Abstract
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vault can perform the fingerprint verification securely even with one thousand chaff data included.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stallings, W.: Cryptography and Network Security. Pearson Ed. Inc, London (2003)
Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)
Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. In: IEEE Security and Privacy, pp. 33–42 (2003)
Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges. Proc. of IEEE 92(6), 948–960 (2004)
Soutar, C., et al.: Biometric Encryption – Enrollment and Verification Procedures. In: Proc. SPIE, vol. 3386, pp. 24–35 (1998)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 28–36 (1999)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)
Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentication. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)
Uludag, U., Pankanti, S., Jain, A.: Fuzzy Fingerprint Vault. In: Proc. of Workshop Biometrics: Challenges arising from Theory to Practice, pp. 13–16 (2004)
Chung, Y., Moon, D.-s., Lee, S.-J., Jung, S.-H., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)
Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. In: IEEE Computational Science and Engineering, vol. 4, pp. 10–21 (1997)
Ahn, D., et al.: Specification of ETRI Fingerprint Database (in Korean). Technical Report – ETRI (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Lee, S., Moon, D., Jung, S., Chung, Y. (2007). Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds) Adaptive and Natural Computing Algorithms. ICANNGA 2007. Lecture Notes in Computer Science, vol 4432. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71629-7_49
Download citation
DOI: https://doi.org/10.1007/978-3-540-71629-7_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71590-0
Online ISBN: 978-3-540-71629-7
eBook Packages: Computer ScienceComputer Science (R0)