Skip to main content

A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle

  • Chapter
  • First Online:
Applied Computation and Security Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 305))

Abstract

Identity theft is a growing concern in the digital era. As per the US Federal Trade Commission, millions of people got victimized in each year [1]. Traditional authentication methods such as passwords and identity documents are not sufficient to combat ID theft or ensure security. Such representations of identity can easily be forgotten, lost, guessed, stolen, or shared. On the contrary, biometric systems recognize individuals based on their anatomical traits (e.g., fingerprint, face, palm print, iris, and voice) or behavioral traits (e.g., signature, gait). As such traits are physically linked to the user, biometric recognition is a natural and more reliable mechanism for ensuring that only legitimate or authorized users are able to enter a facility, access a computer system, or cross international borders. Biometric systems also offer unique advantages such as deterrence against repudiation and the ability to detect whether an individual has multiple identity cards (e.g., passports) under different names. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. In this paper, an attempt has been made to secure the biometric data using sudoku puzzle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. www.ftc.gov/opa/reporter/idtheft/index.shtml

  2. Roberts, C.: Biometric attack vectors and defenses. Comput. Secur. 26(1), 14–25 (2007)

    Article  Google Scholar 

  3. Jain, A.K., Ross, A., Uludag, U.: Biometric template security: challenges and solutions. In: Proceedings of the European Signal Processing Conference (EUSIPCO ’05), Antalya, Turkey, Sept 2005

    Google Scholar 

  4. Cukic, B., Bartlow, N.: Biometric system threats and countermeasures: a risk based approach. In: Proceedings of the Biometric Consortium Conference (BCC ’05), Crystal City, USA, Sept 2005

    Google Scholar 

  5. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)

    Article  Google Scholar 

  6. http://www.en.wikipedia.org/wiki/Pentomino

  7. http://www.en.wikipedia.org/wiki/Tetris

  8. Jussien, N.: A–Z of Sudoku. ISTE Ltd., USA (2007)

    Google Scholar 

  9. Lee, W.-M.: Programming Sudoku. Apress, USA (2006)

    Google Scholar 

  10. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)

    MATH  Google Scholar 

  11. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  12. Cavoukian, A., Stoianov, A.: Biometric encryption: a positive-sum technology that achieves strong authentication, security, and privacy. Technical Report, Office of the Information and Privacy Commissioner of Ontario, Toronto, Ontario, Canada, March 2007

    Google Scholar 

  13. Vetro, A., Memon, N.: Biometric system security. In: Proceedings of the Second International Conference on Biometrics, Seoul, South Korea, Aug 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arnab Kumar Maji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this chapter

Cite this chapter

Maji, A.K., Pal, R.K. (2015). A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1988-0_7

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1987-3

  • Online ISBN: 978-81-322-1988-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics