TY - GEN
T1 - SCFT
T2 - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
AU - Ahmad, Tohari
AU - Rasyid, Burhanudin
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/7/2
Y1 - 2017/7/2
N2 - In the authentication process, a user must prove that she/he is the real user she/he claims. Amongst authentication tools, fingerprints is a prospective modal because of its performance, acceptability and characteristics. Nevertheless, since fingerprints is private, it should not be used without protection. Existing cryptographic algorithms do not work on fingerprint because the result of fingerprint scanning is unstable. So, a method which is able to carry out authentication of transformed (protected) fingerprint is needed. In this paper, we propose an algorithm which meets this requirement. Here, the fingerprint transformation is performed by rotating, reflecting and translating the minutiae points after the fingerprint domain is divided into sectors. Next, these transformed points are represented as certain features. The experimental results which are obtained by using public data depict that the proposed method is able to increase the performance.
AB - In the authentication process, a user must prove that she/he is the real user she/he claims. Amongst authentication tools, fingerprints is a prospective modal because of its performance, acceptability and characteristics. Nevertheless, since fingerprints is private, it should not be used without protection. Existing cryptographic algorithms do not work on fingerprint because the result of fingerprint scanning is unstable. So, a method which is able to carry out authentication of transformed (protected) fingerprint is needed. In this paper, we propose an algorithm which meets this requirement. Here, the fingerprint transformation is performed by rotating, reflecting and translating the minutiae points after the fingerprint domain is divided into sectors. Next, these transformed points are represented as certain features. The experimental results which are obtained by using public data depict that the proposed method is able to increase the performance.
KW - data protection
KW - data transformation
KW - fingerprint
KW - information security
UR - http://www.scopus.com/inward/record.url?scp=85050461409&partnerID=8YFLogxK
U2 - 10.1109/APSIPA.2017.8282254
DO - 10.1109/APSIPA.2017.8282254
M3 - Conference contribution
AN - SCOPUS:85050461409
T3 - Proceedings - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
SP - 1420
EP - 1425
BT - Proceedings - 9th Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2017
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 12 December 2017 through 15 December 2017
ER -