Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 358))

Abstract

Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative construction based on subspace codes. This offers some advantages in terms of security, as an eventual discovery of the key does not provide an obvious access to the features. Crucial for an efficient implementation are the computational complexity and the choice of good code parameters. The parameters depend on the particular application, e.g. the biometric feature to be stored and the rate one wants to allow for false acceptance. The developed theory is closely linked to constructions of subspace codes studied in the area of random network coding.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baldi M, Bianchi M, Chiaraluce F, Rosenthal J, Schipani D (2011) On fuzzy syndrome hashing with LDPC coding. In: Proceeding of 4th international sympoisum applied sciences in biomedical and communication technologies (ISABEL), pp 1–5

    Google Scholar 

  2. Choi WY, Lee S, Moon D, Chung Y, Moon KY (2008) A fast algorithm for polynomial reconstruction of fuzzy fingerprint vault. IEICE Electron Express 5(18):725–731

    Article  Google Scholar 

  3. Clancy C (2003) Secure smartcard-based fingerprint authentication. In: ACM Workshop on biometrics: methods and applications, pp 45–52

    Google Scholar 

  4. Fontein F, Marshall K, Rosenthal J, Schipani D, Trautmann AL (2012) On burst error correction and storage security of noisy data. In: Proceeding 20th international symposium mathematical theory of networks and systems (MTNS)

    Google Scholar 

  5. Gorla E, Manganiello F, Rosenthal J (2012) An algebraic approach for decoding spread codes. Adv Math Commun (AMC) 6(4):443–466

    Article  MATH  MathSciNet  Google Scholar 

  6. Hartloff J, Bileschi M, Tulyakov S, Dobler J, Rudra A, Govindaraju V (2013) Security analysis for fingerprint fuzzy vaults. In: SPIE defense, security and sensing

    Google Scholar 

  7. Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237–257

    Article  MATH  MathSciNet  Google Scholar 

  8. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceeding 6th ACM conference on computer and communications security, CCS ’99, pp 28–36

    Google Scholar 

  9. Koetter R, Kschichang F (2007) Coding for errors and erasures in random network coding. In Proceeding of IEEE international symposium, information theory

    Google Scholar 

  10. Laksov D, Thorup A (1994) Counting matrices with coordinates in finite fields and of fixed rank. Mathematica Scandinavica 74:19–33

    MATH  MathSciNet  Google Scholar 

  11. Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220

    Article  Google Scholar 

  12. MacWilliams FJ, Sloane N (1977) The Theory of Error-Correcting Codes. North Holland, Amsterdam

    Google Scholar 

  13. Manganiello F, Gorla E, Rosenthal J (2008) Spread codes and spread decoding in network coding. In: Proceeding of IEEE international symposium information theory, pp 881–885

    Google Scholar 

  14. Manganiello F, Trautmann A-L (2014) Spread decoding in extension fields. Finite Fields Appl 25:94–105

    Article  MATH  MathSciNet  Google Scholar 

  15. Mihailescu P, Munk A, Tams B (2009) The fuzzy vault for fingerprints is vulnerable to brute force attack. In: Proceeding of BIOSIG, pp 43–54

    Google Scholar 

  16. Poon HT, Miri A (2012) On efficient decoding for the fuzzy vault scheme. In: IEEE 11th International conference information science signal processing and their application, pp 454–459

    Google Scholar 

  17. Schipani D, Rosenthal J (2010) Coding solutions for the secure biometric storage problem. In: Information theory workshop (ITW), 2010 IEEE, Dublin, Ireland, pp 1–4

    Google Scholar 

Download references

Acknowledgments

Kyle Marshall and Joachim Rosenthal were supported by Swiss National Science Foundation Grant no. 149716. Anna-Lena Trautmann was supported by Swiss National Science Foundation Fellowship no. 147304. The authors would like to thank Marco Bianchi and Natalia Silberstein for fruitful discussions regarding this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyle Marshall .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Marshall, K., Schipani, D., Trautmann, AL., Rosenthal, J. (2016). Subspace Fuzzy Vault. In: Baldi, M., Tomasin, S. (eds) Physical and Data-Link Security Techniques for Future Communication Systems. Lecture Notes in Electrical Engineering, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-319-23609-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23609-4_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23608-7

  • Online ISBN: 978-3-319-23609-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics