Private Fingerprint Matching
نویسندگان
چکیده
We propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private fingerprint, to find out if their fingerprints belong to the same individual. Unlike previous works, we do not make any simplifying assumption on the matching algorithm or use generic multiparty computation protocols in our constructions. We employ a commonly-used algorithm that works by first comparing minutia pairs from the two fingerprints based on their types, locations, and orientations, and then checking if the number of matching minutia pairs is more than a threshold, and we propose a concrete, scalable, and modular protocol. We prove security against honest-but-curious adversaries and discuss how security against malicious adversaries can be achieved using standard cryptographic techniques. Our protocol is realized using common cryptographic primitives and do not require pairingor lattice-based cryptography.
منابع مشابه
Secure Remote Authentication Using Fingerprint and Fuzzy Private Matching
A remote authentication scheme is proposed, which enables the use of fingerprint and fuzzy private matching protocol to achieve mutual authentication over an insecure channel. The private fingerprint template in the scheme is in the form of polynomial and is cancelable. Better performance and efficiency of the scheme than the existing schemes can be expected. In addition, the privacies of the s...
متن کاملEfficient Fingerprint Recognition Using Wavelet Transforms
Fingerprints have long been used as a reliable biometric feature for private identification. Fingerprint classification refers to the matter of assignment fingerprints to 1 of many pre specified categories. Automatic classification may be used as a pre-processing step for fingerprint matching, reducing matching time and complexness by narrowing the search area to a set of a usually large info. ...
متن کاملGenerating Cancelable Fingerprint Template Using Distortion Transformation
In a fingerprint verification system, templates are stored in the server database. To avoid the private issues in case that the database is compromised, researchers propose that only those distorted templates are stored, and they are matched also in the distorted form. If a distorted template is compromised, it can be “ cancelled” by choosing just another distortion transform. In this paper, we...
متن کاملSecure Fingerprint Alignment and Matching Protocols
We present three private fingerprint alignment and matching protocols, based on precise and efficient fingerprint recognition algorithms that use minutia points. Our protocols allow two or more semi-honest parties to compare privately-held fingerprints in a secure way such that nothing more than an accurate score of how well the fingerprints match is revealed to output recipients. To the best o...
متن کاملPrivacy-preserving Authentication Using Fingerprint
Biometrics provides us with an effective tool for authentication and is becoming a strong competitor in current authentication mechanisms. However, the concerns about biometrics regarding template security, privacy and revocability impede its further application to network-based scenarios. We propose a novel fingerprint minutiae-based scheme to achieve reliable mutual authentication over insecu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012