Advertisement

Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes

  • Valérie Viet Triem Tong
  • Hervé Sibert
  • Jérémy Lecœur
  • Marc Girault
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4642)

Abstract

Recent techniques based on error-correction enable the derivation of a secret key for the (varying) measured biometric data. Such techniques are opening the way towards broader uses of biometrics for security, beyond identification. In this paper, we propose a method based on fingerprints to associate, and further retrieve, a committed value which can be used as a secret for security applications. Unlike previous work, this method uses a stable and ordered representation of biometric data, which makes it of practical use.

Keywords

Biometric Data Legitimate User Security Application Biometric Template Fuzzy Extractor 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bazen, A.M., Guerez, H.: Directional field computation for fingerprints based on the principal component analysis of local gradients. In: Proc. of 11th annual Workshop on Circuits, Systems and Signal Processing, 2000 (2000)Google Scholar
  2. 2.
    Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell, MA, USA (1998)Google Scholar
  3. 3.
    Chang, E.-C., Li, Q.: Hiding secret points amidst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 59–72. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: WBMA 2003. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pp. 45–52. ACM Press, New York (2003)CrossRefGoogle Scholar
  5. 5.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Jain, A., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. Proc. of IEEE Transactions on Image Processing 9(5), 846–859 (2000)CrossRefGoogle Scholar
  7. 7.
    Jain, A., Ross, A., Prabhakar, S.: Fingerprint matching using minutiae and texture features. In: ICIP. Proc. of International Conference on Image Processing, Thessaloniki, Greece, pp. 282–285 (October 2001)Google Scholar
  8. 8.
    Jain, A., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence (2003)Google Scholar
  9. 9.
    Jain, A.K., Maltoni, D.: Handbook of Fingerprint Recognition. Springer, New York (2003)zbMATHGoogle Scholar
  10. 10.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  11. 11.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999. Proceedings of the 6th ACM conference on Computer and communications security, pp. 28–36. ACM Press, New York (1999)CrossRefGoogle Scholar
  12. 12.
    MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)zbMATHGoogle Scholar
  13. 13.
    MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes, Part II. North-Holland, Amsterdam (1977)zbMATHGoogle Scholar
  14. 14.
    Prabhakar, S.: Fingerprint Classification and Matching Using a Filterbank. PhD thesisGoogle Scholar
  15. 15.
    Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp. 13–16 (2004)Google Scholar
  16. 16.
    Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.: Biometric cryptosystems: Issues and challenges (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Valérie Viet Triem Tong
    • 1
  • Hervé Sibert
    • 2
  • Jérémy Lecœur
    • 3
  • Marc Girault
    • 4
  1. 1.Supelec, Campus de Rennes, Avenue de la Boulaie F-35576 Cesson-Sévigné CedexFrance
  2. 2.NXP Semiconductors, 9 rue Maurice Trintignant, F-72081 Le Mans Cedex 9France
  3. 3.Irisa-Inria, Campus de Beaulieu, F-35042 Rennes Cedex 
  4. 4.France Telecom Research and Development, 42 rue des Coutures, BP6243, F-14066 Caen Cedex 4France

Personalised recommendations