Secure Fingerprint Matching with External Registration

نویسندگان

  • James Reisman
  • Umut Uludag
  • Arun Ross
چکیده

Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) systems. However, the increased deployment of biometric systems in several commercial and government applications has raised questions about the security of the biometric system itself. Since the biometric traits of a user cannot be replaced if compromised, it is imperative that these systems are suitably secure in order to protect the privacy of the user as well as the integrity of the overall system. In this paper, we first investigate several methods that have been proposed in the literature to increase the security of the templates residing in a biometric system. We next propose a novel fingerprint matching architecture for resource-constrained devices (e.g., smart cards) that ensures the security of the minutiae templates present in the device. Experimental results describing the impact of several system parameters on the matching performance as well as the computational and storage costs are provided. The proposed architecture is shown to enhance the security of the minutiae templates while maintaining the overall matching performance of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Secure Computation of Fingerprint Alignment and Matching

Secure computation with biometric data is a challenging topic and attention to this area has grown during recent years. This is because biometric data is highly sensitive and requires protection when used in a variety of applications including biometric verification and identification. Fingerprint images are one of the most accurate type of biometry used in these applications and they are highl...

متن کامل

A Robust Biometric Authentication and PIN Distribution Technique for Secure Mobile Commerce Applications

In a mobile emerging world, user authentication, service provider authentication and security is very important in mobile commerce. User authentication is performed by using fingerprint based biometric methodology. Existing system used for Mobile purchasing/payment services in handheld devices does not analyze fingerprint matching and feature extraction techniques in an efficient way. Also the ...

متن کامل

Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter

Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression condit...

متن کامل

A Fingerprint Matching Algorithm with Registration Pattern Inspection

The “registration pattern” between two fingerprints is the optimal registration of each part of one fingerprint with respect to the other fingerprint. Registration patterns generated from imposter’s matching attempts are different from those patterns from genuine matching attempts, although they may share some similarities in the aspect of minutiae. This paper presents an algorithm that utilize...

متن کامل

Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification

The increasing availability and use of biometric data leads to situations when sensitive biometric data is to be handled by entities who may not be fully trusted or otherwise are not authorized to have full access to such data. This calls for mechanisms of provably protecting biometric data while still allowing the computation to take place. Our focus is on privacy-preserving matching of two fi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005