DOI QR코드

DOI QR Code

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng (School of Computer and Information Engineering, Fu Yang Teachers College) ;
  • Han, Bo (School of Computer and Information Engineering, Fu Yang Teachers College) ;
  • Niu, Lei (School of Computer and Information Engineering, Fu Yang Teachers College) ;
  • Wang, Ya (School of Computer and Information Engineering, Fu Yang Teachers College)
  • Received : 2016.05.27
  • Accepted : 2016.10.24
  • Published : 2017.04.30

Abstract

For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

Keywords

References

  1. Cappelli R., Lumini A., Dario, et al, "Fingerprint Image Reconstruction from Standard Template [J]," IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9):1489-1503, 2007. https://doi.org/10.1109/TPAMI.2007.1087
  2. Jain A.K., Nandakumar K., Nagar A., "Biometric Template Security [J]," EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics(1): 1-20, 2008.
  3. Yang W, Hu J,Wang S et al., "An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures [J]," Pattern Recognition, 47(3):1309-1320, 2014. https://doi.org/10.1016/j.patcog.2013.10.001
  4. Nandakumar K., Jain A.K., Pankanti S., "Fingerprint-based Fuzzy Vault: Implementation and Performance[J]," IEEE Trans. on Information Forensics and Security, 2(4): 744-757, 2007. https://doi.org/10.1109/TIFS.2007.908165
  5. Soutar C, Robege D, Stoinov A., "Biometric Encryption: enrollment and verification procedures [C]," The International Society for Optical Engineering in Optical Pattern Recognition I, Volume 3386, pp:24-35, 1998.
  6. Juels A, "Wattenberg M. A fuzzy commitment scheme[C]," in Proc. of the 6th ACM conference on Computer and communications security, New York, USA, Volume 1:28-36, 1999.
  7. Hao F., Anderson R., Daugman J., "Combining Crypto with Biometrics Effectively[J]," IEEE Trans on Computers, 55(9): 1081-1088, 2006. https://doi.org/10.1109/TC.2006.138
  8. Jeuls A, Sudan M, "A fuzzy vault scheme[C]," in Proc. of IEEE International Symposium On Information Theory. Institute of Electrical and Electronics Engineers, 38(2):237-257, 2002.
  9. Clancy T., Kiyavash N., Lin D., "Secure Smartcard-based Fingerprint Authentication[C]," in Proc. of WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, 45-52, 2003.
  10. Shenglin Yang, & Verbauwhede,I., "Automatic secure fingerprint verification system based on fuzzy vault scheme[C]," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing(ICASSP 2005),Vol.5:609-612, 2005.
  11. Uludag U., Pankanti S., Jain A.K., "Fuzzy Vault for Fingerprint[J]," Audio and Video-based Biometric Person Authentication, 92(6): 310-319, 2005.
  12. Uludag U, Jain A., "Securing fingerprint template: Fuzzy vault with helper data[C]," in Proc. of the 2006 Conference on computer Vision and Pattern Recognition Workshop(CVPRW2006), New Jersey: IEEE Computer Society, 163, 2006.
  13. Nandakumar K., Nagar A, Jain A.K., "Hardening Fingerprint Fuzzy Vault Using Password[C]," in Proc. of 2nd International Conference on Biometrics, South Korea, Lecture Notes in Computer Science, 4642,pp: 927-937, 2007.
  14. Jesse Hartloff, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju, "Security analysis for fingerprint fuzzy vaults [J]," in Proc. of SPIE-the International Society for Optical Engineering, 8712 (4).:1-11, 2013.
  15. Li P., Yang X., Cao K, et al., "An Alignment-free Fingerprint Cryptosystem Based on Fuzzy Vault Scheme[J]," Journal of Network and Computer Applications, 33 (3): 207-220 , 2010. https://doi.org/10.1016/j.jnca.2009.12.003
  16. LI Peng, TIAN Jie, "Biometric Template Protection[J]," Journal of Software, 20(6): 1553-1573, 2009. https://doi.org/10.3724/SP.J.1001.2009.03528
  17. ZHANG Rong-lin, LIU Eryun, "Improved cancelable fingerprint fuzzy vault system [J]," Journal of Xidian University, 38(4):174-179, 2011.
  18. C. Jin and H. Kim, "High-resolution orientation field estimation based on multi-scale Gaussian filter[J]," IEICE Electronics Express, 6(24):1781-1787, 2009. https://doi.org/10.1587/elex.6.1781
  19. L.Hong, Y.Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithm and Performance Evaluation," IEEE Transactions on Pattern Analysis and Machine Intelligence,20(8): 777-789, 1998. https://doi.org/10.1109/34.709565
  20. ORENCIK C., PEDERSEN T.B., SAVAS E., et al., "Securing fuzzy vault schemes through biom etric hashing[J]," Turk J Elec Eng&Comp Sci, 18(4): 515-539, 2010.
  21. Feng J., "Combining Minutiae Descriptors for Fingerprint Matching[J]," Pattern Recognition, 41 (1): 342-352,2008. https://doi.org/10.1016/j.patcog.2007.04.016