Browse > Article
http://dx.doi.org/10.3837/tiis.2011.10.006

A Practical Implementation of Fuzzy Fingerprint Vault  

Lee, Sun-Gju (Department of Computer and Information Science, Korea University)
Chung, Yong-Wha (Department of Computer and Information Science, Korea University)
Moon, Dae-Sung (ETRI Human Identification Research Team, ETRI)
Pan, Sung-Bum (Department of Control, Instrumentation and Robot Engineering, Chosun University)
Seo, Chang-Ho (Department of Applied Mathematics, Kongju National University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.5, no.10, 2011 , pp. 1783-1798 More about this Journal
Abstract
Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.
Keywords
Information security; fingerprint recognition; internet banking/home networking; fuzzy fingerprint vault; correlation attack;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 0
연도 인용수 순위
1 S. Lee, et al., "Memory-Efficient Fuzzy Fingerprint Vault Based on the Geometric Hashing," in Proc. of ISA, pp. 312-315, 2008.
2 S. Chae, S. Lim, S. Bae, Y. Chung, and S. Pan, "Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing," KSII Tr. Internet & Info Systems, vol. 4, no. 6, pp. 1294-1310, 2010.
3 E. Berlekamp, Algebraic Coding Theory, McGraw-Hill, New York, 1968. (Revised edition, Laguna Hills: Aegean Park Press, 1984.
4 V. Guruswami and M. Sudan, "Improved Decoding of Reed-Solomon and Algebraic Geometric Codes," in Proc. of FOCS, pp. 28-39, 1998.
5 S. Gao, "A New Algorithm for Decoding Reed-Solomon Codes," Communications, Information and Network Security, pp. 55-68, Kluwer Academic Press, 2003.
6 N. Ratha and R. Bolle, "Automatic Fingerprint Recognition Systems," Springer, 2004.
7 T. Hopper, C. Brislawn, J. Bradley, "WSQ Gray-Scale Fingerprint Image Compression Specification," Federal Bureau of Investigation, Document No. IAFIS-IC-0110 (v2), 1993.
8 Y. Wang, J. Hu, and D. Philip, "A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and its Application to Singular-point Detection and Fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007.   DOI
9 K. Xi and J. Hu. "Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault," in Proc. of IEEE ICC, 2009.
10 P. Zhang, J. Hu, C. Li, M. Bennamound, and V. Bhagavatulae, "A Pitfall in Fingerprint Bio-Cryptographic Key Generation," Computers and Security, Elsevier, 2011.
11 H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, vol. 4, pp. 10-21, Oct.-Dec. 1997.
12 J. Hu, "Mobile Fingerprint Template Protection: Progress and Open Issues," in Proc. of IEEE ICIEA Conference, pp. 3-5, 2008.
13 http://bias.csr.unibo.it/fvc2002/databases.asp. Sungju
14 D. Maltoni, et al., Handbook of Fingerprint Recognition, 2003.
15 R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, vol. 35, pp. 2727-2738, 2002.   DOI
16 B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, vol. 42, no, 8, pp. 136, 1999.   DOI
17 S. Prabhakar, et al., "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003.
18 A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002.
19 U. Uludag, et al., "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-based Biometric Person Authentication, pp. 310-319, 2005.
20 T. Clancy, et al., "Secure Smartcard-based Fingerprint Authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-522003.,
21 K. Nandakumar, et al., "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007.   DOI
22 S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005.
23 Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS 3822, pp. 358-369, 2005.
24 D. Moon, et al., "Fingerprint Template Protection Using Fuzzy Vault," LNCS 4707, pp.1141-1151, 2007.
25 D. Moon, et al., "Configurable Fuzzy Fingerprint Vault for Match-on-Card System," IEICE Electron Express, vol. 6, no. 14, pp. 993-999, 2009.   DOI
26 S. Shin, M. Lee, D. Moon, and K. Moon, "Dictionary Attack on Functional Transform-based Cancelable Fingerprint Templates," ETRI Journal, vol. 31, no. 5, pp. 628-630, 2009.   DOI
27 D. Socek, D. Culibrk, and V. Bozovic, "Issues and Challenges in Storing Biometric Templates Securely," in Proc. of CRISIS, pp. 75-81, 2007.
28 W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, 2007.
29 A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack against the Fuzzy Vault Scheme," in Proc. of SPIE, vol. 6819, pp. 68190O.1-68190O.7, 2008.
30 R. Rivest, et al., "Chaffing and Winnowing: Confidentiality without Encryption," http://theory.lcs.mit.edu/-rivest/chaffing.txt, 1998.