Journal of Advanced Computer Science & Technology, 4 (1) (2015) 6-11
www.sciencepubco.com/index.php/JACST
©Science Publishing Corporation
doi: 10.14419/jacst.v4i1.3958
Research Paper
Coset decomposition method for storing and
decoding fingerprint data
Mohamed Sayed
Faculty of Computer Studies, Arab Open University on Leave from Alexandria University, Faculty of Engineering
E-mail: msayed@aou.edu.kw
Copyright © 2015 Mohamed Sayed. This is an open access article distributed under the Creative Commons Attribution License , which permits unrestricted use,
distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and
encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure
means of storing and matching various biometrics data. We apply an algebraic coding technique called coset
decomposition to the model of fingerprint biometrics. The algorithm which reveals the matching between registered and
probe fingerprints is modeled and implemented using MATLAB.
Keywords: Biometrics; Coset Decomposition; Fingerprints Matching; Syndrome Decoding.
1. Introduction
With the increased integrations of computers and internet into individual’s lives, it is substantial to protect sensitive and
personal data. Now, biometric technologies are turning on the ground of an overall array of highly secure identification
and personal verification solutions, see for instance [1] and [3]. Biometrics is largely automatic method of
differentiating a person based on a physiological or behavioral characteristic. Examples of physiological characteristics
include finger images, hand, facial characteristics and iris recognition. Behavioral characteristics are traits which are
learned or acquired such as dynamic signature verification, speaker verification, gait, and keystroke dynamics.
Biometrics method of identification shows various advantages over traditional methods such as ID cards (tokens) or
PIN numbers (passwords) [8] for several reasons: The user to be sympathized has to present physically, often
mandatory, at the point of identification and identification based on biometric techniques avoids the need to carry token
or to remember any passwords. There are many types of biometrics currently in use, and many more new types are to
come such as DNA and holograms. Different significant affairs have to be taken into consideration in order to design a
practical biometric system. For instance, a user must be enrolled in the system so that his biometric template (or
reference) can be captured. This template is securely stored in a central database or a smart card issued to the user. The
template is used for matching when a user needs to be identified or authorized to login a system. It should be noting that
a biometric system can operate either in verification (authentication) or an identification mode.
Fingerprints which are the patterns of friction ridges and valleys on an individual’s fingertips are unique for each finger
of any person even for identical twins [4]. For decades, the implementation has been determining and classifying
identity by matching certain points of ridge endings and bifurcations. For example, fingerprint recognition devices for
laptop, desktop and cell phones access, at a low cost, are now excessively obtainable from various vendors. Users no
longer require to type passwords, instead, the users fingerprints provides immediate entry.
On the other hand, the codes provide a systematic way to send messages, with some additional information (check
digits) in such a manner that an error occurring in the original messages will not simply be noticed (detected) by the
receiver but, in many instances, may be adjusted. In parliamentary procedure for error correction to be effective, the
decoding problem must be efficiently solvable. For security and matching reasons, it is desirable that the biometric
information is stored in encrypted arrangement rather than in plain text. Similar to the problem of receiving and
verifying a message through a noisy channel, when a user wants to access the system, the access device should allow