DOI QR코드

DOI QR Code

Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing

  • Chae, Seung-Hoon (Dept. of Information and Communication Engineering, Chosun Univ.) ;
  • Lim, Sung-Jin (Dept. of Information and Communication Engineering, Chosun Univ.) ;
  • Bae, Sang-Hyun (Dept. of Computer Science and Statistics, Chosun Univ.) ;
  • Chung, Yong-Wha (Dept. of Computer and Information Science, Korea Univ.) ;
  • Pan, Sung-Bum (Dept. of Information and Communication Engineering, Chosun Univ)
  • Received : 2010.05.24
  • Accepted : 2010.10.07
  • Published : 2010.12.23

Abstract

User authentication using fingerprint information provides convenience as well as strong security. However, serious problems may occur if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers. Recently, research in fuzzy fingerprint vault system has been carried out actively to safely protect fingerprint information in a fingerprint authentication system. In addition, research to solve the fingerprint alignment problem by applying a geometric hashing technique has also been carried out. In this paper, we propose the hardware architecture for a geometric hashing based fuzzy fingerprint vault system that consists of the software module and hardware module. The hardware module performs the matching for the transformed minutiae in the enrollment hash table and verification hash table. On the other hand, the software module is responsible for hardware feature extraction. We also propose the hardware architecture which parallel processing technique is applied for high speed processing. Based on the experimental results, we confirmed that execution time for the proposed hardware architecture was 0.24 second when number of real minutiae was 36 and number of chaff minutiae was 200, whereas that of the software solution was 1.13 second. For the same condition, execution time of the hardware architecture which parallel processing technique was applied was 0.01 second. Note that the proposed hardware architecture can achieve a speed-up of close to 100 times compared to a software based solution.

Keywords

References

  1. W. Stallings, Cryptography and Network Security, Pearson Ed. Inc., 2003.
  2. S. Prabhakar, S. Pankanti and A. Jain, "Biometric recognition: security and privacy concerns," in Proc. of IEEE Security and Privacy, vol. 1, no. 2, pp. 33-42, 2003. https://doi.org/10.1109/MSECP.2003.1193209
  3. K. Y. Shin, B. J. Kang and K. R. Park, "Super-resolution iris image restoration using single image for iris recognition," in Proc. of Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 117-137, 2010.
  4. D. Maltoni, D. Maio, A.K. Jain and S.Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
  5. R. Bolle, J. Connell and N. Ratha, "Biometric perils and patches," in Proc. of the Pattern Recognition, vol. 35, pp. 2727-2738, 2002. https://doi.org/10.1016/S0031-3203(01)00247-3
  6. B. Schneier, "The uses and abuses of biometrics," in Proc. of the Communications of the ACM, vol. 42, no. 8, pp. 136, 1999. https://doi.org/10.1145/310930.310988
  7. A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002.
  8. T. Clancy, N. Kiyavash and D. Lin, "Secure smartcard-based fingerprint authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-52, 2003.
  9. U. Uludag, S. Pankanti and A. Jain, "Fuzzy vault for fingerprints," LNCS 3546, pp. 310-319, 2005.
  10. Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim and D. Ahn, "Automatic alignment of fingerprint features for fuzzy fingerprint vault," LNCS 3822, pp. 358-369, 2005.
  11. D. Moon, S. Lee, Y. Chung, S. B. Pan and K. Moon, "Implementation of automatic fuzzy fingerprint vault," in Proc. of the Machine Learning and Cybernetics, vol. 7, pp. 3781-3786, 2008.
  12. D. Moon, S. Lee, S. Jung, Y. Chung, M. Park and O. Yi, "Fingerprint template protection using fuzzy vault," LNCS 4707, pp. 1141-1151, 2007.
  13. Y. Chung, D. Moon, S. Pan, M. Kim and K. Kim, "A hardware implementation of fingerprint verification for secure biometric authentication," LNCS 3212, pp. 770-777, 2004.
  14. H. Wolfson and I. Rigoutsos, "Geometric hashing: an overview," in Proc. of the IEEE Computational Science and Engineering, vol. 4, no. 4, pp. 10-21, 1997. https://doi.org/10.1109/99.641604
  15. W. Scheirer and T. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conf., pp. 1-16, 2007.
  16. [16] K. Nandakumar, A. Nagar and A. K. Jain, "Hardening fingerprint fuzzy vault using password," LNCS 4642, pp. 927-937, 2007.
  17. P. Li, x. Yang, K. Cao, P. shi and J. Tian, "Security-enhanced fuzzy fingerprint vault based on minutiae's local ridge information," LNCS 5558, pp. 930-939, 2009.
  18. A. Juels and M, Wattenberg, "A fuzzy commitment scheme," in Proc. of ACM Conf. on Computer and Comm. Security, pp. 28-36, 1999.
  19. Y. Lamdan and H. Wolfson, "Geometric hashing: A general and efficient model-based recognition scheme," in Proc. of 2nd International Conf. Computer Vision, pp. 238-249, 1998.
  20. Y. Wang, J. Hu and D. Philips, "A fingerprint orientation model based on 2D Fourier Expansion (FOMFE) and its application to singular-point detection and fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007. https://doi.org/10.1109/TPAMI.2007.1003
  21. S. Lim, S. Chae, D. Moon, Y. Chung, N. Lee and S. B. Pan "VLSI architecture for the fuzzy fingerprint vault with automatic alignment module," in Proc. International Conf. FGCN, vol. 56, pp. 470-476, 2009.