Abstract

We proposed a smart card holder authentication system that combines fingerprint verification with PIN verification by applying a double random phase encoding scheme. In this system, the probability of accurate verification of an authorized individual reduces when the fingerprint is shifted significantly. In this paper, a review of the proposed system is presented and preprocessing for improving the false rejection rate is proposed. In the proposed method, the position difference between two fingerprint images is estimated by using an optimized template for core detection. When the estimated difference exceeds the permissible level, the user inputs the fingerprint again. The effectiveness of the proposed method is confirmed by a computational experiment; its results show that the false rejection rate is improved.

© 2006 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack

Hideaki Tashima, Masafumi Takeda, Hiroyuki Suzuki, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama
Opt. Express 18(13) 13772-13781 (2010)

Cancelable face verification using optical encryption and authentication

Motahareh Taheri, Saeed Mozaffari, and Parviz Keshavarzi
J. Opt. Soc. Am. A 32(10) 1772-1779 (2015)

Secure biometric image sensor and authentication scheme based on compressed sensing

Hiroyuki Suzuki, Masamichi Suzuki, Takuya Urabe, Takashi Obi, Masahiro Yamaguchi, and Nagaaki Ohyama
Appl. Opt. 52(33) 8161-8168 (2013)

References

  • View by:
  • |
  • |
  • |

  1. S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).
  2. E. Watanabe and K. Kodate, “Implementation of a high-speed face recognition system that uses an optical parallel correlator,” Appl. Opt. 44, 666–676 (2005).
    [Crossref] [PubMed]
  3. B. Javidi and J.L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
    [Crossref]
  4. P. Refregier and B. Javidi, “Optical encryption based on input plane Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
    [Crossref] [PubMed]
  5. Bor Wang, Ching-Cherng Sun, Wei-Chia Su, and Arthur E. T. Chiou, “Shift-Tolerance Property of an Optical Double-Random Phase-Encoding Encryption System,” Appl. Opt. 39, 4788–4793 (2000).
    [Crossref]
  6. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
    [Crossref]
  7. H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.
  8. J.L. Horner and P.D. Gianino, “Phase-only matched filtering,” Appl. Opt. 23, 812–816 (1984)
    [Crossref] [PubMed]
  9. K. Ito, et al., “A fingerprint matching algorithm using phaseonly correlation,” IEICE Trans. Fundam. Electron. Commun. Comut. Sci. E87-A, 682–691 (2004).
  10. Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
    [Crossref]
  11. Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
    [Crossref]
  12. Official website, “QR code.com,” http://www.denso-wave.com/qrcode/index-e.html.
  13. J. Tanida and Y. Ichioka, “Optical logic array processor using shadowgrams,” J. Opt. Soc. Am. 73, 800–809 (1983).
    [Crossref]
  14. S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

2005 (1)

2004 (2)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

K. Ito, et al., “A fingerprint matching algorithm using phaseonly correlation,” IEICE Trans. Fundam. Electron. Commun. Comut. Sci. E87-A, 682–691 (2004).

2003 (1)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

2001 (1)

S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).

2000 (2)

Bor Wang, Ching-Cherng Sun, Wei-Chia Su, and Arthur E. T. Chiou, “Shift-Tolerance Property of an Optical Double-Random Phase-Encoding Encryption System,” Appl. Opt. 39, 4788–4793 (2000).
[Crossref]

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

1995 (1)

1994 (1)

B. Javidi and J.L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[Crossref]

1990 (1)

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

1984 (2)

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

J.L. Horner and P.D. Gianino, “Phase-only matched filtering,” Appl. Opt. 23, 812–816 (1984)
[Crossref] [PubMed]

1983 (1)

Abushagur, Mustafa A. G.

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

Banerjee, Partha P.

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

Boothroyd, Simon

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

Chang, Shoude

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

Chiou, Arthur E. T.

Gianino, P.D.

Hamamoto, Y.

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

Horner, J.L.

B. Javidi and J.L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[Crossref]

J.L. Horner and P.D. Gianino, “Phase-only matched filtering,” Appl. Opt. 23, 812–816 (1984)
[Crossref] [PubMed]

Howell, Kenneth B.

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

Ichioka, Y.

Ishida, S.

S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).

Ito, K.

K. Ito, et al., “A fingerprint matching algorithm using phaseonly correlation,” IEICE Trans. Fundam. Electron. Commun. Comut. Sci. E87-A, 682–691 (2004).

Ito, S.

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

Javidi, B.

P. Refregier and B. Javidi, “Optical encryption based on input plane Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
[Crossref] [PubMed]

B. Javidi and J.L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[Crossref]

Kanaoka, T.

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

Kodate, K.

Mimura, M.

S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).

Obi, T.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Ohyama, N.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Pachanathan, Sethuraman

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

Palacharla, Paparao

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

Refregier, P.

Riasati, Vahid R.

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

Seto, Y.

S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).

Su, Wei-Chia

Sun, Ching-Cherng

Suzuki, H.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Tanida, J.

Tomita, S.

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

Wang, Bor

Watanabe, E.

