Generation of Cancellable and Irrevocable Fingerprint Biometric Templates Using Quadrant Shift Modulation Transformation
Received: 11 May 2025 | Revised: 25 July 2025 and 12 August 2025 | Accepted: 14 August 2025 | Online: 8 September 2025
Corresponding author: K. Kanagalakshmi
Abstract
Cancellable biometrics support multiplicity by allowing the generation of multiple secure templates from the same biometric data. In recent years, biometric technologies have advanced beyond conventional identification and authentication techniques, making template protection an increasingly critical requirement. Because biometric data are unique to each individual, it is essential to preserve and cross-reference original features across applications. However, once compromised, biometric data cannot be recovered, highlighting the need for secure, revocable representations. In this study, we present Quadrant Shift Modulation (QSM), a patented technique designed to achieve both cancelability and irrevocability of biometric traits. Biometric authentication remains a reliable and user-friendly method of personal identification, yet protecting stored biometric data from malicious attacks remains challenging. The proposed QSM algorithm focuses on creating and protecting fingerprint templates by employing quadrant shift and quadrant swap operations to generate cancellable templates. Experimental evaluation using the Fingerprint Verification Competition 2004 (FVC2004) dataset demonstrates that the QSM system achieves 97.79% accuracy, an average Genuine Acceptance Rate (GAR) of 92.25%, and a False Rejection Rate (FRR) of 7.75%, confirming its effectiveness.
Keywords:
biometrics, fingerprint, bit-shifting, cancellable template, minutiae points, transformation, Q-shift, Q-swapDownloads
References
K. Saeed, "Biometrics Principles and Important Concerns," in Biometrics and Kansei Engineering, K. Saeed and T. Nagashima, Eds. New York, NY, USA: Springer, 2012, pp. 3–20.
A. Jain, L. Hong, and S. Pankanti, "Biometric identification," Commun. ACM, vol. 43, no. 2, pp. 90–98, Feb. 2000.
B. V. K. V. Kumar, M. Savvides, C. Xie, K. Venkataramani, J. Thornton, and A. Mahalanobis, "Biometric verification with correlation filters," Applied Optics, vol. 43, no. 2, pp. 391–402, Jan. 2004.
V. M. Patel, N. K. Ratha, and R. Chellappa, "Cancelable Biometrics: A review," IEEE Signal Processing Magazine, vol. 32, no. 5, pp. 54–65, Sep. 2015.
A. Nagar, S. Rane, and A. Vetro, "Alignment and bit extraction for secure fingerprint biometrics," in Media Forensics and Security II, San Jose, CA, USA, 2010, pp. 223–236.
K. Kanagalakshmi and J. K. Antony, "A cancellable and irrevocable approach for fingerprint template protection using optimal iterative solubility algorithm and secure point base," Biomedical Engineering: Applications, Basis and Communications, vol. 35, no. 1, Feb. 2023, Art. no. 2250049.
J. K. Antony and K. Kanagalakshmi, "Fingerprint template protection using SNL approach-based pattern transformation," International Journal of Biometrics, vol. 15, no. 5, pp. 623–643, Sep. 2023.
K. Kanagalakshmi and J. K. Antony, "An effective approach for fingerprint template protection based on CiKX transform and Tanimoto similarity measure," International Journal of Information and Computer Security, vol. 26, no. 4, pp. 291–315, Jun. 2025.
A. Sarkar and B. K. Singh, "A review on performance,security and various biometric template protection schemes for biometric authentication systems," Multimedia Tools and Applications, vol. 79, no. 37, pp. 27721–27776, Oct. 2020.
W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, "Security and Accuracy of Fingerprint-Based Biometrics: A Review," Symmetry, vol. 11, no. 2, Feb. 2019, Art. no. 141.
M. Gomez-Barrero, C. Rathgeb, G. Li, R. Ramachandra, J. Galbally, and C. Busch, "Multi-biometric template protection based on bloom filters," Information Fusion, vol. 42, pp. 37–50, Jul. 2018.
