Regular Articles

Finger multibiometric cryptosystems: fusion strategy and template security

[+] Author Affiliations
Jialiang Peng

Harbin Institute of Technology, School of Computer Science and Technology, Harbin 150080, China

Heilongjiang University, Information and Network Administration Center, Harbin 150080, China

Qiong Li

Harbin Institute of Technology, School of Computer Science and Technology, Harbin 150080, China

Ahmed A. Abd El-Latif

Menoufia University, Faculty of Science, Mathematics Department, Shebin El-Koom 32511, Egypt

Xiamu Niu

Harbin Institute of Technology, School of Computer Science and Technology, Harbin 150080, China

J. Electron. Imaging. 23(2), 023001 (Mar 06, 2014). doi:10.1117/1.JEI.23.2.023001
History: Received October 16, 2013; Revised December 17, 2013; Accepted January 27, 2014
Text Size: A A A

Abstract.  We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

Figures in this Article
© 2014 SPIE and IS&T

Citation

Jialiang Peng ; Qiong Li ; Ahmed A. Abd El-Latif and Xiamu Niu
"Finger multibiometric cryptosystems: fusion strategy and template security", J. Electron. Imaging. 23(2), 023001 (Mar 06, 2014). ; http://dx.doi.org/10.1117/1.JEI.23.2.023001


Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Article
Sign in or Create a personal account to Buy this article ($20 for members, $25 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.