Abstract
Recently, a large amount of security relevant systems assure the permitted access to sensible data by biometric approaches. As also the biometric data itself deserve a high degree of protection, these data are stored encrypted by so-called template protection techniques in the database. But, such an encryption impedes the comparison of two biometric data instances significantly, and therefore we need advanced approaches to apply template protection techniques for identification purposes. In this paper, we present an efficient identification solution that is based on encryped minutiae data of fingerprints, called ECEBT. We evaluate our algorithm on synthetic data concerning multiple noise effects, and on the real world biometric database FVC-2002 DB1 concerning efficiency and effectiveness.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. Des. Codes Cryptography 38(2), 237–257 (2006)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. Transactions on Information Forensics and Security 2(4), 744–757 (2007)
Merkle, J., Niesing, M., Schwaiger, M., Ihmor, H., Korte, U.: Performance of the Fuzzy Vault for Multiple Fingerprints. In: BIOSIG, pp. 57–72 (2010)
Böhm, C., Färber, I., Fries, S., Korte, U., Merkle, J., Oswald, A., Seidl, T., Wackersreuther, B., Wackersreuther, P.: Filtertechniken für geschützte biometrische Datenbanken. In: BTW, pp. 379–389 (2011)
Böhm, C., Färber, I., Fries, S., Korte, U., Merkle, J., Oswald, A., Seidl, T., Wackersreuther, B., Wackersreuther, P.: Efficient Database Techniques for Identification with Fuzzy Vault Templates. In: BIOSIG, pp. 115–126 (2011)
Needleman, S.B., Wunsch, C.D.: A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins. JMB 48(3), 443–453 (1970)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition (2009)
Reed, I.S., Solomon, G.: Polynomial Codes over Certain Finite Fields. In: SIAM, pp. 300–304 (1960)
Korte, U., Merkle, J., Niesing, M.: Datenschutzfreundliche Authentisierung mit Fingerabdrücken. Datenschutz und Datensicherheit - DuD 33(5), 289–294 (2009)
Guttman, A.: R-Trees: A Dynamic Index Structure for Spatial Searching. In: SIGMOD, pp. 47–57 (1984)
Graham, R.L.: An Efficient Algorithm for Determining the Convex Hull of a Finite Planar Set. Inf. Process. Lett. 1(4), 132–133 (1972)
Watson, C.I., Garris, M.D., Tabassi, E., Wilson, C.L., McCabe, R.M., Janet, S., Ko, K.: User’s Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology (2007)
Mihailescu, P., Munk, A., Tams, B.: The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. In: BIOSIG, pp. 43–54 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dorn, M., Wackersreuther, P., Böhm, C. (2012). Efficient Comparison of Encrypted Biometric Templates. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-32287-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32286-0
Online ISBN: 978-3-642-32287-7
eBook Packages: Computer ScienceComputer Science (R0)