Abstract
Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the biometric data. Thus, even if the storage is compromised, the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user’s data stored in different databases. In this paper, we propose an approach for cancelable fingerprint templates by using the idea of fuzzy vault. By integrating the fuzzy fingerprint vault with the existing password-based authentication system, we can use a different “long and random” password for each application, and the fuzzy fingerprint vault can be changed by simply changing the password.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)
Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33-42 (2003)
Moon, D., et al.: An Efficient Selective Encryption of Fingerprint Images for Embedded Processors. ETRI Journal 28(4), 444–452 (2006)
Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges: Principals and Practice. Proc. of IEEE 92(6), 948–960 (2004)
Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)
Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82. ACM Press, New York (1999)
Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)
Ratha, N., Connel, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal 40(3), 614–634 (2001)
Cambier, J., et al.: Application-Specific Biometric Templates. In: Proc. of AutoID, pp. 167–171 (2002)
Ang, R., Safavi-Naini, R., McAven, L.: Cancelable Key-Based Fingerprint Templates. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 242–252. Springer, Heidelberg (2005)
Savvides, M., Kumar, B., Khosla, P.: Cancelable Biometric Filters for Face Recognition. In: Proc. of ICPR, pp. 922–925 (2004)
Soutar, C., et al.: Biometric Encryption – Enrollment and Verification Procedures. In: Proc. SPIE, vol. 3386, pp. 24–35 (1998)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)
Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentication. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52. ACM Press, New York (2003)
Uludag, U., Pankanti, S., Jain, A.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)
Jain, A.K., Hong, L., Pankanti, S., Bolle, R.: An Identity Authentication System using Fingerprints. Proceedings of the IEEE 85(9), 1365–1388 (1997)
Chung, Y., et al.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)
Ahn, D., et al.: Specification of ETRI Fingerprint Database (in Korean). Technical Report – ETRI (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Moon, D. et al. (2007). Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-71093-6_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71092-9
Online ISBN: 978-3-540-71093-6
eBook Packages: Computer ScienceComputer Science (R0)