Abstract
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user’s data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key–dependent geometric transform that is applied to the features extracted from a fingerprint, to generate a key–dependent cancelable template for the fingerprint. We investigate performance of an authentication system that uses this cancelable fingerprint when a fingerprint matching algorithm is used for detection. We evaluate performance of the system and show the challenges of achieving good performance if the matching algorithm is not modified.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Araque, J., Baena, M., Vizcaya, P.: Synthesis of fingerprint images. In: Proceedings of the 16th International Conference on Pattern Recognition, vol. II, pp. 422–425 (2002)
Bolle, R.M., Senior, A.W., Ratha, N.K., Pankanti, S.: Fingerprint minutiae: A constructive definition. Biometric Authentication, 58–62 (2002)
Clancy, T., Lin, D., Kiyavash, N.: Secure smartcard–based fingerprint Authentication. In: ACM Workshop on Biometric Methods and Applications, pp. 45–52 (2003)
Garris, M., Watson, C., McCabe, R., Wilson, C.: Users guide to NIST fingerprint image software. NIST (2001)
Hill, C.: Risk of masquerade arising from the storage of biometrics. Honours thesis, ANU (2001), http://chris.fornax.net/download/thesis/thesis.pdf
Jiang, X., Yau, W.: Fingerprint Minutiae Matching Based on the Local And Global Structures. In: Proceedings of the 15th International Conference on Pattern Recognition, vol. II, pp. 6038–6041 (2000)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory, p. 408 (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security, pp. 28–36 (1999)
Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)
O’Gorman, L.: ‘Practical systems for personal fingerprint authentication. IEEE Computer 33(2), 58–60 (2000)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics–based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
VeriFinger. Neurotechnologija Ltd., http://www.neurotechnologija.com
Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric Hash based on Statistical Features of Online Signatures. In: Proceedings of the 16th International Conference on Pattern Recognition, vol. I, pp. 123–126 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ang, R., Safavi-Naini, R., McAven, L. (2005). Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_21
Download citation
DOI: https://doi.org/10.1007/11506157_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)