Hiding Secret Points Amidst Chaff

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4004)


Motivated by the representation of biometric and multimedia objects, we consider the problem of hiding noisy point-sets using a secure sketch. A point-set X consists of s points from a d-dimensional discrete domain [0,N – 1] d . Under permissible noises, for every point \(\left \langle x_1,..,x_d\right \rangle \in X\), each x i may be perturbed by a value of at most δ. In addition, at most t points in X may be replaced by other points in [0,N – 1] d . Given an original X, we want to compute a secure sketch P. A known method constructs the sketch by adding a set of random points R, and the description of (XR) serves as part of the sketch. However, the dependencies among the random points are difficult to analyze, and there is no known non-trivial bound on the entropy loss. In this paper, we first give a general method to generate R and show that the entropy loss of (XR) is at most s(dlogΔ+ d + 0.443), where Δ= 2δ+1. We next give improved schemes for d = 1, and special cases for d = 2. Such improvements are achieved by pre-rounding, and careful partition of the domains into cells. It is possible to make our sketch short, and avoid using randomness during construction. We also give a method in d = 1 to demonstrate that, using the size of R as the security measure would be misleading.


White Noise Biometric Data Basic Construction Closeness Relation Entropy Loss 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Alon, N., Goldreich, O., Håstad, J., Peralta, R.: Simple constructions of almost k-wise independent random variables. In: Proc. of the 31st FOCS, pp. 544–553 (1990)Google Scholar
  2. 2.
    Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and Communications Security, pp. 82–91. ACM Press, New York (2004)Google Scholar
  3. 3.
    Chang, E.-C., Fedyukovych, V., Li, Q.: Secure sketch for multi-set difference. Cryptology ePrint Archive, Report, 2006/090 (2006),
  4. 4.
    Chang, E.-C., Shen, R., Teo, F.W.: Finding the original point set hidden among chaff. In: ASIACCS 2006 (to appear)Google Scholar
  5. 5.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: ACM Workshop on Biometric Methods and Applications (2003)Google Scholar
  6. 6.
    Garris, M.D., Michael McCabe, R.: Fingerprint minutiae from latent and matching tenprint images. NIST Special Database 27 (2000)Google Scholar
  7. 7.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Coffman Jr., E.G., Flatto, L., Jelenković, P.: Interval packing: The vacant-interval distribution. The Annals of Applied Probability 10(1), 240–257 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE Intl. Symp. on Information Theory (2002)Google Scholar
  10. 10.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proc. ACM Conf. on Computer and Communications Security, pp. 28–36 (1999)Google Scholar
  11. 11.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)zbMATHGoogle Scholar
  12. 12.
    Minsky, Y., Trachtenberg, A., Zippel, R.: Set reconciliation with nearly optimal communications complexity. In: ISIT (2001)Google Scholar
  13. 13.
    Palasti, I.: On some random space filling problems. Publ. Math. Inst. Hung. Acad. Sci. 5, 353–359 (1960)MathSciNetzbMATHGoogle Scholar
  14. 14.
    Rényi, A.: On a one-dimensional problem concerning random space-filling. Publ. Math. Inst. Hung. Acad. Sci. 3, 109–127 (1958)MathSciNetzbMATHGoogle Scholar
  15. 15.
    Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: ECCV Workshop BioAW, pp. 158–170 (2004)Google Scholar
  16. 16.
    Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pp. 609–612 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  1. 1.Department of Computer ScienceNational University of SingaporeSingapore

Personalised recommendations