Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault

نویسندگان

  • Sungju Lee
  • Daesung Moon
  • Yongwha Chung
چکیده

Recently, a cryptographic construct, called fuzzy vault, has been proposed for cryptobiometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint have been proposed. One of the solutions exploits the idea of the geometric hashing to solve the auto-alignment problem. In this paper, we analyze the feature distribution of the generated hash table as a stored fingerprint template and improve the security of the geometric hashingbased fuzzy vault by uniformly distributing the features in the stored fingerprint template. That is, after analyzing the geometric transform from the real and chaff minutiae in the fingerprint image to the generated hash table, we modify the way to add the chaff minutiae. The goals of this addition make the feature distribution of the hash table for the chaff minutiae similar to that of the real minutiae as well as the feature distribution of the fingerprint image for both types of minutiae uniform. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification more securely without a significant degradation of the verification accuracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Feature Distribution of the Fingerprint Template Generated by the Geometric Hashing-Based Fuzzy Vault

Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features, i.e., adding “chaff” minutiae into the original minutiae set. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint(i....

متن کامل

Correlation-resistant fuzzy vault for fingerprints

The fuzzy vault is one of the most popular biometric encryption schemes for protecting fingerprint data. However, its implementation faces two challenges: First, the fingerprints need to be aligned. Some publications have proposed the storage of auxiliary data to assist alignment, but these data may leak information about the biometric features. Secondly, the fuzzy vault is susceptible to attac...

متن کامل

Hardware Implementation of the Fuzzy Fingerprint Vault System

According to the number of Internet in widely use and the development of the related application, the need of security system which can protect individual information has increased. Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. However, security of biometric data is particularly important as the co...

متن کامل

A High Level System of Providing Security to the Fingerprint Template Using Bio-tokens

Fuzzy vault fingerprint Cryptosystem uses pair polar framework. In this framework the number of fake minutiae is added to the genuine minutiae to hide the original features to provide security to the template. The chaff points are placed at a distance to provide a frame work to hide the genuine features of the fingerprint template. The genuine and fake minutiae are distinguished. The implementa...

متن کامل

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vaul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2009