An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
نویسندگان
چکیده
Fuzzy vault is a practical and promising scheme, which can protect biometric templates and perform secure key management simultaneously. Alignment of the template biometric sample and the query one in the encrypted domain remains a challenging task. While implementing fuzzy fingerprint vault, the accuracy of alignment in encrypted domain cannot be ensured and the information leakage may be caused because of the alignment. In this paper, an alignment-free fingerprint cryptosystem based on fuzzy vault scheme is developed fusing the local features, known minutia descriptor and minutia local structure, which are invariant to the transformation in fingerprint capturing. Three fusion strategies are employed to integrate the two local features. Huffman coding technology is used to compress the storage volume of the minutia descriptor vault. The proposed fingerprint cryptosystem can avoid the alignment procedure and improve the performance and security of the fuzzy vault scheme at the same time. Experiments on FVC2002-DB2a and FVC2002-DB1a are conducted to show the promising performance of the proposed fingerprint cryptosystem. Security level of proposed cryptosystem will not decrease and even rise in some circumstances. The best trade-off results obtained is GAR1⁄4 92% ðFAR1⁄4 0Þ, under the 53-bit security. Despite the larger template storage expense, the proposed alignment-free fingerprint cryptosystem outperforms the minutiae-based fingerprint cryptosystems with alignment in the terms of accuracy and security. & 2009 Elsevier Ltd. All rights reserved.
منابع مشابه
Alignment-Free Fingerprint Cryptosystem Based On Multiple Fuzzy Vault and Minutia Local Structures
The popularity of biometrics and its widespread use introduces privacy risks. To mitigate these risks, solutions such as the helper-data system, fuzzy vault, fuzzy extractors, and cancelable biometrics were introduced, also known as the field of template protection. Fuzzy vault is a practical and promising scheme, which can protect biometric templates and perform secure key management simultane...
متن کاملFuzzy Fingerprint Vault
Biometrics-based authentication has the potential to eliminate illegal key exchange problem associated with traditional cryptosystems. In this paper, we explore the utilization of a fingerprint minutiae line based representation scheme in a new cryptographic construct called fuzzy vault. Minutiae variability is quantified for a fingerprint database marked by a human expert.
متن کاملA Verifiable Fingerprint Vault Scheme
By adopting a non-interactive information-theoretic secure verifiable secret sharing scheme in an unorthodox way, a verifiable fingerprint vault scheme is presented in this paper. Fuzzy vault scheme is a novel cryptographic construct which can increase the security of the biometric template in a biometric authentication system. It can be also used to bind the cryptographic key and the user in a...
متن کاملAttacks and Countermeasures in Fingerprint Based Biometric Cryptosystems
We investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they provide. We show that attacks taking advantage of the system’s false acceptance rate, i.e. false-accept attacks, pose a very serious risk — even if brute-force attacks are impractical to perform...
متن کاملAutomatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vaul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Network and Computer Applications
دوره 33 شماره
صفحات -
تاریخ انتشار 2010