Advertisement

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

  • Yongwha Chung
  • Daesung Moon
  • Sungju Lee
  • Seunghwan Jung
  • Taehae Kim
  • Dosung Ahn
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.

Keywords

Crypto-Biometric Fuzzy Fingerprint Vault Geometric Hashing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stallings, W.: Cryptography and Network Security, Pearson Ed. Inc (2003)Google Scholar
  2. 2.
    Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)zbMATHGoogle Scholar
  3. 3.
    Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)zbMATHCrossRefGoogle Scholar
  4. 4.
    Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)CrossRefGoogle Scholar
  5. 5.
    Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33–42 (2003)Google Scholar
  6. 6.
    Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges. Proc. of IEEE 92(6), 948–960 (2004)CrossRefGoogle Scholar
  7. 7.
    Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and En-cryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)Google Scholar
  8. 8.
    Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)Google Scholar
  9. 9.
    Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82 (1999)Google Scholar
  10. 10.
    Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 28–36 (1999)Google Scholar
  11. 11.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)Google Scholar
  12. 12.
    Linnartz, J., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biomet-ric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentica-tion. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)Google Scholar
  15. 15.
    Uludag, U., Pankanti, S., Jain, A.: Fuzzy Fingerprint Vault. In: Proc. of Workshop Bio-metrics: Challenges arising from Theory to Practice, pp. 13–16 (2004)Google Scholar
  16. 16.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)CrossRefGoogle Scholar
  18. 18.
    Ratha, N., Jain, A.: A Real-Time Matching System for Large Fingerprint Database. IEEE Trans on PAMI 18, 799–813 (1996)Google Scholar
  19. 19.
    Ahn, D., et al.: Specification of ETRI Fingerprint Database(in Korean). Technical Report – ETRI (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yongwha Chung
    • 1
  • Daesung Moon
    • 2
  • Sungju Lee
    • 1
  • Seunghwan Jung
    • 1
  • Taehae Kim
    • 1
  • Dosung Ahn
    • 2
  1. 1.Department of Computer and Information ScienceKorea UniversityKorea
  2. 2.Biometrics Technology Research TeamETRIDaejeonKorea

Personalised recommendations