J.-H. Shin, H.-Y. Hwang, and S.-I. Chien, "Minutiae Extraction from Fingerprint Images Using Run-Length Code," in Foundations of Intelligent Systems: 14th International Symposium, Maebashi City, Japan, 2003, pp. 577–584.
J. S. Bartunek, M. Nilsson, B. Sallberg, and I. Claesson, "Adaptive Fingerprint Image Enhancement With Emphasis on Preprocessing of Data," IEEE Transactions on Image Processing, vol. 22, no. 2, pp. 644–656, Feb. 2013.
F. Zhao and X. Tang, "Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction," Pattern Recognition, vol. 40, no. 4, pp. 1270–1281, Apr. 2007.
Y. Alginahi, "Preprocessing Techniques in Character Recognition," in Character Recognition, M. Mori, Ed. London, UK: IntechOpen, 2010, ch. 1.
B. Topçu, M. Kayaoğlu, and U. Uludağ, "Fingerprint phalanx-based score fusion," in 2013 21st Signal Processing and Communications Applications Conference, Haspolat, Turkey, 2013, pp. 1–4.
B. T. Ulery, R. A. Hicklin, M. A. Roberts, and J. Buscaglia, "Interexaminer variation of minutia markup on latent fingerprints," Forensic Science International, vol. 264, pp. 89–99, Jul. 2016.
L. Jordaan and B. von Solms, "A Biometrics-Based Solution to Combat SIM Swap Fraud," in Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, 2010, pp. 70–87.
P. Gnanasivam and S. Muttan, "An efficient algorithm for fingerprint preprocessing and feature extraction," Procedia Computer Science, vol. 2, pp. 133–142, Jan. 2010.
R. Prabhu, X. Yu, Z. Wang, D. Liu, and A. (Andrew) Jiang, "U-Finger: Multi-Scale Dilated Convolutional Network for Fingerprint Image Denoising and Inpainting," in Inpainting and Denoising Challenges, Munich, Germany, 2018, pp. 45–50.
S. D. Bharkad and M. Kokare, "Performance evaluation of distance metrics: application to fingerprint recognition," International Journal of Pattern Recognition and Artificial Intelligence, vol. 25, no. 6, pp. 777–806, Sep. 2011.
R. de Luis-Garcı́a, C. Alberola-López, O. Aghzout, and J. Ruiz-Alzola, "Biometric identification systems," Signal Processing, vol. 83, no. 12, pp. 2539–2557, Dec. 2003.
M. Sivaram, M. U. Ahamed A, D. Yuvaraj, G. Megala, V. Porkodi, and M. Kandasamy, "Retracted: Biometric Security and Performance Metrics: FAR, FER, CER, FRR," in 2019 International Conference on Computational Intelligence and Knowledge Economy, Dubai, United Arab Emirates, 2019, pp. 770–772.
Q. Chen, H. Li, S. B. Ariffin, and N. A. B. Mustapa, "A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21783–21790, Apr. 2025.
S. M. E. Hossain, S. O. F. Khairy, A. Soosaimanickam, and A. M. Raisuddin, "Effective Classifier Identification in Biometric Pattern Recognition," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16604–16608, Oct. 2024.
W. K. Jummar, A. M. Sagheer, and H. M. Saleh, "Authentication System Based on Fingerprint Using a New Technique for ROI selection," Babylonian Journal of Artificial Intelligence, vol. 2024, pp. 102–117, Aug. 2024.
"FVC2004: the Third International Fingerprint Verification Competition." University of Bologna. http://bias.csr.unibo.it/fvc2004/.
Z. Jin, A. B. Jin Teoh, T. S. Ong, and C. Tee, "Fingerprint template protection with minutiae-based bit-string for security and privacy preserving," Expert Systems with Applications, vol. 39, no. 6, pp. 6157–6167, May 2012.
Downloads
How to Cite
License
Copyright (c) 2025 T. Jennifer, K. Kanagalakshmi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.