Skip to main content
Log in

A practical implementation of fuzzy fingerprint vault for smart cards

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remain safe. Fuzzy vault is a cryptographic construct to secure critical data with the fingerprint data. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates, for the smart card environment. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, template size for storing in the smart card, execution time, error correcting code, etc. Especially, we handled the fingerprints having a few minutiae by applying an adaptive degree of the polynomial, and thus our implementation result can be used for real, large-scale applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Bamasak O. (2010) Exploring consumers acceptance of mobile payments? An empirical study. International Journal of Information Technology, Communications and Convergence 1(2): 173–185

    Article  Google Scholar 

  • Berlekamp, E. (1984). Algebraic coding theory. McGraw-Hill: New York. (Revised edition, Laguna Hills: Aegean Park Press, 1984).

  • Bolle R., Connell J., Ratha N. (2002) Biometric perils and patches. Pattern Recognition 35: 2727–2738

    Article  Google Scholar 

  • Chong R., Tanaka T. (2010) Motion blur identification using maxima locations for blind colour image restoration. Journal of Convergence 1:1 49–56

    Google Scholar 

  • Chung Y. et al (2005) Automatic alignment of fingerprint features for fuzzy fingerprint vault. LNCS 3822: 358–369

    Google Scholar 

  • Clancy, T., et al. (2003). Secure smartcard-based fingerprint authentication. Proceedings of ACM SIGMM Multimedia Biome Met. & App (pp. 45–52).

  • FVC. (2002). http://bias.csr.unibo.it/fvc2002/databases.asp.

  • Gao, S. (2003) A new algorithm for decoding Reed-Solomon codes communications information and network security (pp. 55–68). Dordrecht: Kluwer.

  • Gil, Y. et al. (2001). Performance analysis of smart card-based fingerprint recognition for secure user authentication. Proceedings of IFIP on E-commerce, E-business, E-government (pp. 87–96).

  • Guruswami,V., Sudan, M. (1998). Improved secoding of Reed-Solomon and algebraic geometric codes. Proceedings of FOCS (pp. 28–39).

  • Janke, M. (2001). FingerCard project presentation, http://www.finger-card.org.

  • Juels, A., & Wattenberg, M. (1999). A fuzzy commitment scheme. Proceedings of ACM conference on computer and Commumication Security, pp. 28–36.

  • Juels, A., & Sudan, M. (2002). A fuzzy vault scheme. Proceedings of symposium on information theory (p. 408).

  • Kryvinska, N., et al. (2010). Integrated management platform for seamless services provisioning in converged network. International Journal of Information Technology, Communications and Convergence, 1(1), 77–91.

    Article  Google Scholar 

  • Ling, A., & Masao, M. (2011). Selection of model in developing information security criteria for smart grid security system. Journal of Convergence, 2(1), 39–46.

    Google Scholar 

  • Maltoni D. et al (2003) Handbook of fingerprint recognition. Springer, NewYork

    Google Scholar 

  • Moon D. et al (2007) Fingerprint template protection using fuzzy vault. LNCS 4707: 1141–1151

    Google Scholar 

  • Nagar, A., et al. (2008). Securing fingerprint template: Fuzzy vault with minutiae descriptors. Proceedings of ICPR.

  • Nandakumar K. et al (2007) Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4): 744–757

    Article  Google Scholar 

  • NitGen. www.nitgen.com.

  • Pan S. et al (2003) An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. IEEE Transactions on Consumer Electronics 49(2): 453–459

    Article  Google Scholar 

  • SAMSUNG. http://www.samsung.com.

  • Schneier B. (1999) The uses and abuses of biometrics. Communications of the ACM 42(8): 136

    Article  Google Scholar 

  • Scheirer, W., & Boult, T. (2007). Cracking Fuzzy Vaults and Biometric Encryption. Proceedings of IEEE biometrics research symposium at the National biometrics consortium conference.

  • Teoh A., Ngo D., Goh A. (2004) Biohashing: Two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition 37: 2245–2255

    Article  Google Scholar 

  • Uludag U. et al (2004) Biometric cryptosystems: Issues and challenges. Proceedings of IEEE 92(6): 948–960

    Article  Google Scholar 

  • Uludag, U., et al. (2005). Fuzzy vault for fingerprints. Proceedings of audio- and video-based biometric person authentication (pp 310–319).

  • Yang S., Verbauwhede I. (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing 5: 609–612

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daesung Moon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moon, D., Chung, Y., Seo, C. et al. A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25, 293–302 (2014). https://doi.org/10.1007/s10845-012-0656-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-012-0656-3

Keywords

Navigation