Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae’s Local Ridge Information

  • Peng Li
  • Xin Yang
  • Kai Cao
  • Peng Shi
  • Jie Tian
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5558)

Abstract

Fuzzy vault is a practical and promising fingerprint template protection technology. However, this scheme has some security issues, in which cross-matching between different vaults may be the most serious one. In this paper, we develop an improvement version of fuzzy vault integrating minutiae’s local ridge orientation information. The improved fuzzy fingerprint vault, a two factor authentication scheme to some extent, can effectively prevent cross-matching between different fingerprint vaults. Experimental results show that, if and only if the fingerprint and the password of users are simultaneity obtained by the attacker, the fuzzy vault can be cracked. Results under three scenarios indicate that, although the authentication performance of Scena.1 decreases a little in term of GAR, the security of Scena.2 and Scena.3, hence the security of the whole scheme, is enhanced greatly.

Keywords

Fuzzy vault Cross-matching Minutiae descriptor Hermit’s interpolation polynomial SHA-1 

References

  1. 1.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 pages (2008)Google Scholar
  2. 2.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption, ICSA Guide to Cryptography. McGraw-Hill, New York (1999), http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
  3. 3.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number. Pattern Recognition 37, 2245–2255 (2004)Google Scholar
  4. 4.
    Lumini, A., Nanni, L.: An Improved BioHashing for Human Authentication. Pattern Recognition 40, 1057–1065 (2007)Google Scholar
  5. 5.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceeding of IEEE Int. Symp. Information Theory, p. 408 (2002)Google Scholar
  6. 6.
    Lee, C., Choi, J.Y., Toh, K.A., Lee, S.: Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information. IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(4), 980–992 (2007)Google Scholar
  7. 7.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure Smartcard-based Fingerprint Authentication. In: Proceeding of ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45–52 (2003)Google Scholar
  8. 8.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Fifth International Conference on AVBPA, Rye Town, USA, pp. 310–319 (2005)Google Scholar
  9. 9.
    Uludag, U., Jain, A.: Securing Fingerprint Template: Fuzzy Vault with Helper Data. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop (2006)Google Scholar
  10. 10.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)Google Scholar
  11. 11.
    Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)Google Scholar
  12. 12.
    Chang, E.C., Shen, R., Teo, F.W.: Finding the Original Point Set Hidden among Chaff. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 182–188. ACM Press, New York (2006)Google Scholar
  13. 13.
    Kholmatov, A., Yanikoglu, B.: Realization of Correlation Attack Against the Fuzzy Vault Scheme. In: Proceedings of 2008 SPIE / Biometrics, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol. 7, pp. 68190O–68190O-7 (2008)Google Scholar
  14. 14.
    Li, Q., Liu, Z., Niu, X.: Analysis and Problems on Fuzzy Vault Scheme. In: Proceedings of 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 244–250 (2006)Google Scholar
  15. 15.
    Tico, M., Kuosmanen, P.: Fingerprint Matching Using An Orientation-based Minutia Descriptor. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(8), 1009–1014 (2003)Google Scholar
  16. 16.
    Nagar, A., Nandakumar, K., Jain, A.K.: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptor. In: International Conference of Pattern Recognition (to appear) (2008)Google Scholar
  17. 17.
    Li, J., Tian, J., Yang, X., Shi, P., Li, P.: Topological Structrue based Fuzzy Vault Alignment Method. In: International Conference of Pattern Recognition (to appear) (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Peng Li
    • 1
  • Xin Yang
    • 1
  • Kai Cao
    • 1
  • Peng Shi
    • 1
  • Jie Tian
    • 1
  1. 1.Institute of AutomationChinese Academy of SciencesBeijingChina

Personalised recommendations