Skip to main content

Fingerprints Hashing

  • Reference work entry
Encyclopedia of Biometrics

Synonyms

Biometric encryption; Cancelable biometrics; Fingerprint encryption; Fuzzy extractor; Fuzzy vault; Intricated biometrics

Definition

Fingerprint hashing is merging fingerprint recognition and cryptographic methods. The aim is to perform a recognition using fingerprint while, at the same time, hiding the private information related to the fingerprint, thus enabling public fingerprint templates.

Introduction

Keeping a database in a safe place is not easy. Even with good encryption methods and special care, databases containing sensitive information, such as bank account numbers, are vulnerable to being compromised. Nobody wants something like that to happen when dealing with fingerprint identification.

Security of a fingerprint-based system can be divided into two main areas:

  1. 1.

    The electronic security, which poses the question: “Is the electronic system, at the other end of the wires, a real trustful authorized fingerprint system?”

  2. 2.

    The liveness security, which asks a...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cavoukian, A., Stoianov, A.: Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. White paper, Information and privacy commissioner of Ontario, March (2007)

    Google Scholar 

  2. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption, chap. 22, McGraw-Hill (1999)

    Google Scholar 

  3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  4. Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an off-line biometric based identification scheme. In: Proceedings of the Workshop on Coding and Cryptography, Paris, France, pp. 129–138 (1999)

    Google Scholar 

  5. Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, UK, pp. 393–402 (2003)

    Google Scholar 

  6. Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recognit. 40, 1057–4065 (2007)

    Article  MATH  Google Scholar 

  7. Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable Fingerprint Biotokens: Accuracy and Security Analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’07), Minneapolis, USA, pp. 1–8, 17–22 June (2007)

    Google Scholar 

  8. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of the Eurocrypt 2004, pp. 523–540 (2004)

    Google Scholar 

  9. Burnett, A., Byrne, F., Dowling, T., Dury, A.: A biometric identity based signature scheme. In: Proceedings of the Applied Cryptography and Network Security Conference, New York, USA (2005)

    Google Scholar 

  10. Costanzo, C.R.: Biometric cryptography: Key generation using feature and parametric aggregation. Online techreport, School of Engineering and Applied Sciences, Department of Computer Science, The George Washington University, October (2004)

    Google Scholar 

  11. Al-Tarawneh, M.S., Khor, L.C., Woo, W.L., Dlay, S.S.: Crypto key generation using contour graph algorithm. In: Proceedings of the 24th IASTED International Multi-Conference Signal Processing, Pattern Recognition and Applications, Insbruck, Austria, February (2005)

    Google Scholar 

  12. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceedings of the IEEE International Symposium on Information Theory, p. 408. IEEE Press (2002)

    Google Scholar 

  13. Chang, E.-C., Li, Q.: Hiding secret points amidst Chaff. In: Proceedings of the Eurocrypt, Saint Petersburg, Russia (2006)

    Google Scholar 

  14. Zheng, G., Li, W., Zhan, C.: Cryptographic key generation from biometric data using lattice mapping. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR’06), Washington, DC, USA, pp. 513–516. IEEE Computer Society (2006)

    Google Scholar 

  15. Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings on Workshop: Biometrics: Challenges Arising from Theory to Practice, August 2004, pp. 13–16 (2004)

    Google Scholar 

  16. Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault with helper data. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163–170 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Mainguet, JF. (2009). Fingerprints Hashing. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_60

Download citation

Publish with us

Policies and ethics