Journal of Computer and Communications, 2014, 2, 25-30
Published Online March 2014 in SciRes. http://www.scirp.org/journal/jcc
http://dx.doi.org/10.4236/jcc.2014.24004
How to cite this paper: Jang, H.-U. and Lee, H.-K. (2014) Biometric-PKI Authentication System Using Fingerprint Minutiae.
Journal of Computer and Communications, 2, 25-30. http://dx.doi.org/10.4236/jcc.2014.24004
Biometric-PKI Authentication System Using
Fingerprint Minutiae
Han-Ul Jang, Heung-Kyu Lee*
Department of Computer Science, Korea Advanced Institute of Science and Technology, Daejeon, Republic of
Korea
Email: *hklee@mmc.kaist.ac .kr
Received October 2013
Abstract
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that
performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication
system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of
current PKI authentication and biometric authentication, which employs biometric data and a
public key from a digital certificate. In the proposed biometric-PKI authentication system, an au-
thentication process performs that it extracts consistent features of fingerprint images, encrypts
consistent features, and matches features with prepared templates. The simulation results of the
proposed authentication system prove that our system achieves low false acceptance rate and
high accuracy rate.
Keywords
Biom etr ics ; PKI Authentication; Fingerprint Minutiae
1. Introduction
Public Key Infrastructure (PKI) [1,2] is a foundation technology for handling key distribution and validation in
communication security. PKI has widely employed for highly secured key management since 1990’s.
PKI enables secure key distribution that is the main issue in communication security. For instance, it is the
most secure method that user A delivers own secret key to user B in person, however, the method has very low
scalability. PKI has an automated process for secure key distribution.
Although PKI has an important benefit in communication security, the more phishing and Man-in-the-Middle
Attack (MITM Attack) have emerged, the often the security of PKI has been weakened. Currently, it is a com-
mon opinion that PKI contains drawbacks on a variety of communication attacks. Hence, PKI could not be com-
prehensive security solution any longer.
Under PKI, it is difficult to trust a public key of a digital certificate with the only key information. For in-
stance, a tampered public key could be trusted if an attacker uses MD5 hash collision attack to the public key
since the tampered public key could be validated by a digital certificate of Certificate Authority (CA). Providing
a comprehensive security solution with only PKI causes very dangerous situation in communication security.
*
Corresponding author.
H.-U. Jang, H.-K. Lee
26
Biometrics describes recognition technologies on unique physiognomy or behavior properties that human be-
ings have. Biometric data provides enhanced non-repudiation beside PKI due to their unique information. Bio-
metric data could be a component of user authentication, moreover it improves degree of security in communi-
cation integrating other authentication systems. However, biometric information has a fatal defect that it must
not be used if the biometric data is leaked. Hence, it is significantly important to create cancelable biometric da-
ta that is irreversible.
Previous works on integration of biometrics and PKI that are robust to MITM Attack have introduced recently.
Althobaiti et al. proposed an enhanced cryptography for biometric [3]. The proposed method creates public key-
pair employing elliptic curve, which is a NP-Hard problem, and biometric data. The cryptographic method has a
benefit having higher security than that of PKI, whereas, the method requires the same features of biometric data
to make the same secret key every time. Scheirer et al. presented an anti-MIM Attack scheme creating revocable
biotokens [4]. However, the scheme could be done under an exceedingly ideal case, so it has limitation of gene-
rating a practical revocable biotoken.
In the following sections we will describe in detail our biometric-PKI authentication system. Sections 2 and 3
describe the algorithm on detection of fingerprint core point and the method on detection of minutiae of finger-
prints, respectively. In Section 4, MITM Attack is described using a scenario. Section 5 mainly discusses our
biometric-PKI authentication algorithm. Section 6 and Section 7 contain the experimental results and the sum-
mary, respectively.
2. Fingerprint Core Point Detection
In order to obtain consistent features from fingerprint images, fingerprint core point detection is essential. To
find a core point of a fingerprint, which the core point is illustrated in Figure 1, a fingerprint image is enhanced
under two preprocessing steps including normalization and orientation field detection [5,6]. Finally, core point
detection performs with an orientation field of a fingerprint.
