Encrypted Sensing Based on Digital Holography for Fingerprint Images

Abstract

We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed encrypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate experimentally that a fingerprint image can be captured as an optically encrypted image and can be restored correctly only when the correct cipher key is used. Moreover, we investigate experimentally the verification accuracy of the decrypted images.

Share and Cite:

Takeda, M. , Nakano, K. , Suzuki, H. and Yamaguchi, M. (2015) Encrypted Sensing Based on Digital Holography for Fingerprint Images. Optics and Photonics Journal, 5, 6-14. doi: 10.4236/opj.2015.51002.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Ratha, N.K., Connell, J.H. and Jain, A.K. (2001) Enhancing Security and Privacy in Biometrics-Based Authentication Systems. IBM Systems Journal, 40, 614-634.
http://dx.doi.org/10.1147/sj.403.0614
[2] Uludag, U., Pankanti, S. and Jain, A.K. (2005) Fuzzy Vault for Fingerprints. Audio- and Video-Based Biometric Person Authentication Lecture Notes in Computer Science, 3546, 310-319.
http://dx.doi.org/10.1007/11527923_32
[3] Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V.K.V. (1999) Biometric EncryptionTM.
http://www.cse.lehigh.edu/prr/Biometrics/Archive/Papers/BiometricEncryption.pdf
[4] Hirata, S. and Takahashi, K. (2009) Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. Advances in Biometrics Lecture Notes in Computer Science, 5558, 868-878.
http://link.springer.com/chapter/10.1007%2F978-3-642-01793-3_88
[5] Clancy, T.C., Kiyavash, N. and Lin, D.J. (2003) Secure Smartcard Based Fingerprint Authentication. Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications—WBMA, 45.
https://www.cs.umd.edu/~clancy/docs/bio-wbma2003.pdf
[6] Refregier, P. and Javidi, B. (1995) Optical Image Encryption Based on Input Plane. Optics Letters, 20, 767-769.
http://dx.doi.org/10.1364/OL.20.000767
[7] Javidi, B. and Nomura, T. (2000) Securing Information by Use of Digital Holography. Optics Letters, 25, 28-30.
http://dx.doi.org/10.1364/OL.25.000028
[8] Yamaguchi, I., Yamamoto, K., Mills, G.A. and Yokota, M. (2006) Image Reconstruction Only by Phase Data in Phase-Shifting Digital Holography. Applied Optics, 45, 975-983.
http://dx.doi.org/10.1364/AO.45.000975
[9] Javidi, B. and Nomura, T. (2000) Three-Dimensional Object Recognition by Use of Digital Holography. Optics Letters, 25, 28-30.
http://dx.doi.org/10.1364/OL.25.000028
[10] Matoba, O., Nomura, T., Perez-Cabre, E., Millan, M.S. and Javidi, B. (2009) Optical Techniques for Information Security. Proceedings of IEEE, 97, 1128-1148.
http://dx.doi.org/10.1109/JPROC.2009.2018367
[11] Liu, S., Guo, C.L. and Sheridan, J.T. (2014) A Review of Optical Image Encryption Techniques. Optics & Laser Technology, 57, 327-342.
http://dx.doi.org/10.1016/j.optlastec.2013.05.023
[12] Tajahuerce, E. and Javidi, B. (2000) Encrypting Three-Dimensional Information with Digital Holography. Applied Optics, 39, 6595-6601.
http://dx.doi.org/10.1364/AO.39.006595
[13] Takeda, M., Ina, H. and Kobayashi, S. (1982) Fourier-Transform Method of Fringe-Pattern Analysis for Computer-Based Topography and Interferometry. Journal of the Optical Society of America, 72, 156-160.
http://dx.doi.org/10.1364/JOSA.72.000156
[14] Spagnolo, G.S. and Cozzella, L. (2012) Laser Speckle Decorrelation for Fingerprint Acquisition. Journal of Optics, 14, 094006.
http://dx.doi.org/10.1088/2040-8978/14/9/094006
[15] Utsugi, T. and Yamaguchi, M. (2013) Reduction of the Recorded Speckle Noise in Holographic 3D Printer. Optics Express, 21, 662-674.
http://dx.doi.org/10.1364/OE.21.000662
[16] Javidi, B. (1989) Nonlinear Joint Power Spectrum Based Optical Correlation. Applied Optics, 28, 2358-2367.
http://dx.doi.org/10.1364/AO.28.002358
[17] Kumar, B.V.K.V., Savvides, M., Xie, C., Venkataramani, K., Thornton, J. and Mahalanobis, A. (2004) Biometric Verification with Correlation Filters. Applied Optics, 43, 391-402.
http://dx.doi.org/10.1364/AO.43.000391
[18] Helinski, R., Acharyya, D. and Plusquellic, J. (2009) A Physical Unclonable Function Defined Using Power Distribution System Equivalent Resistance Variations. Proceedings of the 46th Annual Design Automation Conference on ZZZ-DAC’09, 676.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5227103&url=http%3A
%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5227103

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.