A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures
Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in mobile phones connected to Internet-of-Things. Among various biometrics, fingerprints are one used most widely. A promising type of secure cryptosystems based on fingerprints is the so called fuzzy fingerprint vaults which can bind a secret key to one fingerprint template and release the same key later with the help of a similar but not necessarily fully identical fingerprint template. However, some aspects such as the security and matching accuracy of existing fingerprint-based fuzzy vaults are still not satisfactory due to troublesome issues such as the alignment of fingerprints and minutiae quantization.
In this paper we propose a modified fuzzy fingerprint vault based on pair-polar minutiae structures, aiming at achieving better performance. Recall that Li et al. (2016) presented a fuzzy vault based on pair-polar minutiae structures with two-level secure sketch in recovering the secret key. Unlike their scheme, we compress the two-level structure into one level in which minutia descriptors are exploited to match a vault and thus lower the time complexity of decoding. Our experiment evaluation shows that the proposed fuzzy fingerprint vault achieves high matching accuracy. Importantly, our vault is of strong security against existing attacks such as the brute-force attack, false-accept attack and correlation attack. Also this vault adopts the polynomial representation introduced by Dodis and Reyzin (2006) which is thus able to reduce the storage complexity.
KeywordsBiometric cryptosystems Fuzzy vaults Fingerprint alignment Minutiae quantization Pair-polar minutiae structures
We are grateful to the reviewers of Inscrypt 2017 for their useful comments. This work is supported by Research Fund of Ministry of Education of China and China Mobile (Grant No. MCM20150301).
- 4.Charles Clancy, T., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM Sigmm Workshop on Biometrics Methods and Applications, pp. 45–52 (2003)Google Scholar
- 6.Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, p. 408 (2002)Google Scholar
- 7.Kholmatov, A., Yanikoglu, B.A.: Realization of correlation attack against the fuzzy vault scheme. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents (2008)Google Scholar
- 9.Li, P., Yang, X., Cao, K., Shi, P., Tian, J.: Security-enhanced fuzzy fingerprint vault based on minutiae’s local ridge information. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 930–939. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01793-3_94 CrossRefGoogle Scholar
- 12.Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L.: Fvc 2002: second fingerprint verification competition. In: 16th International Conference on Pattern Recognition, p. 30811 (2002)Google Scholar
- 13.Merkle, J., Tams, B.: Security of the improved fuzzy vault scheme in the presence of record multiplicity (full version). Computer Science (2013)Google Scholar
- 14.Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: International Conference on Pattern Recognition, pp. 1–4 (2009)Google Scholar
- 16.Neurotechnology. Verifinger 9.0. (2016). http://www.neurotechnology.com/verifinger.html
- 17.Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, pp. 1–6 (2007)Google Scholar
- 18.Tams, B., Merkle, J., Rathgeb, C., Wagner, J.: Improved fuzzy vault scheme for alignment-free fingerprint features. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2015)Google Scholar
- 19.Tams, B.: Absolute fingerprint pre-alignment in minutiae-based cryptosystems. In: International Conference of the Biometrics Special Interest Group, pp. 1–12 (2013)Google Scholar
- 20.Tams, B.: Attacks and countermeasures in fingerprint based biometric cryptosystems. Eprint Arxiv (2013)Google Scholar
- 24.Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of CVPR Workshop on Privacy Research in Vision, p. 163 (2006)Google Scholar
- 25.Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, pp. 609–612 (2005)Google Scholar