2.1. Normalization
Let
(, )Iij
and
(, )Nij
denote the original pixel
(, )ij
and the normalized gray-level value
(, )
ij
, respec-
tively. The normalization of a fingerprint image is defined as
2
0
0
2
0
0
( (,))if( ,)
(, )
( (,))otherwise
i
i
i
i
V IijM
MIij M
V
Nij V IijM
MV
+>
=
(1)
where
i
M
and
, the estimated mean and variant of
(, )Iij
, respectively.
0
M
and
are the desired mean
and variant, respectively. Normalization reduces sensor noise of a fingerprint image and removes gray- level
deformation caused by finger pressure difference.
2.2. Orientation Field Detection
An orientation field of a fingerprint can be calculated by estimating the local orientation of each local block that
is divided by a non-overlapping block of size
WW×
. To estimate an orientation field, Rao’s algorithm is em-
ployed [7]. Rao’s algorithm contains the following steps.
1) Divide a fingerprint image into a non-overlapping block of size
WW×
;
2) Calculate gradients
x
G
and
y
G
of each block;
3) Estimate the local orientation of each block. The formula for estimating the local orientation is defined as
follows:
111
22
11
2(,)(, )
1tan
2((,)(, ))
WW
xy
ij
oWW
xy
ij
GijGij
G ijG ij
θ
= =
= =
=




∑∑
∑∑
(2)
H.-U. Jang, H.-K. Lee
27
(a) (b)
Figure 1. An orientation field and ridge ending points of a fingerprint image. The core point
is marked with a red circle; (a) is an orientation field image and (b) is an end-point image.
where
W
is the size of block,
x
G
and
y
G
are gradient magnitudes in
x
and
y
, respectively.
2.3. Core Point Detection
A core point of a fingerprint is detected by curvature technique. The algorithm is described as follows.
1) Compute the local orientation
(, )ij
θ
using Equation (2) above;
2) Calculate the difference of orientation about each local block. The formula as follows:
11
X = cos2(,)cos2(1,)
WW
kk
DiffW kk
θθ
= =
∑∑
(3)
and
11
Y = sin2(,)sin2(,1)
WW
ll
Diffl Wl
θθ
= =
∑∑
(4)
where
XDiff
and
YDiff
are the difference of orientation of columns and rows of a fingerprint image, re-
spectively.
3) The curvature point
X
is located where both
XDiff
and
YDiff
are negative.
4) If a core point of a fingerprint is not found, repeat core point detection until the core point is detected.
3. Minutiae Detection
Minutiae Detection is necessary process to create consistent features. The minutiae detection algorithm consists
of the following steps [8,9].
1) A thinned ridge image
R
has eight neighbors such as
012 7
, ,,...,
NNN N
each pixel
(, )xy
.
2) If pixel
(, )xy
has one neighbor as Equation (5), the pixel is a ridge ending point.
3) If pixel
(, )xy
has more than two neighbors as Equation (6), the pixel is a ridge bifurcation point.
4. MITM Attack
MITM Attack is an attack targeting at deficiency of the PKI authentication system. An attacker creates a pseu-
do-random public key applying hash collision attack to a certain user’s digital certificate. The pseudo-random
public key could be valid since the digital certificate including the tampered public key has the same hash value
as the value of the original certificate. The attacker could read the data that is transmitted from the user when the
MITM Attack succeeds. An attempt to attack a digital certificate under PKI presented at the 2008 Chaos Com-
munications Congress [10]. The MITM Attack scenario is as follows.
1) An attacker creates a pseudo-random certificate that has the same hash value as the certificate of a certain
user and establishes a rogue CA.
2) The user receives the tampered certificate and requests the rogue CA’s certificate to validate the tampered
H.-U. Jang, H.-K. Lee
28
one.
3) The rogue CA transmits its own certificate to the user.
4) The user validates the tampered certificate using the rogue CA’s certificate.
5) The user employs the tampered public key since the hash value is identical.
6) The attacker reads packets that are transmitted from the user with his/her own private key.
5. Biometric-PKI Authentication System
We propose a biometric-PKI authentication system and the whole process is shown in Figure 2. The proposed
algorithm is as follows.
1) Find ridge ending points of a fingerprint image. Each ridge ending point has the distance of 10 from other
points. If the distance is less than 10, the ridge ending point is excluded.
2) Calculate the distance between each ridge ending point and the core point. The distance is defined as Equa-
tion (7):
0(, )(, )
ii
dXxyXxy= −
(7)
where
0
X
and
i
X
are the core point and the
th
i
ridge ending point, respectively;
is the distance be-
tween
0
X
and
i
X
.
3) Compute the difference of orientation between each ridge ending point and the core point. The difference
of orientation is defined as Equation (8):
0ii
θ θθ
∆= −
(8)
where
and
i
θ
are the orientation of the core point and the
th
i
ridge ending point, respectively;
i
θ
is
the difference of orientation between
and
i
θ
.
4) Quantize the distance and the difference of orientation. The quantization of distance and difference of
orientation are defined as Equation (9) and (10), respectively:
(/)
Q
i id
dceil dq=
(9)
(/ (/))
Q
ii
ceil q
θ
θ θπ
∆=∆
(10)
where
d
q
and
q
θ
are quantization factors of distance and difference of orientation, respectively;
Q
i
d
and
Q
i
θ
are the
th
i
quantized distance and difference of orientation, respectively.
5) Obtain consistent features using quantized distance and difference of orientation. Consistent features are
computed as
mod((), )
QQ
i ii
Sd
ρθ η
= ∆+
(1 1)
where
is the
th
i
consistent feature,
and
η
, a prime number which is used for differentiating each con-
sistent feature and nonce, respectively.
could be less than
8
2
that is the sufficiently large number to use in
Equation (11).
6) Divide a public key of a digital certificate into
k
coefficients. For instance, if the size of a public key is
1024-bit and
k
is 128, each coefficient has 8-bit, which each coefficient value is from 0 to 255.
111
{,,,,}
k
C CCCC=⋅⋅⋅
( 12 )
7) Encrypt consistent features as Equation (13):
12 1
12 1
mod((mod(,)mod(, )mod(,)), )
kk
iii kik
ECSMCSMCSMC M
−−
=⋅+⋅+ ⋅⋅⋅ +⋅+
(13)
where
i
E
is the
th
i
encrypted consistent feature and
M
is a modulo operator that makes a number being
Figure 2. A flowchart of the proposed biometric-PKI authentication system.
H.-U. Jang, H.-K. Lee
29
calculated not exceed the limitation of an integer number. This step makes cancelable biometric features using
the modulo operator
M
.
8) The proposed biometric-PKI authentication processes are as follows.
a) User A requests an access to Server S.
b) S transmits a nonce to A.
c) A sends his/her own digital certificate and encrypted consistent features
A
E
α
applying the nonce.
d) S validates A’s certificate.
e) If A’s certificate is valid, S creates encrypted consistent features
A
E
β
using A’s fingerprint template and
attempts biometric authentication.
f) If
A
E
α
and
A
E
β
have the maximum matching, the biometric authentication succeeds and S trusts A’s pub-
lic key.
6. Experimental Results
We have tested our biometric-PKI authentication system on FVC2002 DB2-B database [11]. FVC2002 DB2-B
contains 80 live-scanned fingerprints, which each fingerprint has eight different impressions. All images are
captured in an optical sensor with a resolution 569 dpi. In our experiment, we chose No.1, 2, 7, 8 impression
images each finger because other impression images are captured with the intentional displacement. For an au-
thentication system, users are willing to provide good quality fingerprint images. Hence, abnormal images were
excluded in our experiment. A fingerprint template was created containing consistent features of two finger-
prints and other two fingerprint images were employed for the biometric authentication. For an identical number
of matching of each fingerprint, the number of consistent features were limited as 40. We varied quantization
factor
d
q
that
8
d
q=
,
10
d
q=
, and
12
d
q=
. In addition, we varied quantization factor
q
θ
that,
8q
θ
=
,
10q
θ
=
, and
15q
θ
=
. The size of RSA public key bit stream for the test was 2048-bit. In our experiment, we
divided a public key into 128 coefficients. Table 1 shows the false acceptance rate, the false rejection rate, and
the accuracy when
8
d
q=
with different quantization factors for difference of orientation. Figure 3 shows that
with different quantization factors for distance, our biometric-PKI authentication system remains to achieve over
90 percent accuracy and approximately 3 percent false acceptance rate. Moreover, the proposed system makes
cancelable biometric features, therefore, biometric data is irreversible.
