Private Fingerprint Verification without Local Storage

  • Florian Kerschbaum
  • Mikhail J. Atallah
  • David M’Raïhi
  • John R. Rice
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3072)

Abstract

We describe a protocol to solve the problem of comparing fingerprints without actually exchanging them. We extend this to private verification where the verifier does not obtain fingerprint information. We show that no substantial information is leaked to the other party even during multiple protocol runs and present evaluation results from a prototype implementation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, McGraw-Hill Publishers, New York (1999)Google Scholar
  2. 2.
    Cambier, J.L., von Seelen, U.C., Braithwaite, M., Moore, R., Glass, R., Scott, I.: Application-Dependent Biometric Templates BC14. In: The Biometric Consortium Conference (2002)Google Scholar
  3. 3.
    Cappelli, R., Erol, A., Maio, D., Maltoni, D.: Synthetic Fingerprint-image Generation. In: ICPR 2000, Proceedings International Conference on Pattern Recognition (2000)Google Scholar
  4. 4.
    Davida, G.I., Matt, B.J., Peralta, R., Frankel, Y.: On the relation of error correction and cryptography to an off line biometric based identification scheme. In: WCC 1999, Workshop on Coding and Cryptography (1999)Google Scholar
  5. 5.
    Du, W., Atallah, M.J.: Protocols for Secure Remote Database Access with Approximate Matching. In: ACMCCS 2000, 7th ACM Conference on Computer and Communications Security, The First Workshop on Security and Privacy in ECommerce (2000)Google Scholar
  6. 6.
    Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure Multiparty Computation of Approximations. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 927–938. Springer, Heidelberg (2001) (Extended Abstract) CrossRefGoogle Scholar
  7. 7.
    Goldreich, O.: Secure Multi-Party Computation (2002) (manuscript), http://www.wisdom.weizmann.ac.il/oded/pp.html
  8. 8.
    Goldwasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28(2) (1984)Google Scholar
  9. 9.
    Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 302–314 (1997)CrossRefGoogle Scholar
  10. 10.
    Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: CCS1999, Proc. of the 6th ACM Conference on Computer and Communications Security (1999)Google Scholar
  11. 11.
    Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial ”Gummy” Fingers on Fingerprint Systems. In: SPIE. Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 (2002)Google Scholar
  12. 12.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2000: Fingerprint Verification Competition. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(3), 402–412 (2002)CrossRefGoogle Scholar
  13. 13.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: ICPR 2002, Proc. of International Conference on Pattern Recognition (2002)Google Scholar
  14. 14.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition, June 2003. Springer, Heidelberg (2003)MATHGoogle Scholar
  15. 15.
    Prabhakar, S., Jain, A.K., Pankanti, S.: Learning Fingerprint Minutiae Location and Type. Pattern Recognition 36(8), 1847–1857 (2003)CrossRefGoogle Scholar
  16. 16.
    Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometricsbased authentication systems. IBM Systems Journal 40(3), 614–634 (2001)CrossRefGoogle Scholar
  17. 17.
    Ross, A., Jain, A.K., Reisman, J.: A Hybrid Fingerprint Matcher. In: Proc. of International Conference on Pattern Recognition (ICPR), vol. 3, pp. 795–798 (2002)Google Scholar
  18. 18.
    Yao, A.: Protocols for Secure Computations. In: FOCS 1982, Proc. of the Twenty-third IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Florian Kerschbaum
    • 1
  • Mikhail J. Atallah
    • 2
  • David M’Raïhi
    • 1
  • John R. Rice
    • 2
  1. 1.Arxan TechnologiesSan FranciscoUSA
  2. 2.Dept. of Computer SciencePurdue UniversityWest LafayetteUSA

Personalised recommendations