Nassar, Ashraf A. M. Khalaf, Ghada M. El-banby, Hesham F. A. Hamed, Walid El-shafai, and Fathi E. Abd el-samie
Opt. Express 30(21) 37816-37832 (2022)

Secure biometric systems based on bio-signals and DNA encryption of optical spectrograms

Gerges M. Salama, Basma Omar, Walid El-Shafai, Ghada M. El-Banby, Hesham F. A. Hamed, Safaa El-Gazar, Naglaa F. Soliman, and Fathi E. Abd El-Samie
Opt. Express 31(3) 3927-3944 (2023)

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (10)

Fig. 1.
Fig. 1. Smart card holder authentication system which combines fingerprint verification with PIN verification by applying a double random phase encoding.
Fig. 2.
Fig. 2. Flow of double random phase encoding.
Fig. 3.
Fig. 3. The POC waveforms are shown. The left waveform is obtained by calculating the POC between same fingerprints, and the right one is the POC between different fingerprints.
Fig. 4.
Fig. 4. (a) The method of bit encoding into 2D image is shown. When the right square is white, these squares express zero, and when the left one is white, they express one. (b) An example image which is transformed from a character sequence “1234ABCD”. Tags are also installed at the upper left corner and the lower right corner of the bit pattern.
Fig. 5.
Fig. 5. Procedure of decoding a PIN data from the decrypted image.
Fig. 6.
Fig. 6. Workflow of the preprocessing.
Fig. 7.
Fig. 7. This figure shows the template image which is a part of an ellipse. The parameters which represent the characteristic of the arc are also shown.
Fig. 8.
Fig. 8. These images show the experimental result of template image generation, (a) optimized template image, (b) estimated cores, which are represented by black points.
Fig. 9.
Fig. 9. Result images are shown, (a) fingerprint image for enrollment, (b) encryption key image generated from (a), (c) original PIN image, (d) same individual’s fingerprint image for verification, (e) decryption key image generated from (d), (f) decrypted image by using (e), (g) different individual’s fingerprint image for verification, (h) decryption key image generated from (g), (i) decrypted image by using (h).
Fig. 10.
Fig. 10. The actual position differences between two fingerprints used in the experiment are plotted. These graphs also show the result of verification in the case of (a) without removing (b) with removing the significantly shifted fingerprints.

Tables (1)

Tables Icon

Table 1. Accuracy of experimental verification

Equations (17)

Equations on this page are rendered with MathJax. Learn more.

f m ( x , y ) = f ( x , y ) exp [ jR ( x , y ) ] .
f r ( x d , y d ) = F m * ( u , v ) N ( u , v )
= f m * ( x d , y d ) * n ( x d , y d ) ,
g 1 ( x , y ) = 1 [ exp { j K E ( u , v ) } ] ,
g 2 ( x , y ) = 1 [ exp { j K D ( u , v ) } ] .
G E ( u , v ) = [ g E ( x , y ) ]
= A E ( u , v ) exp { j P E ( u , v ) } ,
G D ( u , v ) = [ g D ( x , y ) ]
= A D ( u , v ) exp { j P D ( u , v ) } ,
K E ( u , v ) = P E ( u , v ) ,
K D ( u , v ) = P D ( u , v ) .
n ( x d , y d ) { δ ( x d α , y d β ) ( correct fingerprint ) random sequence ( incorrect fingerprint ) ,
( x e , y e ) = ( x 1 x 2 , y 1 y 2 ) ,
Δ E = average ( x a x e ) 2 + ( y a y e ) 2 all training image pairs ,
BER = N Error N PIN ,
FRR = N FP N S ,
FAR = N FN N S ,
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.