7. Conclusion
We have designed and implemented a biometric-PKI authentication system that provides robust authentication
against MITM attack that is deficiency under PKI. In addition, the authentication system makes cancelable bio-
metric features that are irreversible. The proposed system has two authentication processes. Firstly, the PKI
Table 1. Biometric-PKI authentication system performance.
q
θ
FAR FRR Accuracy
8 0.02 0.25 0.95
10 0.03 0.30 0.94
12 0.02 0.25 0.95
(a) (b) (c)
Figure 3. FAR and Accuracy of the proposed biometric-PKI authentication system; (a) qd = 8; (b) qd = 10; (c) qd = 12.
H.-U. Jang, H.-K. Lee
30
authentication performs with a digital certificate. Second, the biometric authentication performs. If two authen-
tications succeed, the public key of a digital certificate is trusted one. Finally, the public key could be employed
for data encryption. Based on the experimental results, we observe that the proposed biometric-PKI authentica-
tion system achieves low false acceptance rate and high accuracy rate.
Acknowledgements
This work was partially supported by Defense Acquisition Program Administration and Agency for Defense
Development under the contract (UD060048AD).
References
[1] Adams, C. and Farrell, S. (1999) Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC
2510 (Proposed Standard). http://www.ietf.org/rfc/rfc2510.txt
[2] Schaad, J. (2005) Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF). RFC 4211
(Proposed Standard). http://www.ietf.org/rfc/rfc4211.txt
[3] Althobaiti, O.S. and Aboalsamh, H.A. (2012) An Enhanced Elliptic curve Cryptography for Biometric. Proceedings of
the 7th International Conference on Computing and Convergence Technology, Seoul, 3-5 December 2012, 1048-1055.
[4] Scheirer, W., Bishop, B. and Boult, T. (2010) Beyond PKI: The Biocryptographic Key Infrastructure. Proceedings of
the IEEE International Workshop on Information Forensics and Security, Seattle, 12-15 December 2010, 1-6.
http://dx.doi.org/10.1109/WIFS.2010.5711435
[5] Jain, A. , Prabhakar, S., Hong, L. and Pankanti, S. (2000) Filterbank-Based Fingerprint Matching. IEEE Transactions
on Image Processing, 9, 846-859. http://dx.doi.org/10.1109/83.841531
[6] Jain, A., Hong, L. and Bolle, R. (1997) On-Line Fingerprint Verification. IEEE Transactions on Pattern Analysis and
Machine Intelligence, 19, 302-314. http://dx.doi.org/10.1109/34.587996
[7] Rao, A.R. (1990) A Taxonomy for Texture Description and Identification. Springer, New York.
http://dx.doi.org/10.1007/978-1-4613-9777-9
[8] Hong, L., Wan, Y. and Jai n, A.K. (1998) Fingerprint Image Enhancement: Algorithm and Performance Evaluation.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 20, 777-789.
http://dx.doi.org/10.1109/34.709565
[9] Maltoni, D., M aio, D., Jain, A.K. and Prabhakar, S. (2009) Handbook of Fingerprint Recognition. 2nd Edition, Sprin-
ger, London. http://dx.doi.org/10.1007/978-1-84882-254-2
[10] Sotirov, A., et al. (2008) Creating a Rogue CA Certificate. http://www.tue.nl/hashclash/rogue-ca/
[11] Maio, D., Maltoni, D., Cappelli, R. and Wayman, J.L. (2002) FVC2002: Second Fingerprint Verification Competition.
Proceedings of the 16th International Conference on Pattern Recognition, 3, 811-814.
http://dx.doi.org/10.1109/ICPR.2002.1048144