Skip to main content

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10726))

Included in the following conference series:

  • 1155 Accesses

Abstract

Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in mobile phones connected to Internet-of-Things. Among various biometrics, fingerprints are one used most widely. A promising type of secure cryptosystems based on fingerprints is the so called fuzzy fingerprint vaults which can bind a secret key to one fingerprint template and release the same key later with the help of a similar but not necessarily fully identical fingerprint template. However, some aspects such as the security and matching accuracy of existing fingerprint-based fuzzy vaults are still not satisfactory due to troublesome issues such as the alignment of fingerprints and minutiae quantization.

In this paper we propose a modified fuzzy fingerprint vault based on pair-polar minutiae structures, aiming at achieving better performance. Recall that Li et al. (2016) presented a fuzzy vault based on pair-polar minutiae structures with two-level secure sketch in recovering the secret key. Unlike their scheme, we compress the two-level structure into one level in which minutia descriptors are exploited to match a vault and thus lower the time complexity of decoding. Our experiment evaluation shows that the proposed fuzzy fingerprint vault achieves high matching accuracy. Importantly, our vault is of strong security against existing attacks such as the brute-force attack, false-accept attack and correlation attack. Also this vault adopts the polynomial representation introduced by Dodis and Reyzin (2006) which is thus able to reduce the storage complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 760–769. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_80

    Chapter  Google Scholar 

  2. Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433–1445 (2013)

    Article  Google Scholar 

  3. Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005). https://doi.org/10.1007/11599548_31

    Chapter  Google Scholar 

  4. Charles Clancy, T., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM Sigmm Workshop on Biometrics Methods and Applications, pp. 45–52 (2003)

    Google Scholar 

  5. Dodis, Y., Reyzin, L.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  6. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, p. 408 (2002)

    Google Scholar 

  7. Kholmatov, A., Yanikoglu, B.A.: Realization of correlation attack against the fuzzy vault scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)

    Google Scholar 

  8. Li, C., Hu, J.: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11(3), 543–555 (2016)

    Article  Google Scholar 

  9. Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-enhanced fuzzy fingerprint vault based on minutiae’s local ridge information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01793-3_94

    Chapter  Google Scholar 

  10. Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33(3), 207–220 (2010)

    Article  Google Scholar 

  11. Liu, E., Zhao, H., Liang, J., Pang, L., Xie, M., Chen, H., Li, Y., Li, P., Tian, J.: A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recogn. Lett. 32(5), 666–675 (2011)

    Article  Google Scholar 

  12. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L.: Fvc 2002: second fingerprint verification competition. In: 16th International Conference on Pattern Recognition, p. 30811 (2002)

    Google Scholar 

  13. Merkle, J., Tams, B.: Security of the improved fuzzy vault scheme in the presence of record multiplicity (full version). Computer Science (2013)

    Google Scholar 

  14. Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: International Conference on Pattern Recognition, pp. 1–4 (2009)

    Google Scholar 

  15. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)

    Article  Google Scholar 

  16. Neurotechnology. Verifinger 9.0. (2016). http://www.neurotechnology.com/verifinger.html

  17. Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, pp. 1–6 (2007)

    Google Scholar 

  18. Tams, B., Merkle, J., Rathgeb, C., Wagner, J.: Improved fuzzy vault scheme for alignment-free fingerprint features. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2015)

    Google Scholar 

  19. Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2013)

    Google Scholar 

  20. Tams, B.: Attacks and countermeasures in fingerprint based biometric cryptosystems. Eprint Arxiv (2013)

    Google Scholar 

  21. Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. Iet Biometrics 5(3), 170–180 (2015)

    Article  Google Scholar 

  22. Tams, B., Mihilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015)

    Article  Google Scholar 

  23. Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 25(8), 1009–1014 (2003)

    Article  Google Scholar 

  24. Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop on Privacy Research in Vision, p. 163 (2006)

    Google Scholar 

  25. Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, pp. 609–612 (2005)

    Google Scholar 

  26. Yang, W., Jiankun, H., Wang, S.: A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9(7), 1179–1192 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

We are grateful to the reviewers of Inscrypt 2017 for their useful comments. This work is supported by Research Fund of Ministry of Education of China and China Mobile (Grant No. MCM20150301).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiangmin Li , Ning Ding or Dawu Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, X. et al. (2018). A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. In: Chen, X., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2017. Lecture Notes in Computer Science(), vol 10726. Springer, Cham. https://doi.org/10.1007/978-3-319-75160-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75160-3_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75159-7

  • Online ISBN: 978-3-319-75160-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics