A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion

  • Lin You
  • Ting Wang
Methodologies and Application


Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy vault scheme uses a single biological template, and the biological feature parameters are directly present in the fuzzy vault, this will not effectively protect the biological template. To deal with this problem, we propose a novel fuzzy vault scheme based on fingerprint and finger vein feature fusion which can alleviate the limitation of the fuzzy vault using one biological template. It is difficult for attackers to restore each biological template from the fusion template. In addition, the fusion encoding not the feature point parameters is stored in our fuzzy vault, and this fusion encoding will not reveal the information of feature point. Our experiment results show that our scheme can also achieve a high genuine acceptance rate and a low false acceptance rate.


Finger template security Fuzzy vault Key protection Feature fusion Fusion encoding 



The authors would like to thank the anonymous reviewer for his/her valuable comments and suggestions to improve the quality of this paper.

Compliance with ethical standards

Conflict of interest

The authors declare no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90–98Google Scholar
  2. Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286–4290CrossRefGoogle Scholar
  3. Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT’ 2004). Interlaken, pp 523–540Google Scholar
  4. Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1–5Google Scholar
  5. Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540–547Google Scholar
  6. Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of the international symposium on information theory. Lausanne, p 408Google Scholar
  7. Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257MathSciNetCrossRefMATHGoogle Scholar
  8. Li S, Kot AC (2013) Fingerprint combination for privacy protection. IEEE Trans Inf Forensics Secur 8(2):350–360CrossRefGoogle Scholar
  9. Liu H, Sun D, Xiong K, et al (2010) 3D fuzzy vault based on palmprint. In: Proceedings of the 2010 IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). Huangshan, pp 230–234Google Scholar
  10. Lu L, Peng J (2014) Finger multi-biometric cryptosystem using feature-level fusion. Int J Signal Process Image Process Pattern Recognit 7:1035–1046Google Scholar
  11. Moon D, Chung Y, Seo C et al (2014) A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25(2):293–302CrossRefGoogle Scholar
  12. Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRefGoogle Scholar
  13. Nandakumar K, Jain A K (2008) Multibiometric template security using fuzzy vault. In: the Proceeding of the 2008 international conference on biometrics: theory, applications and systems. Arlington, pp 1–6Google Scholar
  14. Nandakumar K, Nagar A, Jain A K (2007) Hardening fingerprint fuzzy vault using password. In: Proceeding of the 2007 international conference on Advances in Biometrics. Berlin, pp 927–937Google Scholar
  15. Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in cloud computing. In: Proceeding of 2014 international symposium on biometrics and security technologies (ISBAST’ 15). Kuala Lumpur, pp 45–50Google Scholar
  16. Uludag U, Jain A (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of Cvpr workshop on privacy research in vision. New York, pp 17–22Google Scholar
  17. Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Lecture notes in computer science, vol 3546, pp 310–319Google Scholar
  18. Wu L, Xiao P, Jiang S, et al (2011) A fuzzy vault scheme for feature fusion. In: Proceedings of the 6th Chinese conference on Biometric recognition (CCBR’11). Beijing, pp 237–243Google Scholar
  19. Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 second international symposium on data, privacy, and e-commerce. New York, pp 45–49Google Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Cyberspace SecurityHangzhou Dianzi UniversityHangzhouChina
  2. 2.School of Communication EngineeringHangzhou Dianzi UniversityHangzhouChina

Personalised recommendations