Yamaguchi, M.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Yamaya, T.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Appl. Opt. (3)

IECE (1)

S. Ito, T. Kanaoka, Y. Hamamoto, and S. Tomita, “An Algorithm for Classification of Fingerprints Based on the Core,” IECE, D-ll  J73-D-∥ , 1733–1741 (1990) in Japanese.

IEICE Trans. Fundam. Electron. Commun. Comut. Sci. (1)

K. Ito, et al., “A fingerprint matching algorithm using phaseonly correlation,” IEICE Trans. Fundam. Electron. Commun. Comut. Sci. E87-A, 682–691 (2004).

IEICE Trans. Inf. & Syst. (1)

S. Ishida, M. Mimura, and Y. Seto, “Development of Personal Authentication Techniques Using Fingerprint Matching Embedded in Smart Cards,” IEICE Trans. Inf. & Syst. E84-D, 812–818 (2001).

J. Opt. Soc. Am. (1)

Jpn. J. Opt. (1)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart card holders identification based on optical image encryption,” Jpn. J. Opt. 33, 37–44 (2004) in Japanese.

Opt. Commun. (1)

Shoude Chang, Simon Boothroyd, Paparao Palacharla, and Sethuraman Pachanathan, “Rotation-invariant pattern recognition using a joint transform correlator,” Opt. Commun. 127, 107–116 (1984).
[Crossref]

Opt. Eng. (1)

B. Javidi and J.L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752–1756 (1994).
[Crossref]

Opt. Lett. (1)

Opt.Eng. (1)

Vahid R. Riasati, Partha P. Banerjee, Mustafa A. G. Abushagur, and Kenneth B. Howell, “Rotation-invariant synthetic discriminant function filter for pattern recognition,” Opt.Eng. 39, 1156–1161 (2000).
[Crossref]

Proc. SPIE (1)

H. Suzuki, T. Yamaya, T. Obi, M. Yamaguchi, and N. Ohyama, “Fingerprint verification for smart-card holders based on optical image encryption scheme,” in Optical Information Systems, Bahram Javidi and Demetri Psaltis, eds., Proc. SPIE 5202, 88–96 (2003).
[Crossref]

Other (1)

Official website, “QR code.com,” http://www.denso-wave.com/qrcode/index-e.html.

Cited By

OSA participates in Crossref's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (10)

Fig. 1.
Fig. 1.

Smart card holder authentication system which combines fingerprint verification with PIN verification by applying a double random phase encoding.

Fig. 2.
Fig. 2.

Flow of double random phase encoding.

Fig. 3.
Fig. 3.

The POC waveforms are shown. The left waveform is obtained by calculating the POC between same fingerprints, and the right one is the POC between different fingerprints.

Fig. 4.
Fig. 4.

(a) The method of bit encoding into 2D image is shown. When the right square is white, these squares express zero, and when the left one is white, they express one. (b) An example image which is transformed from a character sequence “1234ABCD”. Tags are also installed at the upper left corner and the lower right corner of the bit pattern.

Fig. 5.
Fig. 5.

Procedure of decoding a PIN data from the decrypted image.

Fig. 6.
Fig. 6.

Workflow of the preprocessing.

Fig. 7.
Fig. 7.

This figure shows the template image which is a part of an ellipse. The parameters which represent the characteristic of the arc are also shown.

Fig. 8.
Fig. 8.

These images show the experimental result of template image generation, (a) optimized template image, (b) estimated cores, which are represented by black points.

Fig. 9.
Fig. 9.

Result images are shown, (a) fingerprint image for enrollment, (b) encryption key image generated from (a), (c) original PIN image, (d) same individual’s fingerprint image for verification, (e) decryption key image generated from (d), (f) decrypted image by using (e), (g) different individual’s fingerprint image for verification, (h) decryption key image generated from (g), (i) decrypted image by using (h).

Fig. 10.
Fig. 10.

The actual position differences between two fingerprints used in the experiment are plotted. These graphs also show the result of verification in the case of (a) without removing (b) with removing the significantly shifted fingerprints.

Tables (1)

Tables Icon

Table 1. Accuracy of experimental verification

Equations (17)

Equations on this page are rendered with MathJax. Learn more.

f m ( x , y ) = f ( x , y ) exp [ jR ( x , y ) ] .
f r ( x d , y d ) = F m * ( u , v ) N ( u , v )
= f m * ( x d , y d ) * n ( x d , y d ) ,
g 1 ( x , y ) = 1 [ exp { j K E ( u , v ) } ] ,
g 2 ( x , y ) = 1 [ exp { j K D ( u , v ) } ] .
G E ( u , v ) = [ g E ( x , y ) ]
= A E ( u , v ) exp { j P E ( u , v ) } ,
G D ( u , v ) = [ g D ( x , y ) ]
= A D ( u , v ) exp { j P D ( u , v ) } ,
K E ( u , v ) = P E ( u , v ) ,
K D ( u , v ) = P D ( u , v ) .
n ( x d , y d ) { δ ( x d α , y d β ) ( correct fingerprint ) random sequence ( incorrect fingerprint ) ,
( x e , y e ) = ( x 1 x 2 , y 1 y 2 ) ,
Δ E = average ( x a x e ) 2 + ( y a y e ) 2 all training image pairs ,
BER = N Error N PIN ,
FRR = N FP N S ,
FAR = N FN N S ,

Metrics