Robust Extraction of Secret Bits from Minutiae

  • Ee-Chien Chang
  • Sujoy Roy
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications. In order to correct inevitable noise during scanning and processing, a known approach extracts and publishes an additional information, known as secure sketch from the minutiae. During subsequent scanning, the sketch aids in correcting the noise to give the consistent bits. However, for minutiae (represented as 2D point set), known constructions produce sketches that are large, and are difficult to adapt to slight variations of the 2D point representation. Furthermore, even with simplified model on the noise and distribution of the minutiae, it is not clear what is the entropy of the bits extracted. To overcome the problems, we suggest using a locality preserving hash in sketch construction. We give a method that produces a small sketch and thus suitable for applications involving mobile devices. Since the sketch size is small, with a reasonable assumption, we can estimate the entropy of the secret bits extracted. In addition, we can incorporate statistical properties of the noise, and distribution of the minutiae in fine-tuning the method. Our method also includes registration of fingerprints. Experiments conducted on 4000 fingerprint images from the NIST 4 database show promising results. Assuming that an intermediate representation is uniformly distributed, with FNMR = 0.09% we are able to extract about 8 secret bits (by a conservative estimate) or 10 bits (with certain assumption on the underlying codebook).

Keywords

Secure sketch Fuzzy vault Locality preserving hash Cryptography 

References

  1. 1.
    Buhan, I., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: ASIACCS, pp. 353–355 (2007)Google Scholar
  2. 2.
    Chang, E.-C., Fedyukovych, V., Li, Q.: Secure sketch for multi-sets. Cryptology ePrint Archive, Report 2006/090 (2006)Google Scholar
  3. 3.
    Chang, E.-C., Li, Q.: Hiding secret points amongst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Chang, E.-C., Shen, R., Teo, W.: Finding the original point set hideen among chaff. In: Proc. ACM Sym on Information, Computer and Communications Security, ACM Press, New York (2006)Google Scholar
  5. 5.
    Chikkerur, S., Ratha, N.: Impact of singular point detection on fingerprint matching performance. In: IEEE AUTOID, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  6. 6.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM SIGMM workshop on Biometrics methods and applications, pp. 45–52. ACM Press, New York (2003)CrossRefGoogle Scholar
  7. 7.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)Google Scholar
  8. 8.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE Intl. Symp. on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  9. 9.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conf. on Computer and Communications Security, pp. 28–36. ACM Press, New York (1999)CrossRefGoogle Scholar
  10. 10.
    Linnartz, J.-P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Nilsson, K.: Localization of corresponding points in fingerprints by complex filtering. PhD thesis, Chalmers University of Technology, Sweden (2005)Google Scholar
  12. 12.
    Verbauwhede, I.M., Yang, S.: Secure fuzzy vault based fingerprint verification system. In: 38th Asilomar Conf. on Signals, Systems, and Computers, vol. 1, pp. 577–581 (2004)Google Scholar
  13. 13.
    Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, IEEE Computer Society Press, Los Alamitos (2006)Google Scholar
  14. 14.
    Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S.: NIST fingerprint image software 2. NIST Special Database (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ee-Chien Chang
    • 1
  • Sujoy Roy
    • 2
  1. 1.School of Computing, National University of SingaporeSingapore
  2. 2.Institute for Infocomm ResearchSingapore

Personalised recommendations