Browse > Article
http://dx.doi.org/10.5391/IJFIS.2011.11.4.286

RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates  

Lee, Dae-Jong (College of Electrical & Computer Engineering, Chungbuk National University)
Shin, Yong-Nyuo (Department of Computer Engineering, Hanyangcyber University)
Park, Seon-Hong (College of Electrical & Computer Engineering, Chungbuk National University)
Chun, Myung-Geun (College of Electrical & Computer Engineering, Chungbuk National University)
Publication Information
International Journal of Fuzzy Logic and Intelligent Systems / v.11, no.4, 2011 , pp. 286-292 More about this Journal
Abstract
Biometrics systems are used in a wide range of areas, including the area of crime prevention, due to their unique characteristics. However, serious problems can occur if biometric information is disclosed to an unauthorized user. To address these issues, this paper proposes a real valued fuzzy vault method, which adopts a real number error correction code to implement a fuzzy vault scheme for protecting fingerprint temples. The proposed method provides the benefit of allowing the private key value to be changed at any time, unlike biometric template such as a fingerprint, which is not easily renewable even if its security has been breached. The validity of the proposed method is verified for fingerprint verification.
Keywords
Fuzzy vault; RN-ECC; Fingerprint recognition; Biometrics; Information security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Chikkerur S., Govindaraju V. and Alexander N. Cartwright, "K-plet and Coupled BFS: A Graph-Based Fingerprint Representation and Matching Algorithm," Lecture Notes in Computer Science, Vol. 3832, pp. 309-315, 2006.
2 Asker M. Bazen and Sabih H. Gerez., "Fingerprint matching by thin-plate spline modeling of elastic deformations," Pattern Recognition, Vol. 36, pp. 1859-1867, 2003.   DOI   ScienceOn
3 Mi Kyeong You, Man-Jun Kwon, Sang Ho Lee and Myung Geun Chun, "Secure Binding of Identity Reference and Biometric Reference" Journal of Korean Institute of Intelligent Systems, Vol, 20, No. 5, pp. 610-616, 2010.   과학기술학회마을   DOI   ScienceOn
4 Y. Shin, M. Kwon, Y. lee, J. Park, and M. Chun, "Biometric and Identity Reference Protection," Journal of Korean Institute of Intelligent Systems, Vol, 19, No. 2, pp. 160-167, 2009.   과학기술학회마을   DOI   ScienceOn
5 N. Karthik, A. Jain, "Fingerprint-based fuzzy vault: implementation and performance," IEEE Trans on Information Forensics and Securities, Vol. 2, 2007.
6 A. Teoh, Y. Kuan, S. LEE Cancellable Biometrics and Annotations on BioHash, Pattern Recognition 41, 2008
7 A. Kong and K. Cheung, D. Zhang, An Analysis of BioHashing and its invariants, Pattern Recognition 39, 2005
8 Juels A and Sudan M, "A fuzzy vault scheme," Proceeding of IEEE Int. Symposium on Information Theory, 2002.
9 P. Li and J. Tian, An alignment-free fingerprint cryptosysten based on fuzzy vault scheme, Journal of Network and Computer Applications, 2010.
10 Y. Wang and K. N. Plataniotis, "Fuzzy vault for face based cryptographic key generation," in Proc. Biometrics Symposium 2007,
11 F. Thomas, Z. Xuebing, B. Christoph, Fuzzy Vault for 3D face recognition systems, Int. Conf. on Intelligent information hiding and multimedia signal processing, 2008
12 A. Kumar and A. Makur, Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes, IEEE Trans. on Signal Processing, Vol. 58, 2010.
13 L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, A new method for generating an invariant ISIS private key based on the fuzzy vault system, IEEE Trans. on System, Man, Cybernetics, Vol. 38, 2008.
14 K. Moon, Error Correcting Code: Mathematical Methods and Algorithm, Wiley-Interscience, 2005
15 T. Marshall, Coding of real-number sequences for error correction: a digital signal processing problem, IEEE Journal of Selected Areas in Communication, Vol. SAC-2, 1984.
16 Govindaraju V., Z. Shi and J. Schneider, "Feature Extraction Using a Chain-coded Contour Representation," Int. Conf. on Audio and Video Based Biometric Person Authentication, Surrey, UK, 2003.