Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.2.33

Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault  

Choi, Woo-Yong (Electronics and Telecommunications Research Institute)
Lee, Sung-Ju (Korea University)
Chung, Yong-Wha (Korea University)
Moon, Ki-Young (Electronics and Telecommunications Research Institute)
Abstract
Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics stores a non - invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. In this paper, we proposed the fast polynomial reconstruction algorithm for fuzzy fingerprint vault. The proposed method needs (k+1) real points to reconstruct the polynomial of degree (k-1). It enhances the speed, however, by $300{\sim}1500$ times according to the degree of polynomial compared with the exhaust search.
Keywords
Crypto-biometrics; fuzzy vault; fingerprint recognition; polynomial reconstruction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A Juels, M. Sudan, "A Fuzzy Vault Scheme," Proc. IEEE International Symposium on Information Theory, pp. 408-409, 2002
2 K. Nandakumar, A Jain, S. Pankanti, "Fingerprint- based Fuzzy Vault: Implementation and Performance," IEEE Trans. Information Forensics and Security, 2(4), pp. 744-757, Dec. 2007   DOI   ScienceOn
3 Q. Li, X. Niu, Z. Wang, Y. Jiao, S. Sun, "A Verifiable Fingerprint Vault Scheme," Proc. International Conference on Knowledge-Based & Intelligent Information & Engineering Systems, vol. 9, pp. 1072-1078, Sep. 2005
4 Q. Li, Z. Liu, and X. Niu, "Analysis and Problems on Fuzzy Vault Scheme," Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 244-250, Dec. 2006
5 E. Chang, R. Shen, F. Teo, "Finding the Original Point Set Hidden Among Chaff," Proc. ACM Symposium on Information, Computer and Communications Security, pp. 182-188, Mar. 2006
6 http://bias.csr.unibo.it/fvc2002/databases.asp
7 U. Uludag, S. Pankanti, A.K. Jain, "Fuzzy Vault for Fingerprints," Proc. Audio-and Video-based Biometric Person Authentication, vol. 5, pp. 310-319, Jul. 2005
8 H. Wolfson, I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, 4(4), pp. 10-21, Oct.-Dec. 1997
9 Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, D. Ahn, "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," Proc. Conference on Information Security and Cryptology, vol. 1, pp. 358-369, 2005