Cancelable Template Generation Using the Tetrahedron-based Transformation Technique
Received: 18 June 2025 | Revised: 6 August 2025 and 19 August 2025 | Accepted: 20 August 2025 | Online: 6 October 2025
Corresponding author: A. Rama Prasath
Abstract
Fingerprint-based authentication systems are widely used across various domains because of their reliability and uniqueness. However, storing fingerprint minutiae as templates in a database poses significant security and privacy risks. Various studies indicate that fingerprints can be reconstructed from stored templates, which underscores the need for stronger template protection schemes. Cancelable fingerprint templates are among the best solutions to ensure that no original information is disclosed if a template is compromised. This study introduces a novel Tetrahedron-based Transformation Technique (TBTT) designed to generate irreversible and cancelable fingerprint templates. The method applies a geometric transformation to divide the plotted minutiae into three triangular parts, after which each segment undergoes a separate rotation in a defined order. The proposed approach produces a robust cancelable template that is resistant to inversion and reconstruction, while addressing risks associated with cross-matching, linking, and template inversion. Comprehensive experiments were conducted on benchmark datasets from the Fingerprint Verification Competition 2004 (FVC2004), including all accessible fingerprint images. The average recognition accuracy for datasets DB1 to DB4 is 98.86%, 95.23%, 96.17%, and 94.73%, respectively, with an average recognition time of 0.24 ms. The results demonstrate that the proposed method provides high matching accuracy and significantly improves template security.
Keywords:
cancelable biometrics, fingerprint template, feature transformation, template security, fingerprint authentication, non-invertibilityDownloads
References
A. Hayat, S. S. Ali, A. K. Bhateja, and N. Werghi, "FinTem: A secure and non-invertible technique for fingerprint template protection," Computers & Security, vol. 142, Jul. 2024, Art. no. 103876.
V. S. Baghel, S. S. Ali, and S. Prakash, "A non-invertible transformation based technique to protect a fingerprint template," IET Image Processing, vol. 17, no. 13, pp. 3645–3659, Nov. 2023.
F. A. Hossam Eldein Mohamed and W. El-Shafai, "Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix," Multimedia Tools and Applications, vol. 83, no. 23, pp. 63755–63793, Jul. 2024.
A. Khan and H. Farooq, "Principal Component Analysis-Linear Discriminant Analysis Feature Extractor for Pattern Recognition." arXiv, Apr. 05, 2012.
N. K. Sreeja, "A hierarchical heterogeneous ant colony optimization based fingerprint recognition system," Intelligent Systems with Applications, vol. 17, Feb. 2023, Art. no. 200180.
A. A. Momani and L. T. Kóczy, "A robust fingerprint identification approach using a fuzzy system and novel rotation method," Pattern Recognition, vol. 159, Mar. 2025, Art. no. 111134.
J. J. Engelsma, K. Cao, and A. K. Jain, "Learning a Fixed-Length Fingerprint Representation," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 6, pp. 1981–1997, Jun. 2021.
A. A. Alzhrani, M. Balfaqih, F. Alsenani, M. Alharthi, A. Alshehri, and Z. Balfagih, "Design and Implementation of an IoT-Integrated Smart Locker System utilizing Facial Recognition Technology," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 16000–16010, Aug. 2024.
M. Η. Algarni, "Fingerprint Sequencing: An Authentication Mechanism that Integrates Fingerprints and a Knowledge-based Methodology to Promote Security and Usability," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14233–14239, Jun. 2024.
P. Rakheja, "An asymmetric double fingerprint template encryption using twin decomposition technique in hybrid transform domain," Multimedia Tools and Applications, vol. 84, no. 9, pp. 6687–6709, Mar. 2025.
M. S. Khan, H. Li, Y. Sun, and C. Zhao, "Cancelable fingerprint template protection based on random quantization and improved bloom filter," Multimedia Tools and Applications, vol. 84, no. 17, pp. 17547–17579, May 2025.
W. El-Shafai, A. El-Mesady, and F. M. Kamal, "Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic mapping," Multimedia Tools and Applications, vol. 84, no. 16, pp. 16909–16943, May 2025.
A. H. A. El-aziem, A. Abdelhafeez, and T. H. M. Soliman, "A Proposed Cancelable Biometrical Recognition System (CBRS) Based on Developed Hénon Chaotic-Map," Wireless Personal Communications, Jan. 2024.
C. Liu, Z. Zhi, W. Zhao, and Z. He, "Research on Fingerprint Image Differential Privacy Protection Publishing Method Based on Wavelet Transform and Singular Value Decomposition Technology," IEEE Access, vol. 12, pp. 28417–28436, 2024.
"FVC2004: the Third International Fingerprint Verification Competition." University of Bologna. http://bias.csr.unibo.it/fvc2004/.
Downloads
How to Cite
License
Copyright (c) 2025 A. Yoogesh, A. Rama Prasath

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.