Security System Design on Feature Information of Biometric Fingeprint using Kronecker Product Operation and Elementary Row Operation

Distinguishing fingerprint feature, like minutia, from its originality could protect the restricted information adhered with the fingerprint from being recognized by outsiders. Displacing the minutiae from its place methodically transforms the fingerprint appearance into a camouflage look. This cond...

Full description

Saved in:
Bibliographic Details
Published in2019 16th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering pp. 1 - 5
Main Authors Mukhaiyar, Riki, Syawaludin
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Distinguishing fingerprint feature, like minutia, from its originality could protect the restricted information adhered with the fingerprint from being recognized by outsiders. Displacing the minutiae from its place methodically transforms the fingerprint appearance into a camouflage look. This condition will deceive impostor from obtaining a correct fingerprint data. Implementing some matrix procedures into fingerprint matrix form would change each value contained in the fingerprint. This paper proposes a matrix operation called Kronecker Product Operation (KPO) to manipulate the value of each pixel of the fingerprint feature. KPO agitates each pixel by expanding its value into ixj orde of each pixel. This elaboration transforms the original form of the fingerprint feature image into mxn time of its originality form. For instance, an original 3×3 image would alter into 6×12, 9×21, 15×3, or 24×18 image form depended on KP form used. These form will secure the basic feature information of the fingerprint. Moreover, the protection system is also provided by twirling the row element of the fingerprint pixel by implementing a matrix operation called as elementary row operation (ERO). This procedure works in pixel procedure with some requirements i.e. exchanging rows, multiplying, and zeroing a selected pixel row. These requirements are implemented to distinguish the original feature information of the fingerprint so that any imposter could steal it. The result of this system is a robust fingerprint protection system that guarantees any fingerprint database users to have a secure fingerprint feature.
DOI:10.1109/QIR.2019.8898284