Abstract
A fuzzy extractor is a powerful but theoretical tool that can be used to extract uniform strings from (discrete) noisy sources. However, when using a fuzzy extractor in practice, extra features are needed, such as the renewability of the extracted strings and the ability to use the fuzzy extractor directly on continuous input data instead of discrete data. Our contribution is threefold. Firstly, we propose a fuzzy embedder as a generalization of the fuzzy extractor. A fuzzy embedder naturally supports renewability, as it allows a string to be embedded instead of extracted. It also supports direct analysis of quantization effects, as it makes no limiting assumptions about the nature of the input source. Secondly, we give a general construction for fuzzy embedders based on the technique of quantization index modulation (QIM). We show that the performance measures of a QIM, as proposed by the watermarking community, translate directly to the security properties of the corresponding fuzzy embedder. Finally, we show that from the perspective of the length of the embedded string, quantization in two dimensions is optimal. We present two practical constructions for a fuzzy embedder in two-dimensional space. The first construction is optimal from reliability perspective, and the second construction is optimal in the length of the embedded string.
Similar content being viewed by others
References
Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness using few independent sources. In: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS’04), vol. 45, pp. 384–393. Roma, Italy, Oct (2004)
Barron R.J., Chen B., Wornell G.W.: The duality between information embedding and source coding with side information and some applications. IEEE Trans. Inf. Theory 49(5), 1159–1180 (2003)
Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington DC, USA pp. 82–91. ACM, Oct (2004)
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Ronald, C., (ed.) Advances in Cryptology, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005), Aarhus, Denmark volume 3494 of Lecture Notes in Computer Science, pp. 147–163. Springer, May (2005)
Buhan, I.R., Doumen, J., Hartel, P.H.: Controling leakage of biometric information using dithering. In: Proceedings of the 16th European Signal Processing Conference (EUSIPCO), Lausanne, Switzerland EUSIPCO. European Association for Signal, Speech and Image Processing, EURASIP, Aug (2008)
Buhan, I.R., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: Deng, R., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, pp. 353–355, New York, March (2007). ACM. (Subsumed by Chapter 3 of this thesis, except examples)
Chang, E.C., Li, Q.: Hiding secret points amidst chaff. In: Serge, V., (ed.) 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Saint Petersburg, Russia volume 4004 of Lecture Notes on Computer Science, pp. 59–72. Springer, May (2006)
Chang, Y.J., Zhang, W., Chen, T.: Biometrics-based cryptographic key generation. In IEEE International Conference on Multimedia and Expo (ICME’04), Taipei, Taiwan, pp. 2203–2206. IEEE Computer Society, June (2004)
Chen B., Wornell G.W.: Dither modulation: a new approach to digital watermarking and information embedding. Proc. SPIE Secur. Watermarking Multimed. Contents 3657, 342–353 (1999)
Chen B., Wornell G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. J. VLSI Signal Process., Springer, Netherlands 27(1–2), 7–33 (2001)
Chen, C., Veldhuis, R.N.J., Kevenaar, T.A.M., Akkermans, A.H.M.: Multi-bits biometric string generation based on the likelyhood ratio. In: IEEE Conference on Biometrics: Theory, Applications and Systems (BTAS’07), Washinton, DC, pp. 1–6. IEEE Computer Society, Sept (2007)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2004), Interlaken, Switzerland volume 3027 of Lecture Notes in Computer Science, pp. 523–540. Springer, May (2004)
Dodis, Y. and Smith, A.: Correcting errors without leaking partial information. In: Gabow H.N., Fagin, R. (eds.) Proceedings of the 37th Annual ACM Symposium on Theory of Computing(STOC), pp. 654–663. ACM, Baltimore, MD, USA, May (2005)
Gersho A.: Principles of quantization. IEEE Trans. Circuits Syst. 25(7), 427–436 (1978)
Gersho A.: Asymptotically optimal block quantization. IEEE Trans. Inf. Theory 25(4), 373–380 (1979)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS). Singapore, pp. 28–36. ACM SIGSAC, Nov (1999)
Kabatiansky G.A., Levenshtein V.I.: Bounds for packings on a sphere and in space. Probl. Peredachi Informatsii 1, 3–25 (1978)
Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Lai, X., Chen, K., (eds.) Advances in Cryptology 12th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2006), Shanghai, China volume 4284 of Lecture Notes in Computer Science, pp. 99–113. Springer, Dec (2006)
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S., (eds.) 4th International Conference on Audio-and Video-Based Biometrie Person Authentication (AVBPA 2003), Guildford, UK volume 2688 of Lecture Notes in Computer Science, pp. 393–402. Springer, June (2003)
Maurer, U.: Perfect cryptographic security from partially independent channels. In: Proceedings of the 23rd ACM Symposium on Theory of Computing (STOC), New Orleans, Louisiana, USA, pp. 561–572. ACM Press, Aug (1991)
Maurer U.: Secret key agreement by public discussion. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)
Moulin P., Koetter R.: Data-hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)
Skoric, B., Tuyls, P., Ophey, W.: Robust key extraction from physical uncloneable functions. In: Ioannidis, J., Keromytis, A.D., Yung, M., (eds.) Applied Cryptography and Network Security (ACNS 2005), New York, NY, USA volume 3531 of Lecture Notes in Computer Science, pp. 407–422. Springer, June (2005)
Ta-Shma, A.: On extracting randomness from weak random sources (extended abstract). Proceedings of the twenty-eighth annual ACM symposium on Theory of computing (STOC 1996), Philadephia, Pennsylvania, USA 28, 276–285, May 1996
Trevisan, L., Vadhan, S.: Extracting randomness from samplable distributions. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science,Redondo Beach, CA, USA, volume 41, pp. 32–42. IEEE Computer Society, (2000)
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., Veldhuis, R.: Practical biometric authentication with template protection. In: Takeo, K., Anil K.J., Nalini K.R. (eds.) Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA 2005), Hilton Rye Town, NY, USA volume 3546 of Lecture Notes in Computer Science, pp. 436–446. Springer, July (2005)
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) Proceedings of International Workshop on Biometric Authentication (ECCV 2004), Prague, Czech Republic volume 3087 of Lecture Notes in Computer Science, pp. 158–170. Springer, May (2004)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A.K., Ratha, N.K. (eds.) Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, (AVBPA 2005) Hilton Rye Town, NY, USA volume 3546 of Lecture Notes in Computer Science pp. 310–319. Springer, July (2005)
Uludag U., Pankanti S., Prabhakar S., Jain A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
Zeger K., Gersho A.: Number of nearest neighbors in a euclidean code. IEEE Trans. Inf. Theory 40(5), 1647–1649 (1994)
Zhang, W., Chang, Y.J., Chen, T.: Optimal thresholding for key generation based on biometrics. In: Proceedings of the IEEE 2004 International Conference on Image Processing (ICIP 2004), Singapore pp. 3451–3454. IEEE Computer Society, Oct (2004)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Buhan, I., Doumen, J., Hartel, P. et al. Embedding renewable cryptographic keys into noisy data. Int. J. Inf. Secur. 9, 193–208 (2010). https://doi.org/10.1007/s10207-010-0103-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-010-0103-4