Skip to main content

Private Fingerprint Verification without Local Storage

  • Conference paper
Book cover Biometric Authentication (ICBA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3072))

Included in the following conference series:

Abstract

We describe a protocol to solve the problem of comparing fingerprints without actually exchanging them. We extend this to private verification where the verifier does not obtain fingerprint information. We show that no substantial information is leaked to the other party even during multiple protocol runs and present evaluation results from a prototype implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, McGraw-Hill Publishers, New York (1999)

    Google Scholar 

  2. Cambier, J.L., von Seelen, U.C., Braithwaite, M., Moore, R., Glass, R., Scott, I.: Application-Dependent Biometric Templates BC14. In: The Biometric Consortium Conference (2002)

    Google Scholar 

  3. Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic Fingerprint-image Generation. In: ICPR 2000, Proceedings International Conference on Pattern Recognition (2000)

    Google Scholar 

  4. Davida, G.I., Matt, B.J., Peralta, R., Frankel, Y.: On the relation of error correction and cryptography to an off line biometric based identification scheme. In: WCC 1999, Workshop on Coding and Cryptography (1999)

    Google Scholar 

  5. Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: ACMCCS 2000, 7th ACM Conference on Computer and Communications Security, The First Workshop on Security and Privacy in ECommerce (2000)

    Google Scholar 

  6. Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure Multiparty Computation of Approximations. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 927–938. Springer, Heidelberg (2001) (Extended Abstract)

    Chapter  Google Scholar 

  7. Goldreich, O.: Secure Multi-Party Computation (2002) (manuscript), http://www.wisdom.weizmann.ac.il/oded/pp.html

  8. Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28(2) (1984)

    Google Scholar 

  9. Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 302–314 (1997)

    Article  Google Scholar 

  10. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: CCS1999, Proc. of the 6th ACM Conference on Computer and Communications Security (1999)

    Google Scholar 

  11. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ”Gummy” Fingers on Fingerprint Systems. In: SPIE. Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 (2002)

    Google Scholar 

  12. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402–412 (2002)

    Article  Google Scholar 

  13. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: ICPR 2002, Proc. of International Conference on Pattern Recognition (2002)

    Google Scholar 

  14. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, June 2003. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  15. Prabhakar, S., Jain, A.K., Pankanti, S.: Learning Fingerprint Minutiae Location and Type. Pattern Recognition 36(8), 1847–1857 (2003)

    Article  Google Scholar 

  16. Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  17. Ross, A., Jain, A.K., Reisman, J.: A Hybrid Fingerprint Matcher. In: Proc. of International Conference on Pattern Recognition (ICPR), vol. 3, pp. 795–798 (2002)

    Google Scholar 

  18. Yao, A.: Protocols for Secure Computations. In: FOCS 1982, Proc. of the Twenty-third IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kerschbaum, F., Atallah, M.J., M’Raïhi, D., Rice, J.R. (2004). Private Fingerprint Verification without Local Storage. In: Zhang, D., Jain, A.K. (eds) Biometric Authentication. ICBA 2004. Lecture Notes in Computer Science, vol 3072. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25948-0_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25948-0_54

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22146-3

  • Online ISBN: 978-3-540-25948-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics