Skip to main content

A Critical Comparison of Fingerprint Fuzzy Vault Techniques

  • Conference paper
  • First Online:
Advances in Visual Informatics (IVIC 2015)

Abstract

Fuzzy Vault is an interesting error tolerant method to encrypt data. This method has been widely used in the field of biometrics because of the unstable nature of captured biometric modalities. In this paper, we present main works on Fuzzy Vault when used to secure fingerprint templates. We describe the contributions proposed in different stages of the two Fuzzy Vault phases. The purpose of this work is to show the implementation to be chosen at each stage of a specific Fuzzy Vault application. To this end, in this paper, we conduct a comparative study of these works from a theoretical point of view, and according to some practical criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory (2002)

    Google Scholar 

  2. Nguyen, T.H., Wang, Y., Ha, Y., Li, R.: Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints. IET Biometrics 4(1), 29–39 (2015)

    Article  Google Scholar 

  3. Brindha, V.E.: Finger knuckle print as unimodal fuzzy vault implementation. Procedia Comput. Sci. 47, 205–213 (2015)

    Article  Google Scholar 

  4. Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. In: IET Biometric (2015)

    Google Scholar 

  5. Bringer, J., Favre, M., Pelle, C., Saxce, H.: Fuzzy vault and template-level fusion applied to a binary fingerprint representation. In: Biometrics Special Interest Group (BIOSIG) (2014)

    Google Scholar 

  6. Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Conference on Computer Vision and Pattern Recognition Workshop 2006 (CVPRW 2006). IEEE (2006)

    Google Scholar 

  7. Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237–257 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  8. Zhou, R., et al.: Adaptive sift-based algorithm for specific fingerprint verification. In: International Conference on Hand-Based Biometrics (ICHB). IEEE (2011)

    Google Scholar 

  9. Jeffers, J., Arakala, A.: Fingerprint alignment for a minutiae-based fuzzy vault. In: Biometrics Symposium. IEEE (2007)

    Google Scholar 

  10. Lee, S., et al.: Analysis of tradeoffs among verification accuracy, memory consumption, and execution time in the GH-based fuzzy fingerprint vault. In: International Conference on Security Technology 2008 (SECTECH 2008). IEEE (2008)

    Google Scholar 

  11. Choi, W., et al.: Apparatus and method for polynomial reconstruction in fuzzy vault system. Google Patents (2012)

    Google Scholar 

  12. Khalil-Hani, M., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3), 800–810 (2013)

    Article  Google Scholar 

  13. Nguyen, T.H., et al.: A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: International Conference on Signal Processing, Communication and Computing (ICSPCC). IEEE (2013)

    Google Scholar 

  14. Nandakumar, K., Nagar, A., Jain, A.K.: Hardening fingerprint fuzzy vault using password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Moon, D., et al.: Implementation of automatic fuzzy fingerprint vault. In: International Conference on Machine Learning and Cybernetics. IEEE (2008)

    Google Scholar 

  16. Jeffers, J., Arakala, A.: Minutiae-based structures for a fuzzy vault. In: Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research IEEE (2006)

    Google Scholar 

  17. Xi, K., Hu, J.: Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In: IEEE International Conference on Communications 2009 (ICC 2009). IEEE (2009)

    Google Scholar 

  18. AlTarawneh, M., Woo, W., Dlay, S.: Fuzzy vault crypto biometric key based on fingerprint vector features. In: 6th International Symposium on Communication Systems, Networks and Digital Signal Processing 2008 (CNSDSP 2008). IEEE (2008)

    Google Scholar 

  19. Harmer, K., et al.: Fuzzy vault fingerprint smartcard implementation using an orientation-based feature vector. In: BLISS (2008)

    Google Scholar 

  20. Park, U., Pankanti, S., Jain, A.: Fingerprint verification using SIFT features. In: SPIE Defense and Security Symposium on International Society for Optics and Photonics (2008)

    Google Scholar 

  21. Khachatryan, G., Jivanyan, A., Khasikyan, H.: Alignment-free fuzzy vault scheme for fingerprints (2013)

    Google Scholar 

  22. Moon, D., et al.: Fuzzy fingerprint vault using multiple polynomials. In: 13th International Symposium on Consumer Electronics 2009 (ISCE 2009). IEEE (2009)

    Google Scholar 

  23. Örencik, C., et al.: Improved fuzzy vault scheme for fingerprint verification (2008)

    Google Scholar 

  24. Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition 2008 (ICPR 2008). IEEE (2008)

    Google Scholar 

  25. Krivokuća, V., Abdulla, W., Swain, A.: A dissection of fingerprint fuzzy vault schemes. In: Proceedings of the 27th Conference on Image and Vision Computing New Zealand. ACM (2012)

    Google Scholar 

  26. Sood, P., Kaur, M.: Methods of automatic alignment of fingerprint in fuzzy vault: a review. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS). IEEE (2014)

    Google Scholar 

  27. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. Inf. Forensics Secur. IEEE Trans. 2(4), 744–757 (2007)

    Article  Google Scholar 

  28. Alibeigi, E., Rizi, M.T., Behnamfar, P.: Pipelined minutiae extraction from fingerprint images. In: Canadian Conference on Electrical and Computer Engineering 2009 (CCECE 2009). IEEE (2009)

    Google Scholar 

  29. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  30. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications. ACM (2003)

    Google Scholar 

  31. Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, Speech and Signal Processing 2005 Proceedings (ICASSP 2005)

    Google Scholar 

  32. Fei, S., et al.: Fingerprint singular points extraction based on the properties of orientation model. J. Chin. Univ. Posts Telecommun. 18(1), 98–104 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Layth Sliman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Dellys, H.N. et al. (2015). A Critical Comparison of Fingerprint Fuzzy Vault Techniques. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2015. Lecture Notes in Computer Science(), vol 9429. Springer, Cham. https://doi.org/10.1007/978-3-319-25939-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25939-0_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25938-3

  • Online ISBN: 978-3-319-25939-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics