Finger print and Palm print based Multibiometric Authentication System with GUI Interface



In this work, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to fuse multiple biometric traits as a single secure sketch is proposed. The analysis of the trade-off between matching accuracy and security is done. The performance characteristics of the proposed system are to be compared with the existing system.


Multi Biometrics, finger print, palm print, feature level fusion, template security


Abhishek Nagar,Karthik Nandakumar, and AnilK, “Multibiometric Cryptosystems Based on Feature-Level Fusion”, IEEE transactions on information forensics and security, vol. 7, no. 1, February 2012.

Maria De Marsico, Michele Nappi, Daniel Riccio and Genoveffa Tortora, “NABS: Novel Approches for Biometric Systems”, IEEE Transcations on systems, man and cybernetics, vol.41. no.4, July 2011.

Heeseung Choi, Kyoungtaek Choi, and Jaihie Kim, “Fingerprint Matching Incorporating Ridge”, IEEE Transactions on information forensics and security, vol. 6, no. 2, June 2011

A. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,”EURASIP J. Adv. Signal Process., vol. 2008, 2008.

A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiomet-rics. New York: Springer, 2006.

A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proc. IEEE Int. Symp. Information Theory, Lausanne, Switzerland, 2002, p. 408.

A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” inProc. Sixth ACM Conf. Computer and Communications Security, Singapore, Nov. 1999, pp. 28–36.

] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data Cryptology ePrint Archive, Tech. Rep. 235, Feb. 2006.

T.IgnatenkoandF.M.J.Willems,“Biometricsystems:Privacy and secrecy aspects,”IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp.956–973, Dec. 2009.

A.B.J.Teoh,K.-A.Toh,andW.K.Yip,“ discretisation of Bio-Phasor in cancellable biometrics,” inProc. Second Int. Conf. Biomet-rics, Seoul, South Korea, Aug. 2007, pp. 435–444.

N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelablefingerprint templates,”IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561–572, Apr. 2007.

W. Scheirer and T. Boult, “Bio-cryptographic protocols with bipartite biotokens,” inProc. Biometric Symp., Tampa, FL, 2008.

K. Nandakumar, A. Nagar, and A. K. Jain, “Hardening fingerprint fuzzy vault using password,” in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 927–937.

M. Turk and A. Pentland, “Eigenfaces for recognition,” J. Cognitive NeuroSci., vol. 3, no. 1, pp. 71–86, 1991.

P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces versus Fisherfaces: Recognition using class specific linear projection,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 9, no. 7, pp. 711–720, Jul.1997.

J. Daugman, “Recognizing persons by their iris patterns,” in Biometrics: Personal Identification in Networked Society.

H. Xu, R. Veldhuis, T. Kevenaar, A. Akkermans, and A. Bazen, “Spec-tral minutiae: Afixed-length representation of a minutiae set,” inProc.IEEE Computer Vision and Pattern Recognition Workshop on Biomet-rics, Anchorage, AK, 2008.

F. Farooq, R. Bolle, T. Jea, and N. Ratha, “Anonymous and revocable fingerprint recognition,” inProc. IEEE Computer Vision and Pattern Recognition, Minneapolis, MN, Jun. 2007.

L. Fei-Fei and P. Perona, “A Bayesian hierarchical model for learning natural scene categories,” inProc. IEEE Computer Vision and Pattern Recognition, 2005, pp. 524–531.

J. I. Hall, Notes on Coding Theory 2001 [Online]. Available:

E. R. Berlekamp, Algebraic Coding Theory. New York: McGraw-Hill, 1968.

R. N. Rodrigues, L. L. Ling, and V. Govindaraju, “Robustness of mul-timodal biometric fusion methods against spoof attacks,”J. Vis. Lang. Comput., vol. 20, no. 3, pp. 169–179, 2009.

A. Nagar and A. K. Jain, “On the security of non-invertiblefingerprint template transforms,” inProc. IEEE Workshop Information Forensicsand Security, London, U.K., Dec. 2009.

Full Text: PDF


  • There are currently no refbacks.


All Rights Reserved © 2012 IJARCSEE

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.