Skip to main content

Cancelable Key-Based Fingerprint Templates

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3574))

Abstract

Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user’s data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key–dependent geometric transform that is applied to the features extracted from a fingerprint, to generate a key–dependent cancelable template for the fingerprint. We investigate performance of an authentication system that uses this cancelable fingerprint when a fingerprint matching algorithm is used for detection. We evaluate performance of the system and show the challenges of achieving good performance if the matching algorithm is not modified.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Araque, J., Baena, M., Vizcaya, P.: Synthesis of fingerprint images. In: Proceedings of the 16th International Conference on Pattern Recognition, vol. II, pp. 422–425 (2002)

    Google Scholar 

  2. Bolle, R.M., Senior, A.W., Ratha, N.K., Pankanti, S.: Fingerprint minutiae: A constructive definition. Biometric Authentication, 58–62 (2002)

    Google Scholar 

  3. Clancy, T., Lin, D., Kiyavash, N.: Secure smartcard–based fingerprint Authentication. In: ACM Workshop on Biometric Methods and Applications, pp. 45–52 (2003)

    Google Scholar 

  4. Garris, M., Watson, C., McCabe, R., Wilson, C.: Users guide to NIST fingerprint image software. NIST (2001)

    Google Scholar 

  5. Hill, C.: Risk of masquerade arising from the storage of biometrics. Honours thesis, ANU (2001), http://chris.fornax.net/download/thesis/thesis.pdf

  6. Jiang, X., Yau, W.: Fingerprint Minutiae Matching Based on the Local And Global Structures. In: Proceedings of the 15th International Conference on Pattern Recognition, vol. II, pp. 6038–6041 (2000)

    Google Scholar 

  7. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory, p. 408 (2002)

    Google Scholar 

  8. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security, pp. 28–36 (1999)

    Google Scholar 

  9. Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)

    MATH  Google Scholar 

  10. O’Gorman, L.: ‘Practical systems for personal fingerprint authentication. IEEE Computer 33(2), 58–60 (2000)

    Google Scholar 

  11. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics–based authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  12. VeriFinger. Neurotechnologija Ltd., http://www.neurotechnologija.com

  13. Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric Hash based on Statistical Features of Online Signatures. In: Proceedings of the 16th International Conference on Pattern Recognition, vol. I, pp. 123–126 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ang, R., Safavi-Naini, R., McAven, L. (2005). Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_21

Download citation

  • DOI: https://doi.org/10.1007/11506157_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26547-4

  • Online ISBN: 978-3-540-31684-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics