Abstract
Fuzzy Vault is an interesting error tolerant method to encrypt data. This method has been widely used in the field of biometrics because of the unstable nature of captured biometric modalities. In this paper, we present main works on Fuzzy Vault when used to secure fingerprint templates. We describe the contributions proposed in different stages of the two Fuzzy Vault phases. The purpose of this work is to show the implementation to be chosen at each stage of a specific Fuzzy Vault application. To this end, in this paper, we conduct a comparative study of these works from a theoretical point of view, and according to some practical criteria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory (2002)
Nguyen, T.H., Wang, Y., Ha, Y., Li, R.: Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints. IET Biometrics 4(1), 29–39 (2015)
Brindha, V.E.: Finger knuckle print as unimodal fuzzy vault implementation. Procedia Comput. Sci. 47, 205–213 (2015)
Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. In: IET Biometric (2015)
Bringer, J., Favre, M., Pelle, C., Saxce, H.: Fuzzy vault and template-level fusion applied to a binary fingerprint representation. In: Biometrics Special Interest Group (BIOSIG) (2014)
Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Conference on Computer Vision and Pattern Recognition Workshop 2006 (CVPRW 2006). IEEE (2006)
Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237–257 (2006)
Zhou, R., et al.: Adaptive sift-based algorithm for specific fingerprint verification. In: International Conference on Hand-Based Biometrics (ICHB). IEEE (2011)
Jeffers, J., Arakala, A.: Fingerprint alignment for a minutiae-based fuzzy vault. In: Biometrics Symposium. IEEE (2007)
Lee, S., et al.: Analysis of tradeoffs among verification accuracy, memory consumption, and execution time in the GH-based fuzzy fingerprint vault. In: International Conference on Security Technology 2008 (SECTECH 2008). IEEE (2008)
Choi, W., et al.: Apparatus and method for polynomial reconstruction in fuzzy vault system. Google Patents (2012)
Khalil-Hani, M., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3), 800–810 (2013)
Nguyen, T.H., et al.: A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: International Conference on Signal Processing, Communication and Computing (ICSPCC). IEEE (2013)
Nandakumar, K., Nagar, A., Jain, A.K.: Hardening fingerprint fuzzy vault using password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)
Moon, D., et al.: Implementation of automatic fuzzy fingerprint vault. In: International Conference on Machine Learning and Cybernetics. IEEE (2008)
Jeffers, J., Arakala, A.: Minutiae-based structures for a fuzzy vault. In: Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research IEEE (2006)
Xi, K., Hu, J.: Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In: IEEE International Conference on Communications 2009 (ICC 2009). IEEE (2009)
AlTarawneh, M., Woo, W., Dlay, S.: Fuzzy vault crypto biometric key based on fingerprint vector features. In: 6th International Symposium on Communication Systems, Networks and Digital Signal Processing 2008 (CNSDSP 2008). IEEE (2008)
Harmer, K., et al.: Fuzzy vault fingerprint smartcard implementation using an orientation-based feature vector. In: BLISS (2008)
Park, U., Pankanti, S., Jain, A.: Fingerprint verification using SIFT features. In: SPIE Defense and Security Symposium on International Society for Optics and Photonics (2008)
Khachatryan, G., Jivanyan, A., Khasikyan, H.: Alignment-free fuzzy vault scheme for fingerprints (2013)
Moon, D., et al.: Fuzzy fingerprint vault using multiple polynomials. In: 13th International Symposium on Consumer Electronics 2009 (ISCE 2009). IEEE (2009)
Örencik, C., et al.: Improved fuzzy vault scheme for fingerprint verification (2008)
Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition 2008 (ICPR 2008). IEEE (2008)
Krivokuća, V., Abdulla, W., Swain, A.: A dissection of fingerprint fuzzy vault schemes. In: Proceedings of the 27th Conference on Image and Vision Computing New Zealand. ACM (2012)
Sood, P., Kaur, M.: Methods of automatic alignment of fingerprint in fuzzy vault: a review. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS). IEEE (2014)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. Inf. Forensics Secur. IEEE Trans. 2(4), 744–757 (2007)
Alibeigi, E., Rizi, M.T., Behnamfar, P.: Pipelined minutiae extraction from fingerprint images. In: Canadian Conference on Electrical and Computer Engineering 2009 (CCECE 2009). IEEE (2009)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications. ACM (2003)
Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, Speech and Signal Processing 2005 Proceedings (ICASSP 2005)
Fei, S., et al.: Fingerprint singular points extraction based on the properties of orientation model. J. Chin. Univ. Posts Telecommun. 18(1), 98–104 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Dellys, H.N. et al. (2015). A Critical Comparison of Fingerprint Fuzzy Vault Techniques. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2015. Lecture Notes in Computer Science(), vol 9429. Springer, Cham. https://doi.org/10.1007/978-3-319-25939-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-25939-0_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25938-3
Online ISBN: 978-3-319-25939-0
eBook Packages: Computer ScienceComputer Science (R0)