Skip to main content

Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((TLDKS,volume 8960))

Abstract

Biometrics-based authentication is playing an attractive and potential approach nowadays. However, the end-users do not feel comfortable to use it once the performance and security are not ensured. Fuzzy vault is one of the most popular methods for biometric template security. It binds a key with the biometric template and obtains the helper data. However, the main problem of fuzzy vault is that it is unable to guarantee the revocability property. In addition, most of the fuzzy vault schemes are performed on two biometrics modalities, fingerprints and iris. In previous works, authors suggested some cancelable transformations attached to a fuzzy vault scheme to overcome these weaknesses. However, the computational cost of these proposals was quite large. In this paper, we present a new hybrid scheme of fuzzy vault and periodic function-based feature transformation for biometric template protection. Our transformation is not only simpler but also suitable for many kinds of biometrics modalities. The newly proposed fuzzy vault scheme guarantees the revocability property with an acceptable error rate.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Privacy Enhancements for Inexact Biometric Templates. In: Security with Noisy Data, pp. 153–168. Springer, London (2007)

    Google Scholar 

  2. Salomon, D.: Elements of Computer Security. Springer (2010). 978-0-85729-005-2

    Google Scholar 

  3. Maio, D., Jain, A.K.: Handbook of fingerprint recognition. Springer (2009)

    Google Scholar 

  4. Clancy, T C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45–52. ACM (2003)

    Google Scholar 

  5. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  Google Scholar 

  6. Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings of Workshop Biometrics: Challenges Arising from Theory to Practice, pp. 13–16 (2004)

    Google Scholar 

  7. Lee, Y.-J., Bae, K., Lee, S.-J., Park, K.R., Kim, J.H.: Biometric key binding: Fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)

    Article  Google Scholar 

  9. Jain, A.K., Nandakumar, K, Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing 2008(113) (2008)

    Google Scholar 

  10. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Huỳnh, V.Q.P., Thai, T.T.T., Dang, T.K., Wagner, R.: A Combination of ANN and Secure Sketch for Generating Strong Biometric Key. Journal of Science and Technology, Vietnamese Academy of Science and Technology 51(4B), 203–212 (2013). ISSN 0866-708X

    Google Scholar 

  12. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)

    Google Scholar 

  13. Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  14. Vo, T.T.L., Dang, T.K., Küng, J.: A Hash-Index Method for Securing Fuzzy Vaults. In: Eckert, C., Katsikas, Sokratis K., Pernul, G. (eds.) TrustBus 2014. LNCS, vol. 8647, pp. 60–71. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  15. Wu, Y., Qiu, B.: Transforming a pattern identifier into biometric key generators. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 78–82 (2010)

    Google Scholar 

  16. Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Proceedings of the Biometrics Symposium, Baltimore, Md, USA (September 2007)

    Google Scholar 

  17. Nguyen, M.T., Truong, Q.H., Dang, T.K.: Enhance Fuzzy Vault Security using Nonrandom Chaff Point Generator. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds.) FDSE 2014. LNCS, vol. 8860, pp. 204–219. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  18. Jin, A.T.B., Ling, D.N.C., Goh, A.: Bio hashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  19. Kanade, S., et al.: Three factor scheme for biometric-based cryptographic key regeneration using iris. In: Biometrics Symposium 2008 (BSYM 2008), pp. 59–64. IEEE (2008)

    Google Scholar 

  20. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  21. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 111–116. ACM (2005)

    Google Scholar 

  22. Baek, K., Draper, B.A., Beveridge, J.R., She, K.: PCA vs. ICA: A Comparison on the FERET Data Set. In: Proc. of the 4th International Conference on Computer Vision (ICCV 2002), pp. 824–827 (2002)

    Google Scholar 

  23. Nguyen, V.N., Nguyen, V.Q., Nguyen, M.N.B., Dang, T.K.: Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication System. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) CT-EurAsia 2014. LNCS, vol. 8407, pp. 365–374. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thu Thi Bao Le .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Le, T.T.B., Dang, T.K., Truong, Q.C., Nguyen, T.A.T. (2014). Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T., Thoai, N. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI. Lecture Notes in Computer Science(), vol 8960. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45947-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45947-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45946-1

  • Online ISBN: 978-3-662-45947-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics