Abstract
Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in mobile phones connected to Internet-of-Things. Among various biometrics, fingerprints are one used most widely. A promising type of secure cryptosystems based on fingerprints is the so called fuzzy fingerprint vaults which can bind a secret key to one fingerprint template and release the same key later with the help of a similar but not necessarily fully identical fingerprint template. However, some aspects such as the security and matching accuracy of existing fingerprint-based fuzzy vaults are still not satisfactory due to troublesome issues such as the alignment of fingerprints and minutiae quantization.
In this paper we propose a modified fuzzy fingerprint vault based on pair-polar minutiae structures, aiming at achieving better performance. Recall that Li et al. (2016) presented a fuzzy vault based on pair-polar minutiae structures with two-level secure sketch in recovering the secret key. Unlike their scheme, we compress the two-level structure into one level in which minutia descriptors are exploited to match a vault and thus lower the time complexity of decoding. Our experiment evaluation shows that the proposed fuzzy fingerprint vault achieves high matching accuracy. Importantly, our vault is of strong security against existing attacks such as the brute-force attack, false-accept attack and correlation attack. Also this vault adopts the polynomial representation introduced by Dodis and Reyzin (2006) which is thus able to reduce the storage complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 760–769. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74549-5_80
Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433–1445 (2013)
Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005). https://doi.org/10.1007/11599548_31
Charles Clancy, T., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM Sigmm Workshop on Biometrics Methods and Applications, pp. 45–52 (2003)
Dodis, Y., Reyzin, L.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2006)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, p. 408 (2002)
Kholmatov, A., Yanikoglu, B.A.: Realization of correlation attack against the fuzzy vault scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)
Li, C., Hu, J.: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11(3), 543–555 (2016)
Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-enhanced fuzzy fingerprint vault based on minutiae’s local ridge information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01793-3_94
Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33(3), 207–220 (2010)
Liu, E., Zhao, H., Liang, J., Pang, L., Xie, M., Chen, H., Li, Y., Li, P., Tian, J.: A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recogn. Lett. 32(5), 666–675 (2011)
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L.: Fvc 2002: second fingerprint verification competition. In: 16th International Conference on Pattern Recognition, p. 30811 (2002)
Merkle, J., Tams, B.: Security of the improved fuzzy vault scheme in the presence of record multiplicity (full version). Computer Science (2013)
Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: International Conference on Pattern Recognition, pp. 1–4 (2009)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
Neurotechnology. Verifinger 9.0. (2016). http://www.neurotechnology.com/verifinger.html
Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, pp. 1–6 (2007)
Tams, B., Merkle, J., Rathgeb, C., Wagner, J.: Improved fuzzy vault scheme for alignment-free fingerprint features. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2015)
Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2013)
Tams, B.: Attacks and countermeasures in fingerprint based biometric cryptosystems. Eprint Arxiv (2013)
Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. Iet Biometrics 5(3), 170–180 (2015)
Tams, B., Mihilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015)
Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 25(8), 1009–1014 (2003)
Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop on Privacy Research in Vision, p. 163 (2006)
Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, pp. 609–612 (2005)
Yang, W., Jiankun, H., Wang, S.: A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9(7), 1179–1192 (2014)
Acknowledgments
We are grateful to the reviewers of Inscrypt 2017 for their useful comments. This work is supported by Research Fund of Ministry of Education of China and China Mobile (Grant No. MCM20150301).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Li, X. et al. (2018). A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. In: Chen, X., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2017. Lecture Notes in Computer Science(), vol 10726. Springer, Cham. https://doi.org/10.1007/978-3-319-75160-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-75160-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75159-7
Online ISBN: 978-3-319-75160-3
eBook Packages: Computer ScienceComputer Science (R0)