Abstract

The security of biometric systems, especially pro-tecting the templates stored in the gallery database, is a primary concern for researchers. This paper presents a novel framework using an ensemble of deep neural networks to protect biometric features stored as a template. The proposed ensemble chooses two state-of-the-art CNN architectures i.e., ResNet and DenseNet as base models for training. While training, the pre-trained weights enable the learning algorithm to converge faster. The weights obtained through the base model is further used to train other compatible models, generating a fine-tuned model. Thus, four fine-tuned models are prepared, and their learning are fused to form an ensemble named as PlexNet. To analyze biometric templates’ security, the rigorous learning of ensemble is collected using a smart box i.e., application programming interface (API). The API is robust and correctly identifies the query image without referring to a template database. Thus, the proposed framework excludes the templates from database and performed predictions based on learning that is irrevocable.

Highlights

  • Identity theft is one of the major epidemics of current century

  • True Negatives (TN): similar to that of true positives, true negatives are the correct identification of the negative class by the model i.e., (Predi ∈ (1 − Act))

  • The advantages of using deep neural networks such as CNNs are yet to be explored for the application of biometric template protection

Read more

Summary

Introduction

In the absence of a reliable identity proofing system, data and information thefts have plagued the applications such as online transactions and social welfare schemes [1]. Traditional security systems such as ID cards and passwords cannot protect from digital impersonation obsolete due to their lost and stolen possibilities [2]. Used physiological traits include face, fingerprint, palmprint and hand geometry, while signatures, gait, voice are used as behavioural traits. These biometric traits are proved to be personal, reliable, accessible and universal [3]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call