Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.1.11

A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault  

Lee, Sung-Ju (Korea University)
Moon, Dae-Sung (ETRI)
Kim, Hak-Jae (Korea University)
Yi, Ok-Yeon (Kookmin University)
Chung, Yong-Wha (Korea University)
Abstract
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, the previous results had some limitation of the provided security due to the limited numbers of chaff data fer hiding real fingerprint data. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vault can perform the fingerprint verification securely even with more chaff data included.
Keywords
지문인식;퍼지볼트;기하학적 해싱;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Ratha, J. Connel, and R. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001   DOI   ScienceOn
2 C. Soutar, et al., "Biometric Encryption - Enrollment and Verification Procedures," Proc. SPIE, Vol. 3386, pp. 24-35, 1998
3 A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Proc. of Symp. on Information Theory, pp. 408, 2002
4 T. Clancy, N. Kiyavash, and D. Lin, "Secure Smartcard-based Fingerprint Authentication," Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-52, 2003
5 U. Uludag, S. Pankanti, and A. Jain, "Fuzzy Vault for Fingerprints," LNCS 3546 - Proc. of AVBPA, pp. 310-319, 2005
6 H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, Vol. 4, pp. 10-21, Oct.-Dec. 1997
7 D. Ahn, et al., "Specification of ETRI Fingerprint Database(in Korean)," Technical Report - ETRI, 2002
8 C. Ellison, et al., "Protecting Secret Keys with Personal Entropy," Future Generation Computer Systems, Vol. 16, pp. 311-318, 2000   DOI   ScienceOn
9 J. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," LNCS 2688 - Proc. of AVBPA, pp. 393-402, 2003
10 F. Monrose, M. Reiter, and S. Wetzel, "Password Hardening based on Keystroke Dynamics," Proc. of ACM Conf. on Computer and Comm. Security, pp. 73-82, 1999
11 G. Davida, Y. Frankel, and B. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," Proc. of Symp. on Privacy and Security, pp. 148-157, 1998
12 Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS - 3822 Proc. of CISC, pp. 358-369, 2005
13 W. Stallings, Cryptography and Network Security, Pearson Ed. Inc., 2003
14 R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, Vol. 35, pp. 2727-2738, 2002   DOI   ScienceOn
15 S. Prabhakar, S. Pankanti, and A. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003
16 D. Maltoni, et al., Handbook of Fingerprint Recognition, Springer, 2003
17 S. Yang and I. Verbauwhede, "Secure Fuzzy Vault based fingerprint verification system," IEEE Signals, Systems and Computers, Vol. 1, pp. 557-581, 2004
18 A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. of ACM Conf. on Computer and Comm. Security, pp. 28-36, 1999
19 B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, Vol. 42, No, 8, pp. 136, 1999   DOI
20 D. Maio and D. Maltoni, "A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption," Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519-525, 1999
21 Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," LNCS 3027 - Proc. of EuroCrypt, pp. 523-540, 2004
22 U. Uludag, et al., "Biometric Cryptosystems: Issues and Challenges," Proc. of IEEE, Vol. 92, No. 6, pp. 948-960, 2004   DOI   ScienceOn
23 V. Matyas and Z. Riha, "Biometric Authentication Systems," TR Ecom- Monitor. Com, 2000