Abstract

Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB.

Highlights

  • With the increased integrations of computers and internet into individual’s lives, it is substantial to protect sensitive and personal data

  • Different significant affairs have to be taken into consideration in order to design a practical biometric system

  • It should be noting that a biometric system can operate either in verification or an identification mode

Read more

Summary

Introduction

With the increased integrations of computers and internet into individual’s lives, it is substantial to protect sensitive and personal data. Biometric technologies are turning on the ground of an overall array of highly secure identification and personal verification solutions, see for instance [1] and [3]. A user must be enrolled in the system so that his biometric template (or reference) can be captured. This template is securely stored in a central database or a smart card issued to the user. The purpose of this paper is to develop an algorithmic method (called coset decomposition method) that uses syndrome bits as secure storage and decoding fingerprints data. The implemented algorithm is used to overcome the disadvantage that a person who has access to the system may not match any of fingerprint information. For additional information about the syndrome decoding of biometrics information the reader is referred to [2], [7], and [15]

Fingerprints model
Modeling approach
Coding solution for fingerprint matching problem
Preliminaries
Syndrome decoding and coset decomposition
Fingerprint matching algorithm
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call