Advertisement

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures

  • Xiangmin Li
  • Ning Ding
  • Haining Lu
  • Dawu Gu
  • Shanshan Wang
  • Beibei Xu
  • Yuan Yuan
  • Siyun Yan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10726)

Abstract

Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in mobile phones connected to Internet-of-Things. Among various biometrics, fingerprints are one used most widely. A promising type of secure cryptosystems based on fingerprints is the so called fuzzy fingerprint vaults which can bind a secret key to one fingerprint template and release the same key later with the help of a similar but not necessarily fully identical fingerprint template. However, some aspects such as the security and matching accuracy of existing fingerprint-based fuzzy vaults are still not satisfactory due to troublesome issues such as the alignment of fingerprints and minutiae quantization.

In this paper we propose a modified fuzzy fingerprint vault based on pair-polar minutiae structures, aiming at achieving better performance. Recall that Li et al. (2016) presented a fuzzy vault based on pair-polar minutiae structures with two-level secure sketch in recovering the secret key. Unlike their scheme, we compress the two-level structure into one level in which minutia descriptors are exploited to match a vault and thus lower the time complexity of decoding. Our experiment evaluation shows that the proposed fuzzy fingerprint vault achieves high matching accuracy. Importantly, our vault is of strong security against existing attacks such as the brute-force attack, false-accept attack and correlation attack. Also this vault adopts the polynomial representation introduced by Dodis and Reyzin (2006) which is thus able to reduce the storage complexity.

Keywords

Biometric cryptosystems Fuzzy vaults Fingerprint alignment Minutiae quantization Pair-polar minutiae structures 

Notes

Acknowledgments

We are grateful to the reviewers of Inscrypt 2017 for their useful comments. This work is supported by Research Fund of Ministry of Education of China and China Mobile (Grant No. MCM20150301).

References

  1. 1.
    Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 760–769. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74549-5_80 CrossRefGoogle Scholar
  2. 2.
    Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433–1445 (2013)CrossRefGoogle Scholar
  3. 3.
    Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005).  https://doi.org/10.1007/11599548_31 CrossRefGoogle Scholar
  4. 4.
    Charles Clancy, T., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM Sigmm Workshop on Biometrics Methods and Applications, pp. 45–52 (2003)Google Scholar
  5. 5.
    Dodis, Y., Reyzin, L.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2006)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, p. 408 (2002)Google Scholar
  7. 7.
    Kholmatov, A., Yanikoglu, B.A.: Realization of correlation attack against the fuzzy vault scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)Google Scholar
  8. 8.
    Li, C., Hu, J.: A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11(3), 543–555 (2016)CrossRefGoogle Scholar
  9. 9.
    Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-enhanced fuzzy fingerprint vault based on minutiae’s local ridge information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-01793-3_94 CrossRefGoogle Scholar
  10. 10.
    Li, P., Yang, X., Cao, K., Tao, X., Wang, R., Tian, J.: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Netw. Comput. Appl. 33(3), 207–220 (2010)CrossRefGoogle Scholar
  11. 11.
    Liu, E., Zhao, H., Liang, J., Pang, L., Xie, M., Chen, H., Li, Y., Li, P., Tian, J.: A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recogn. Lett. 32(5), 666–675 (2011)CrossRefGoogle Scholar
  12. 12.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L.: Fvc 2002: second fingerprint verification competition. In: 16th International Conference on Pattern Recognition, p. 30811 (2002)Google Scholar
  13. 13.
    Merkle, J., Tams, B.: Security of the improved fuzzy vault scheme in the presence of record multiplicity (full version). Computer Science (2013)Google Scholar
  14. 14.
    Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: International Conference on Pattern Recognition, pp. 1–4 (2009)Google Scholar
  15. 15.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)CrossRefGoogle Scholar
  16. 16.
    Neurotechnology. Verifinger 9.0. (2016). http://www.neurotechnology.com/verifinger.html
  17. 17.
    Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, pp. 1–6 (2007)Google Scholar
  18. 18.
    Tams, B., Merkle, J., Rathgeb, C., Wagner, J.: Improved fuzzy vault scheme for alignment-free fingerprint features. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2015)Google Scholar
  19. 19.
    Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2013)Google Scholar
  20. 20.
    Tams, B.: Attacks and countermeasures in fingerprint based biometric cryptosystems. Eprint Arxiv (2013)Google Scholar
  21. 21.
    Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. Iet Biometrics 5(3), 170–180 (2015)CrossRefGoogle Scholar
  22. 22.
    Tams, B., Mihilescu, P., Munk, A.: Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10(5), 985–998 (2015)CrossRefGoogle Scholar
  23. 23.
    Tico, M., Kuosmanen, P.: Fingerprint matching using an orientation-based minutia descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 25(8), 1009–1014 (2003)CrossRefGoogle Scholar
  24. 24.
    Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop on Privacy Research in Vision, p. 163 (2006)Google Scholar
  25. 25.
    Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, pp. 609–612 (2005)Google Scholar
  26. 26.
    Yang, W., Jiankun, H., Wang, S.: A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9(7), 1179–1192 (2014)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.State Key Laboratory of CryptologyBeijingChina
  3. 3.School of Cyber SecurityShanghai Jiao Tong UniversityShanghaiChina
  4. 4.China Mobile (Hangzhou) Information Technology Co., Ltd.HangzhouChina

Personalised recommendations