Professional Documents
Culture Documents
Performance Comparison of Biometric System With and Without Evcs Study Case For Palmprint Authentication System
Performance Comparison of Biometric System With and Without Evcs Study Case For Palmprint Authentication System
Performance Comparison of Biometric System With and Without Evcs Study Case For Palmprint Authentication System
Abstract—Biometric nowadays has becomes popular in term As Biometric technology develops and the use of
of authentication system. Many institutions and companies start biometric technology becomes popular, there exist several
to use biometric in addition using password or smartcard to possible attacks that become issues in securing biometric
authenticate a person in order to prevent unauthorized person to system. Below is the diagram of possible attack points in
access their system. As the development of biometric in Biometric System [5]:
authentication system, the attackers try to search the
vulnerability of it in order to have the authority into the system.
One of the vulnerability of the biometric system that the attacker
addressed is in the biometric database. Many system of biometric
still save the biometric template characteristic in database in the
form of plain image. There is no encryption method used to
secure the biometric database, which makes easier for the
attacker to sabotage the biometric system. This research focuses
on how to secure the biometric database using EVCS (Extended
Visual Cryptography Scheme). The study is applied on 198
training set palmprint images and 10-validation set of palmprint
images. Experiment results showed that EVCS could be used for
securing biometric template database without losing much
information and the quality of the decrypted image reach 40.95
Fig.1 Possible Attack Points in Biometric System [5]
dB. The authentication system with EVCS also successfully
authenticated decrypted image with the percentage of true
1. Involves presenting fake biometric
positive that is 82.45% compared with the one without EVCS that
reach 76.89% respectively. 2. Replay attack
3. Feature extractor module is replaced with a Trojan
Keywords— EVCS, Biometric, Palmprint, Security, horse program
Authentication. 4. Genuine feature values are replaced with values
selected by attacker
I. INTRODUCTION 5. The matcher is replaced with Trojan horse
Biometrics is unique physical or behavioral 6. Template database attack
characteristics, which can be used to automatically identify 7. Templates are replaced or altered in transition medium
individuals. Biometric technologies capture, process and between template and database
measure these characteristics electronically and compare 8. The matcher result can be overridden by attacker
them against existing records to create a highly accurate
identity management capability. It has been popularly used The paper is focus on point 6; how to counter the template
as a technique for authentication system from several other database attack using Extended Visual Cryptography
ways of authentication; using what we have, what we know, Scheme.
who we are and somebody we know [1]. Palmprint has been
used as an alternative biometric instead of fingerprint due to Visual cryptography (VC) is a secret sharing technique,
the easy pattern to captured and extracted. Various methods which allows encryption of a secret image among a number
have been researched such as Classifier for palmprint of participants [6]. Different from any traditional
recognition which using unsupervised technique 2DPCA cryptography methods like AES, DES, 3DES, RSA, etc that
(Two Dimensional Principal Component Analysis) where needs complex mathematical computation, VC only use
features are extracted using 2DLDA (Two Dimensional simple image manipulation. Particularly in a k-out-of-n
Linear Discriminant Analysis)[2]. Another research, use visual secret sharing scheme (VSS), a secret image is
Double-line-single-point (DSLP) for palmprint acquirement cryptographically encoded into n shares. Each share
in mobile platform [3] and did a palmprint acquisition system resembles a random binary pattern. Extended Visual
based online scan sensor [4]. Cryptography Scheme (EVCS) is a visual cryptography that
is combined with steganography. Extended visual
cryptography decodes images with no particular
cryptographic calculation where three images are input and
generate two images (are called sheets), which correspond to
two of the three input images. The third image (is called
target) is reconstructed by printing the two output images
onto transparencies and stacking them together [7]. VC
(Visual Cryptography) and EVCS can be implemented in any
application that used image, such as for Banking Application
using a (2,n) Visual Cryptography technique [8], for data
Fig. 2. EVCS Palmprint Recognition steps
matrix codes like 2D barcodes using VC [9], and for
financial document [10]. From the Fig. 1 above, there are two steps of palmprint
This paper proposes EVCS as a technique to secure recognition, such as:
palmprint authentication system using standard algorithm of 1. Enrollment consists of preprocessing, feature extraction,
visual cryptography and added with the modification of EVCS encryption and embedding with cover images,
EVCS that using color images as a camouflage instead of save result images in database.
