Skip to main content
Log in

A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy vault scheme uses a single biological template, and the biological feature parameters are directly present in the fuzzy vault, this will not effectively protect the biological template. To deal with this problem, we propose a novel fuzzy vault scheme based on fingerprint and finger vein feature fusion which can alleviate the limitation of the fuzzy vault using one biological template. It is difficult for attackers to restore each biological template from the fusion template. In addition, the fusion encoding not the feature point parameters is stored in our fuzzy vault, and this fusion encoding will not reveal the information of feature point. Our experiment results show that our scheme can also achieve a high genuine acceptance rate and a low false acceptance rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90–98

  • Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286–4290

    Article  Google Scholar 

  • Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT’ 2004). Interlaken, pp 523–540

  • Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1–5

  • Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540–547

  • Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of the international symposium on information theory. Lausanne, p 408

  • Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257

    Article  MathSciNet  MATH  Google Scholar 

  • Li S, Kot AC (2013) Fingerprint combination for privacy protection. IEEE Trans Inf Forensics Secur 8(2):350–360

    Article  Google Scholar 

  • Liu H, Sun D, Xiong K, et al (2010) 3D fuzzy vault based on palmprint. In: Proceedings of the 2010 IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). Huangshan, pp 230–234

  • Lu L, Peng J (2014) Finger multi-biometric cryptosystem using feature-level fusion. Int J Signal Process Image Process Pattern Recognit 7:1035–1046

    Google Scholar 

  • Moon D, Chung Y, Seo C et al (2014) A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25(2):293–302

    Article  Google Scholar 

  • Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268

    Article  Google Scholar 

  • Nandakumar K, Jain A K (2008) Multibiometric template security using fuzzy vault. In: the Proceeding of the 2008 international conference on biometrics: theory, applications and systems. Arlington, pp 1–6

  • Nandakumar K, Nagar A, Jain A K (2007) Hardening fingerprint fuzzy vault using password. In: Proceeding of the 2007 international conference on Advances in Biometrics. Berlin, pp 927–937

  • Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in cloud computing. In: Proceeding of 2014 international symposium on biometrics and security technologies (ISBAST’ 15). Kuala Lumpur, pp 45–50

  • Uludag U, Jain A (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of Cvpr workshop on privacy research in vision. New York, pp 17–22

  • Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Lecture notes in computer science, vol 3546, pp 310–319

  • Wu L, Xiao P, Jiang S, et al (2011) A fuzzy vault scheme for feature fusion. In: Proceedings of the 6th Chinese conference on Biometric recognition (CCBR’11). Beijing, pp 237–243

  • Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 second international symposium on data, privacy, and e-commerce. New York, pp 45–49

Download references

Acknowledgements

The authors would like to thank the anonymous reviewer for his/her valuable comments and suggestions to improve the quality of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ting Wang.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

This work was supported by the Key Program of the Natural Science Foundation of Zhejiang province, China (LZ17F020002) and the Natural Science Foundation of China (61272045, 61772166).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

You, L., Wang, T. A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion. Soft Comput 23, 3843–3851 (2019). https://doi.org/10.1007/s00500-018-3046-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3046-8

Keywords

Navigation