DOI QR코드

DOI QR Code

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju (Department of Computer and Information Science, Korea University) ;
  • Chung, Yong-Wha (Department of Computer and Information Science, Korea University) ;
  • Moon, Dae-Sung (ETRI Human Identification Research Team, ETRI) ;
  • Pan, Sung-Bum (Department of Control, Instrumentation and Robot Engineering, Chosun University) ;
  • Seo, Chang-Ho (Department of Applied Mathematics, Kongju National University)
  • Received : 2011.03.31
  • Accepted : 2011.08.15
  • Published : 2011.10.31

Abstract

Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

Keywords

References

  1. D. Maltoni, et al., Handbook of Fingerprint Recognition, 2003.
  2. R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, vol. 35, pp. 2727-2738, 2002. https://doi.org/10.1016/S0031-3203(01)00247-3
  3. B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, vol. 42, no, 8, pp. 136, 1999. https://doi.org/10.1145/310930.310988
  4. S. Prabhakar, et al., "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003.
  5. J. Hu, "Mobile Fingerprint Template Protection: Progress and Open Issues," in Proc. of IEEE ICIEA Conference, pp. 3-5, 2008.
  6. A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002.
  7. T. Clancy, et al., "Secure Smartcard-based Fingerprint Authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-522003.,
  8. U. Uludag, et al., "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-based Biometric Person Authentication, pp. 310-319, 2005.
  9. K. Nandakumar, et al., "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007. https://doi.org/10.1109/TIFS.2007.908165
  10. S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005.
  11. Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS 3822, pp. 358-369, 2005.
  12. D. Moon, et al., "Fingerprint Template Protection Using Fuzzy Vault," LNCS 4707, pp.1141-1151, 2007.
  13. D. Moon, et al., "Configurable Fuzzy Fingerprint Vault for Match-on-Card System," IEICE Electron Express, vol. 6, no. 14, pp. 993-999, 2009. https://doi.org/10.1587/elex.6.993
  14. S. Shin, M. Lee, D. Moon, and K. Moon, "Dictionary Attack on Functional Transform-based Cancelable Fingerprint Templates," ETRI Journal, vol. 31, no. 5, pp. 628-630, 2009. https://doi.org/10.4218/etrij.09.0209.0137
  15. W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, 2007.
  16. A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack against the Fuzzy Vault Scheme," in Proc. of SPIE, vol. 6819, pp. 68190O.1-68190O.7, 2008.
  17. R. Rivest, et al., "Chaffing and Winnowing: Confidentiality without Encryption," http://theory.lcs.mit.edu/-rivest/chaffing.txt, 1998.
  18. D. Socek, D. Culibrk, and V. Bozovic, "Issues and Challenges in Storing Biometric Templates Securely," in Proc. of CRISIS, pp. 75-81, 2007.
  19. N. Ratha and R. Bolle, "Automatic Fingerprint Recognition Systems," Springer, 2004.
  20. T. Hopper, C. Brislawn, J. Bradley, "WSQ Gray-Scale Fingerprint Image Compression Specification," Federal Bureau of Investigation, Document No. IAFIS-IC-0110 (v2), 1993.
  21. Y. Wang, J. Hu, and D. Philip, "A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and its Application to Singular-point Detection and Fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007. https://doi.org/10.1109/TPAMI.2007.1003
  22. P. Zhang, J. Hu, C. Li, M. Bennamound, and V. Bhagavatulae, "A Pitfall in Fingerprint Bio-Cryptographic Key Generation," Computers and Security, Elsevier, 2011.
  23. K. Xi and J. Hu. "Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault," in Proc. of IEEE ICC, 2009.
  24. H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, vol. 4, pp. 10-21, Oct.-Dec. 1997.
  25. S. Lee, et al., "Memory-Efficient Fuzzy Fingerprint Vault Based on the Geometric Hashing," in Proc. of ISA, pp. 312-315, 2008.
  26. S. Chae, S. Lim, S. Bae, Y. Chung, and S. Pan, "Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing," KSII Tr. Internet & Info Systems, vol. 4, no. 6, pp. 1294-1310, 2010.
  27. E. Berlekamp, Algebraic Coding Theory, McGraw-Hill, New York, 1968. (Revised edition, Laguna Hills: Aegean Park Press, 1984.
  28. V. Guruswami and M. Sudan, "Improved Decoding of Reed-Solomon and Algebraic Geometric Codes," in Proc. of FOCS, pp. 28-39, 1998.
  29. S. Gao, "A New Algorithm for Decoding Reed-Solomon Codes," Communications, Information and Network Security, pp. 55-68, Kluwer Academic Press, 2003.
  30. http://bias.csr.unibo.it/fvc2002/databases.asp. Sungju

Cited by

  1. Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm vol.8, pp.7, 2011, https://doi.org/10.3837/tiis.2014.07.012
  2. Multiply information coding and hiding using fuzzy vault vol.23, pp.12, 2011, https://doi.org/10.1007/s00500-018-3089-x
  3. 무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법 vol.10, pp.2, 2011, https://doi.org/10.15207/jkcs.2019.10.2.007