gray images. Several studies of Visual cryptography in
biometric systems are the using of visual cryptography 2. Authentication system consists of EVCS decryption,
method in securing fingerprint authentication for ID card comparing image from database with image from input
[11], visual cryptography in securing iris authentication [12], system.
visual cryptography in securing palmprint authentication
A. Preprocessing
based on DCT algorithm [13], and visual cryptography in
securing face authentication [14]. Basically, the four of them Preprocessing step as shown in Fig. 3 is a process to get
applied visual cryptography algorithm in their system that the template of the image or data after the image was
raise suspicion of the image may have hidden information. enhanced for the excellent quality of an image. The steps are
Therefore, the use of EVCS in palmprint biometric system is normalization of image position, finding palmprint Region of
proposed to secure authentication system without any Interest (ROI), and edge detection and dilation.
suspicion of random dots images like in the visual
cryptography. This research also evaluates the performance Preprocessing
of the system using EVCS compared with the system without 1. Normalization
EVCS. a. Image framing
II. EXPERIMENT DATASET b. Find degree of slopes of hand
c. Rotate image
The samples of this research used dataset from a database 2. Finding ROI of Image
of Biometric Ideal Test from Prof. Tieniu Tan's research
a. Find Horizontal and vertical line of hand
group at the center of Biometric Security Research, National
Laboratory of Pattern Recognition (NLPR), Institute of b. Find border ROI
Automation, Chinese Academy of Sciences (CASIA)[15] c. Crop image
that consists of 312 different person’s palmprint. Each 3. Enhance image Quality
person’s palmprint were captured 8 samples from left hand a. Contrast Enhancement
and 8 samples from right hand. Using CMOS camera, the b. Edge detection
samples were taken invariant angle (00 – 450), the size of c. Dilation
samples are 480x640 pixels that contains 8 bit gray scale
images. From 312 persons, 198 are above 17 years old that
consists of both female and male.
Fig. 3. Preprocessing step in Palmprint Recognition using EVCS
The hardware and software that were used for this
experiments are computer with processor Intel Core i5- 1. Normalization of image position
4210u CPU @1.70Hz 2.40 Hz with RAM 16 GB and Matlab
version R2015a as a tool for simulation system and image
processing.
III. EVCS PALMPRINT RECOGNITION STEPS
1. Palmprint Enrollment
2. Palmprint Authentication System Fig. 4. Original sample CASIA palmprint images in variant angle.
cdf(v)- cdfmin
h(v) = round ( (MxN) - 1
x (L –1)) (2)
(a) (b)
Fig. 8. Histogram of original image (a), image after contras
enhancement (b)
TABLE II. EIGHT RECORDS OF THE NINE LEFT AND RIGHT PALMPRINT
f⨁S = max {f (s-x) + b(x) | (s-x) ∈ Df, and x ∈ Db } (3) IMAGE'S FEATURES OF SAMPLE ID NUMBER 20 WITH EVCS
MAXI 2
PSNR=10. log10
MSE
TABLE III. EIGHT RECORDS OF MSE AND PSNR OF LEFT AND RIGHT
PALMPRINT IMAGE'S FEATURES OF SAMPLE ID NUMBER 20
Fig. 14. Share 1 (left) and share 2 (right) for image size 600 x 600 pixels
Left 1.936311 104.2174
Left 1.839511 104.7303
Left 1.711489 105.4516
Right 2.005767 103.8650
Right 1.929589 104.2522
Right 2.127811 103.2743
Right 2.197678 102.9513
evaluated; the quality of image after EVCS encryption and Then, to measure the performance of the system, we use
the performance of the authentication system with EVCS equation (7) where P is number of positive (TRUE) value, N
compared with the system without EVCS encryption. is total number of record that being evaluated (198 samples),
and S is successful rate (%). In this experiment, it is found
1. Quality of Image
that the score of system without EVCS: P= 609, and N = 792
For the quality of image after being encrypted using (198 x 4) and S = 76.89%, while the score of system with
EVCS, we use MSE and PSNR equation as seen in equations EVCS: P = 653, N = 792 (198 x 4) and S = 82.45%. From
(4) and (5) respectively. Where m and n are the length and the results, we can say that the performances of both system
wide of image respectively, I is the original image, K is with and without EVCS are good enough, even the system
result image, and MAX is the maximum value of pixel. In with EVCS can gain higher performance due to the use of
quality enhancement in the process of EVCS encryption and [4] D.Zhang, G. Lu and L. Zhang, “Line Scan Palmprint Recognition
decryption, which means the system with EVCS can become System”, Advanced Biometrics, Springer,Cham, pp. 235-257, 2018.
solution of securing image database from alternation without [5] Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. "An
analysis of minutiae matching strength." In International Conference
losing the performance of the system. on Audio-and Video-Based Biometric Person Authentication, pp.
