Abstract
We describe a protocol to solve the problem of comparing fingerprints without actually exchanging them. We extend this to private verification where the verifier does not obtain fingerprint information. We show that no substantial information is leaked to the other party even during multiple protocol runs and present evaluation results from a prototype implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, McGraw-Hill Publishers, New York (1999)
Cambier, J.L., von Seelen, U.C., Braithwaite, M., Moore, R., Glass, R., Scott, I.: Application-Dependent Biometric Templates BC14. In: The Biometric Consortium Conference (2002)
Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic Fingerprint-image Generation. In: ICPR 2000, Proceedings International Conference on Pattern Recognition (2000)
Davida, G.I., Matt, B.J., Peralta, R., Frankel, Y.: On the relation of error correction and cryptography to an off line biometric based identification scheme. In: WCC 1999, Workshop on Coding and Cryptography (1999)
Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: ACMCCS 2000, 7th ACM Conference on Computer and Communications Security, The First Workshop on Security and Privacy in ECommerce (2000)
Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure Multiparty Computation of Approximations. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 927–938. Springer, Heidelberg (2001) (Extended Abstract)
Goldreich, O.: Secure Multi-Party Computation (2002) (manuscript), http://www.wisdom.weizmann.ac.il/oded/pp.html
Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28(2) (1984)
Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 302–314 (1997)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: CCS1999, Proc. of the 6th ACM Conference on Computer and Communications Security (1999)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ”Gummy” Fingers on Fingerprint Systems. In: SPIE. Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 (2002)
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402–412 (2002)
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: ICPR 2002, Proc. of International Conference on Pattern Recognition (2002)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, June 2003. Springer, Heidelberg (2003)
Prabhakar, S., Jain, A.K., Pankanti, S.: Learning Fingerprint Minutiae Location and Type. Pattern Recognition 36(8), 1847–1857 (2003)
Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40(3), 614–634 (2001)
Ross, A., Jain, A.K., Reisman, J.: A Hybrid Fingerprint Matcher. In: Proc. of International Conference on Pattern Recognition (ICPR), vol. 3, pp. 795–798 (2002)
Yao, A.: Protocols for Secure Computations. In: FOCS 1982, Proc. of the Twenty-third IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kerschbaum, F., Atallah, M.J., M’Raïhi, D., Rice, J.R. (2004). Private Fingerprint Verification without Local Storage. In: Zhang, D., Jain, A.K. (eds) Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science, vol 3072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25948-0_54
Download citation
DOI: https://doi.org/10.1007/978-3-540-25948-0_54
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22146-3
Online ISBN: 978-3-540-25948-0
eBook Packages: Springer Book Archive