Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.
KeywordsCrypto-Biometric Fuzzy Fingerprint Vault Geometric Hashing
Unable to display preview. Download preview PDF.
- 1.Stallings, W.: Cryptography and Network Security, Pearson Ed. Inc (2003)Google Scholar
- 5.Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33–42 (2003)Google Scholar
- 7.Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and En-cryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)Google Scholar
- 8.Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)Google Scholar
- 9.Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82 (1999)Google Scholar
- 10.Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 28–36 (1999)Google Scholar
- 11.Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)Google Scholar
- 14.Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentica-tion. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)Google Scholar
- 15.Uludag, U., Pankanti, S., Jain, A.: Fuzzy Fingerprint Vault. In: Proc. of Workshop Bio-metrics: Challenges arising from Theory to Practice, pp. 13–16 (2004)Google Scholar
- 18.Ratha, N., Jain, A.: A Real-Time Matching System for Large Fingerprint Database. IEEE Trans on PAMI 18, 799–813 (1996)Google Scholar
- 19.Ahn, D., et al.: Specification of ETRI Fingerprint Database(in Korean). Technical Report – ETRI (2002)Google Scholar