Skip to main content

Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

  • Conference paper
Information Security Applications (WISA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Included in the following conference series:

Abstract

Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user’s data stored in different databases. In this paper, we propose an approach for cancelable fingerprint templates by using the idea of fuzzy vault. By integrating the fuzzy fingerprint vault with the existing password-based authentication system, we can use a different “long and random” password for each application, and the fuzzy fingerprint vault can be changed by simply changing the password.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  2. Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  3. Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33-42 (2003)

    Google Scholar 

  4. Moon, D., et al.: An Efficient Selective Encryption of Fingerprint Images for Embedded Processors. ETRI Journal 28(4), 444–452 (2006)

    Google Scholar 

  5. Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges: Principals and Practice. Proc. of IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  6. Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)

    Article  Google Scholar 

  7. Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82. ACM Press, New York (1999)

    Chapter  Google Scholar 

  8. Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)

    Google Scholar 

  9. Ratha, N., Connel, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  10. Cambier, J., et al.: Application-Specific Biometric Templates. In: Proc. of AutoID, pp. 167–171 (2002)

    Google Scholar 

  11. Ang, R., Safavi-Naini, R., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)

    Google Scholar 

  12. Savvides, M., Kumar, B., Khosla, P.: Cancelable Biometric Filters for Face Recognition. In: Proc. of ICPR, pp. 922–925 (2004)

    Google Scholar 

  13. Soutar, C., et al.: Biometric Encryption – Enrollment and Verification Procedures. In: Proc. SPIE, vol. 3386, pp. 24–35 (1998)

    Google Scholar 

  14. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)

    Google Scholar 

  15. Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentication. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52. ACM Press, New York (2003)

    Google Scholar 

  16. Uludag, U., Pankanti, S., Jain, A.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Google Scholar 

  17. Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)

    Article  Google Scholar 

  18. Jain, A.K., Hong, L., Pankanti, S., Bolle, R.: An Identity Authentication System using Fingerprints. Proceedings of the IEEE 85(9), 1365–1388 (1997)

    Article  Google Scholar 

  19. Chung, Y., et al.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  20. Ahn, D., et al.: Specification of ETRI Fingerprint Database (in Korean). Technical Report – ETRI (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Moon, D. et al. (2007). Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics