Journal of Advanced Computer Science & Technology, 4 (1) (2015) 6-11 www.sciencepubco.com/index.php/JACST ©Science Publishing Corporation doi: 10.14419/jacst.v4i1.3958 Research Paper Coset decomposition method for storing and decoding fingerprint data Mohamed Sayed Faculty of Computer Studies, Arab Open University on Leave from Alexandria University, Faculty of Engineering E-mail: msayed@aou.edu.kw Copyright © 2015 Mohamed Sayed. This is an open access article distributed under the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and probe fingerprints is modeled and implemented using MATLAB. Keywords: Biometrics; Coset Decomposition; Fingerprints Matching; Syndrome Decoding. 1. Introduction With the increased integrations of computers and internet into individual’s lives, it is substantial to protect sensitive and personal data. Now, biometric technologies are turning on the ground of an overall array of highly secure identification and personal verification solutions, see for instance [1] and [3]. Biometrics is largely automatic method of differentiating a person based on a physiological or behavioral characteristic. Examples of physiological characteristics include finger images, hand, facial characteristics and iris recognition. Behavioral characteristics are traits which are learned or acquired such as dynamic signature verification, speaker verification, gait, and keystroke dynamics. Biometrics method of identification shows various advantages over traditional methods such as ID cards (tokens) or PIN numbers (passwords) [8] for several reasons: The user to be sympathized has to present physically, often mandatory, at the point of identification and identification based on biometric techniques avoids the need to carry token or to remember any passwords. There are many types of biometrics currently in use, and many more new types are to come such as DNA and holograms. Different significant affairs have to be taken into consideration in order to design a practical biometric system. For instance, a user must be enrolled in the system so that his biometric template (or reference) can be captured. This template is securely stored in a central database or a smart card issued to the user. The template is used for matching when a user needs to be identified or authorized to login a system. It should be noting that a biometric system can operate either in verification (authentication) or an identification mode. Fingerprints which are the patterns of friction ridges and valleys on an individual’s fingertips are unique for each finger of any person even for identical twins [4]. For decades, the implementation has been determining and classifying identity by matching certain points of ridge endings and bifurcations. For example, fingerprint recognition devices for laptop, desktop and cell phones access, at a low cost, are now excessively obtainable from various vendors. Users no longer require to type passwords, instead, the users fingerprints provides immediate entry. On the other hand, the codes provide a systematic way to send messages, with some additional information (check digits) in such a manner that an error occurring in the original messages will not simply be noticed (detected) by the receiver but, in many instances, may be adjusted. In parliamentary procedure for error correction to be effective, the decoding problem must be efficiently solvable. For security and matching reasons, it is desirable that the biometric information is stored in encrypted arrangement rather than in plain text. Similar to the problem of receiving and verifying a message through a noisy channel, when a user wants to access the system, the access device should allow