Biometric Key Binding: Fuzzy Vault Based on Iris Images

  • Youn Joo Lee
  • Kwanghyuk Bae
  • Sung Joo Lee
  • Kang Ryoung Park
  • Jaihie Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

Recently, crypto-biometric systems have been studied for solving the key management problem of cryptographic systems and protecting templates in biometric systems at the same time. The fuzzy vault system is a well-known crypto-biometric system. We propose a new method of applying iris data to the fuzzy vault. Our research has following two advantages and contributions. First, in order to solve the variation problem of the extracted iris features, we introduce a pattern clustering method. Second, in order to produce unordered sets for fuzzy vault, we use the iris feature extraction algorithm based on ICA (Independent Component Analysis). Experimental results showed that 128-bit cryptographic keys as well as the iris templates were secure with the fuzzy vault scheme.

Keywords

Fuzzy Vault Scheme Pattern Clustering Independent Component Analysis (ICA) 

References

  1. 1.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Audio- and Video-based Biometrics, December 4, 2006 DRAFT 31 Person Authentication, Rye Town, USA, July 2005, pp. 310–319 (2005)Google Scholar
  2. 2.
    Trappe, W., Washington, L.C.: Introduction to Cryptography with coding theory. Prentice-Hall, Upper Saddle River, NJGoogle Scholar
  3. 3.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: CCS 2002. ACM Conference on Computer and Communications Security, ACM, New York (2002)Google Scholar
  4. 4.
    Bae, K.H.: An Iris Feature Extraction Method using the Independent Component Analysis. The Graduate School of Yonsei University, Dept. of Electrical and Electronic Eng. (2002)Google Scholar
  5. 5.
    Bae, K.H., Noh, S.I., Park, Kim, J.H.: Iris Feature Extraction Using Independent Component Analysis. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 838–844. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Clancy, T., Lin, D., Kiyavash, N.: Secure Smartcard-Based Fingerprint Authentication. In: Proceedings of ACM SIGMM Workshop on Biometric Methods and Applications, Berkley, USA, November 2003, pp. 45–52. ACM, New York (2003)CrossRefGoogle Scholar
  7. 7.
    Uludag, U., et al.: Securing Fingerprint Template: Fuzzy Vault With Helper Data. In: Proc. of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 163 (2006)Google Scholar
  8. 8.
    Shibata, Y., Nishigak, M.: A study on biometric key generation. Asian Biometrics Forum (2006)Google Scholar
  9. 9.
    Yang, S., et al.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE ICASSP, Philadelphia, USA, March 2005, vol. 5, pp. 609–612. IEEE, Los Alamitos (2005)Google Scholar
  10. 10.
    Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic Key Generation Using Handwritten Signature. In: Proceedings of Biometric Technologies for Human Identification III, Orlando, USA, April 2006, vol. 6202, pp. 225–231 (2006)Google Scholar
  11. 11.
    Feng, Y.C., Yuen, P.C.: Protecting Face Biometric Data on Smartcard with Reed-Solomon Code. In: Proceedings of CVPR Workshop on Privacy Research In Vision, New York, USA, June 2006, p. 29 (2006)Google Scholar
  12. 12.
    Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Techno. 14(1), 21–30 (2004)CrossRefGoogle Scholar
  13. 13.
    Wicker, S.B.: Error Control Systems for Digital Communication and Storage. Prentice-Hall, Englewood Cliffs, NJ (1995)MATHGoogle Scholar
  14. 14.
    Sylvester, J.: Reed-Solomon Codes (January 2001), Available from http://www.elektrobit.co.uk
  15. 15.
    Sklar, B.: Reed-Solomon Codes (accessed on 2007.2.10), Available at http://www.informit.com/content/images/art_sklar7_reed-solomon/elementLinks/art_sklar7_reed-solomon.pdf
  16. 16.
    Duda, R.O., Har, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Chichester (2001)MATHGoogle Scholar
  17. 17.
    Kreyszig, E.: Advanced Engineering Mathematics, 8th edn. Wiley, Chichester (1999)Google Scholar
  18. 18.
    (accessed on 2007.1. 2) http://berc.yonsei.ac.kr

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Youn Joo Lee
    • 1
  • Kwanghyuk Bae
    • 1
  • Sung Joo Lee
    • 1
  • Kang Ryoung Park
    • 2
  • Jaihie Kim
    • 1
  1. 1.Department of Electrical and Electronic Engineering, Yonsei University, Biometrics Engineering Research Center 
  2. 2.Division of Digital Media Technology, Sangmyung University, Biometrics Engineering Research Center 

Personalised recommendations