Skip to main content

A Finger-Vein Based Cancellable Bio-cryptosystem

  • Conference paper
Book cover Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

Irrevocability is one major issue in existing bio-cryptosystems. In this paper, we proposed a cancellable bio-cryptosystem by taking the full advantage of cancellable and non-invertible properties of bio-hashing biometrics. Specifically, two transformed templates are generated by using the bio-hashing algorithm and applied into two different secure sketches, fuzzy commitment sketch and fuzzy vault sketch, respectively. These two secure sketches can be fused in two different ways: AND fusion and OR fusion, so as to emphasis either on the recognition accuracy or the security level of the system. Experimental results and security analysis show the validity of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mulyono, D., Jinn, H.S.: A study of finger vein biometric for personal identification. In: International Symposium on Biometrics and Security Technologies, ISBAST 2008, pp. 1–8. IEEE (2008)

    Google Scholar 

  2. Hu, J.: Mobile fingerprint template protection: progress and open issues. In: 3rd IEEE Conference on Industrial Electronics and Applications, ICIEA 2008, pp. 2133–2138. IEEE (2008)

    Google Scholar 

  3. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing 38, 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  4. Ahmad, T., Hu, J., Wang, S.: Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn. 44, 2555–2564 (2011)

    Article  Google Scholar 

  5. Zhang, P., Hu, J., Li, C., Bennamoun, M., Bhagavatula, V.: A pitfall in fingerprint bio-cryptographic key generation. Computers & Security 30, 311–319 (2011)

    Article  Google Scholar 

  6. Wang, S., Hu, J.: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn. (2012)

    Google Scholar 

  7. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614–634 (2001)

    Article  Google Scholar 

  8. Xi, K., Ahmad, T., Han, F., Hu, J.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security and Communication Networks 4, 487–499 (2011)

    Article  Google Scholar 

  9. Yang, W., Hu, J., Wang, S.: A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 66–70. IEEE (2012)

    Google Scholar 

  10. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37, 2245–2255 (2004)

    Article  Google Scholar 

  11. Vitomir, Š., Nikola, P.: The complete gabor-fisher classifier for robust face recognition. EURASIP Journal on Advances in Signal Processing (2010)

    Google Scholar 

  12. Yin, Y., Liu, L., Sun, X.: SDUMLA-HMT: a multimodal biometric database. Biometric Recognition, 260–268 (2011)

    Google Scholar 

  13. MacWilliams, F., Sloane, N.: The theory of error-correcting codes (2006)

    Google Scholar 

  14. Wang, Y., Hu, J., Phillips, D.: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Transactions on Pattern Analysis and Machine Intelligence 29, 573–585 (2007)

    Article  Google Scholar 

  15. Wang, Y., Hu, J.: Global Ridge Orientation modelling for Partial Fingerprint Identification. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 16 (2011)

    Article  Google Scholar 

  16. Xi, K., Hu, J., Han, F.: Mobile device access control: an improved correlation based face authentication scheme and its Java ME application. Concurrency and Computation: Practice and Experience 24, 1066–1085 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, W., Hu, J., Wang, S. (2013). A Finger-Vein Based Cancellable Bio-cryptosystem. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics