Abstract
User authentication using fingerprint information provides convenience as well as strong security at the same time. However, serious problems may cause if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers. Recently, research in fuzzy fingerprint vault system has been carried out actively to safely protect fingerprint information in a fingerprint authentication system. In this paper, we propose hardware architecture for a geometric hashing based fuzzy fingerprint vault system. The proposed architecture consists of the software module and hardware module. The hardware module performs the matching for the transformed minutiae in the enrollment and verification hash table. We also propose a hardware architecture which parallel processing technique is applied for high speed processing.
Chapter PDF
Similar content being viewed by others
References
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault with helper data. In: Conf. on Computer Vision and Pattern Recognition Workshop, pp. 163–172 (2006)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p. 408 (2002)
Clancy, T., Kiyavash, N., Lin, D.: Secure smartcard-based fingerprint authentication. ACM SIGMM Multim., Biom. Met. & App., 45–52 (2003)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)
Lee, S., Moon, D., Jung, S., Chung, Y.: Protecting secret keys with fuzzy fingerprint vault based on a 3D geometric hash table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 432–439. Springer, Heidelberg (2007)
Wolfson, H., Rigoutsos, I.: Geometric hashing: an overview. IEEE Computational Science and Engineering 4, 10–21 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, S.J., Chae, SH., Pan, S.B. (2010). VLSI Architecture of the Fuzzy Fingerprint Vault System. In: Schwenker, F., El Gayar, N. (eds) Artificial Neural Networks in Pattern Recognition. ANNPR 2010. Lecture Notes in Computer Science(), vol 5998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12159-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-12159-3_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12158-6
Online ISBN: 978-3-642-12159-3
eBook Packages: Computer ScienceComputer Science (R0)