Skip to main content

Efficient Comparison of Encrypted Biometric Templates

  • Conference paper
  • 1199 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7449))

Abstract

Recently, a large amount of security relevant systems assure the permitted access to sensible data by biometric approaches. As also the biometric data itself deserve a high degree of protection, these data are stored encrypted by so-called template protection techniques in the database. But, such an encryption impedes the comparison of two biometric data instances significantly, and therefore we need advanced approaches to apply template protection techniques for identification purposes. In this paper, we present an efficient identification solution that is based on encryped minutiae data of fingerprints, called ECEBT. We evaluate our algorithm on synthetic data concerning multiple noise effects, and on the real world biometric database FVC-2002 DB1 concerning efficiency and effectiveness.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. Des. Codes Cryptography 38(2), 237–257 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  2. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  Google Scholar 

  4. Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., Korte, U.: Performance of the Fuzzy Vault for Multiple Fingerprints. In: BIOSIG, pp. 57–72 (2010)

    Google Scholar 

  5. Böhm, C., Färber, I., Fries, S., Korte, U., Merkle, J., Oswald, A., Seidl, T., Wackersreuther, B., Wackersreuther, P.: Filtertechniken für geschützte biometrische Datenbanken. In: BTW, pp. 379–389 (2011)

    Google Scholar 

  6. Böhm, C., Färber, I., Fries, S., Korte, U., Merkle, J., Oswald, A., Seidl, T., Wackersreuther, B., Wackersreuther, P.: Efficient Database Techniques for Identification with Fuzzy Vault Templates. In: BIOSIG, pp. 115–126 (2011)

    Google Scholar 

  7. Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins. JMB 48(3), 443–453 (1970)

    Article  Google Scholar 

  8. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition (2009)

    Google Scholar 

  9. Reed, I.S., Solomon, G.: Polynomial Codes over Certain Finite Fields. In: SIAM, pp. 300–304 (1960)

    Google Scholar 

  10. Korte, U., Merkle, J., Niesing, M.: Datenschutzfreundliche Authentisierung mit Fingerabdrücken. Datenschutz und Datensicherheit - DuD 33(5), 289–294 (2009)

    Article  Google Scholar 

  11. Guttman, A.: R-Trees: A Dynamic Index Structure for Spatial Searching. In: SIGMOD, pp. 47–57 (1984)

    Google Scholar 

  12. Graham, R.L.: An Efficient Algorithm for Determining the Convex Hull of a Finite Planar Set. Inf. Process. Lett. 1(4), 132–133 (1972)

    Article  MATH  Google Scholar 

  13. Watson, C.I., Garris, M.D., Tabassi, E., Wilson, C.L., McCabe, R.M., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology (2007)

    Google Scholar 

  14. Mihailescu, P., Munk, A., Tams, B.: The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. In: BIOSIG, pp. 43–54 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dorn, M., Wackersreuther, P., Böhm, C. (2012). Efficient Comparison of Encrypted Biometric Templates. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32287-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32286-0

  • Online ISBN: 978-3-642-32287-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics