Security Improvement of the Iris Biometric System Database

Document Type : Original Article

Authors

1 Babol Noshirvani University of Technology

2 Babol Noshirvani University of Technology, Department of Electrical Engineering

Abstract

Nowadays, unique identifiers are used to authenticate individuals. These identifiers are called biometrics with iris being one of the most popular ones. Research performed in this paper consist of designing a new identification system based on improved security in iris database. In this paper, we propose an iris template protection method based on Visual Cryptography (VC) and RSA. For iris template protection, the binary iris template is divided into two shares using VC, where one share is stored in the database and the other is kept with the user on a smart    card. In order to provide additional security, the share that is stored in the database is encrypted with RSA encryption. In the next step the patterns obtained from each image are compared with the patterns in the database and, by defining a threshold, the identification procedure is carried out. In this paper, the CASIA - v1 image bank has been used. The EER value after encryption is approximately 0.01. We then expose the system to different noises such as salt and pepper, white Gaussian noise and mean filt.r. After applying the noises, we haveit is observed that the system has shows been better performance compared to the than other systems which we have investigated.

Keywords

Main Subjects


[1]     Liu, S.; Silverman, M. “A Practical Guide to Biometric Security Technology,” IT Prof. 2001, 3(1), 27–32.##
[2]     Wang, Q.; Zhang, X.; Li, M.; Dong, X.; Zhou, Q.; Yin, Y. “Adaboost and Multi-Orientation 2d Gabor-Based Noisy Iris Recognition,” Pattern Recognit. Lett. 2012, 33(8), 978–983.##
[3]     Singh, G. “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” Int. J. Comput. Appl. 2013, 67(19),33-38.##
[4]     Wildes, R. P. “Iris Recognition: An Emerging Biometric Technology,” P. IEEE. 1997, 85(9), 1348–1363.##
[5]     Kalpana, P.; Singaraju, S. “Data Security in Cloud Computing Using RSA Algorithm,” Int. J. Res. Comput. Commun. Technol. 2012, 278–5841.##
[6]     Padmavathi, B.; Kumari, S. R. “A Survey on Performance Analysis of DES, AES And RSA Algorithm along with LSB Substitution,” Int. J. Sci. Res., India, 2013, 2(4), 170-174.##
[7]     Abdullah, M. A. M.; Dlay, S. S.; Woo, W. L.; Chambers, J. A. “A Framework for Iris Biometrics Protection: A Marriage Between Watermarking and Visual Cryptography,” IEEE Access 2016, 4, 10180–10193.##
[8]     Zare, A.; Aghagolzadeh, A.; Kazemitabar, S. J. “A Novel Metaheuristic Based Visual Cryptography”; Adv. Defence Sci. Technol. 2019, 10(3), 297-306 (In Persian).##
[9]     Shamsafar, F.; Seyedarabi, H.; Aghagolzadeh, A. “Securing the Iris Database Using Visual Cryptography and Substitution” 21st Iranian Conf. Elec. Eng. 2013 (In Persian).##
[10]  Abdullah, M. A. M. “Advancing Iris Biometric Technology.” Newcastle Univ. 2017.##
[11]  Jin, Z.; Hwang, J. Y.; Lai, Y.-L.; Kim, S.; Teoh, A. B. J. “Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing,” IEEE Trans. Inf. Forensics Secur. 2017, 13(2), 393–407.##
[12]  Dubey, R. B.; Madan, A. “Iris Localization Using Daugman’s Intero-Differential Operator,” Int. J. Comput. Appl. 2014, 93(3), 6–12.##
[13]  Shah; S.; Ross, A. “Iris Segmentation Using Geodesic Active Contours,” IEEE Trans. Inf. Forensics Secur. 2009, 4(4), 824–836.##
[14]  Proença H., Alexandre L.A., ICIAP 2005: Image Analysis and Processing – ICIAP 2005 pp 970-977.##
[15]  Harakannanavar, S. S.; Prabhushetty, K. S.; Hugar, C.; Sheravi, A.; Badiger, M.; Patil, P. “IREMD: An Efficient Algorithm for Iris Recognition,” Int. J. Adv. Netw. Appl. 2018, 9, (5), 3580–3587.##
[16]  Boukhari, A.; Chitroub, S.; Bouraoui, I. “Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm,” Int. J. Commun. Netw. Syst. Sci. 2011, 4(12), 778.##
[17]  Zhao, D.; Fang, S.; Xiang, J.; Tian, J.; Xiong, S. “Iris Template Protection Based on Local Ranking,” Secur. Commun. Netw. 2018, 2018,1-9.##