223-228. Springer, Berlin, Heidelberg, 2001.
[6] Liu, Feng, and Wei Qi Yan. Visual Cryptography for Image
V. CONCLUSION Processing and Security. Vol. 2. New York: Springer, 2014.
[7] M. Nakajima and Y. Yamaguchi, “Extended Visual Cryptography for
EVCS (Extended Visual Cryptography Scheme) Natural Iamges”, Journal of WSCG, vol. 10, no.1-2, pp. 303-310,
successfully secured 198 CASIA palmprint images database, 2002.
without losing much information and the quality of the [8] J. K. Pal, J. K. Mandal and K. Dasgupta, “A (2, N) Visual
decrypted image reach 40.95 dB and successfully Cryptographic Technique for Banking Applications”, Int. Journal of
authenticate decrypted image with successful rate reach Network Security and Its Applications (IJNSA), Vol.2, No.4, October
2010.
82.45% compared with the system without EVCS that only
reach 76.89%. [9] Sharma, M. Agnihotra, and M. Chinna Rao. "Visual cryptography
authentication for data matrix code." International Journal of
The EVCS can be used in the palmprint recognition Computer Science and Telecommunications 2.8 (2011): 58-62.
without losing much information of image. The steps upon [10] Hawkes, L., Alec Yasinsac, and C. Cline. "An application of visual
198 CASIA palmprint image database consist of 3 stages cryptography to financial documents." Florida State University,
Florida (2000): 1-7.
such as preprocessing, feature extraction and EVCS
[11] Rao, YV Subba, Yulia Sukonkina, Chakravarthy Bhagwati, and
encryption. The experiment showed that MSE and PSNR Umesh Kumar Singh. "Fingerprint based authentication application
scores are 0.017 and 40.95 dB respectively, which means the using visual cryptography methods (improved id card)." In TENCON
decrypted EVCS image has little error and similar to the 2008-2008 IEEE Region 10 Conference, pp. 1-5. IEEE, 2008.
original image. Further, PSNR score of 40.95 dB indicates [12] Revenkar, P. S., Anisa Anjum, and W. Z. Gandhare. "Secure iris
that decrypted EVCS image has a good quality compared authentication using visual cryptography." arXiv preprint
with original template image. arXiv:1004.1748, 2010.
[13] Divya, C., and E. Surya. "Visual cryptography using palm print based
on dct algorithm." International Journal of Emerging Technology and
Advanced Engineering 2, no. 12, 2250-2459, 2012.
REFERENCES [14] Akotkar, Atul Sureshpant, and Chaitali Choudhary. "Secure of Face
Authentication using Visual Cryptography." International Journal of
[1] Brainard, John, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Innovative Science and Modern Engineering (IJISME) ISSN, 2319-
Moti Yung. "Fourth-factor authentication: somebody you know." In 6386, 2014.
Proceedings of the 13th ACM conference on Computer and
communications security, pp. 168-178. ACM, 2006. [15] T. Tan and Z.Sun, “Note on CASIA Palmprint Iamge Database”,
Biometrics Ideal Test, access on 18 May 2018 from:
[2] I.Rida, R.Herault, G.L.Marcialis and G. Gasso, “Palmprint http://biometrics.idealtest.org/dbDetailForUser.do?id=5
recognition with an efficitn data driven ensemble classifier”, Pattern
Recognition Letters, In Press, April 2018. [16] D.D.Zhang, “Palmprint Authentication”, Kluwer Academic Publisher,
Boston, USA, 2004.
[3] L.Leng, F. Gao, Q.Chen and C. Kim, “Palmprint recognition system
on mobile devices with double-line-single-point assisstance”, Pers
Ubiquit Comput, vol. 22, issue 1, pp. 93-104, 2018.