Encyclopedia of Biometrics

2009 Edition
| Editors: Stan Z. Li, Anil Jain

Fingerprints Hashing

  • Jean-François Mainguet
Reference work entry
DOI: https://doi.org/10.1007/978-0-387-73003-5_60

Synonyms

Definition

Fingerprint hashing is merging fingerprint recognition and cryptographic methods. The aim is to perform a recognition using fingerprint while, at the same time, hiding the private information related to the fingerprint, thus enabling public fingerprint templates.

Introduction

Keeping a database in a safe place is not easy. Even with good encryption methods and special care, databases containing sensitive information, such as bank account numbers, are vulnerable to being compromised. Nobody wants something like that to happen when dealing with fingerprint identification.

Security of a fingerprint-based system can be divided into two main areas:
  1. 1.

    The electronic security, which poses the question: “Is the electronic system, at the other end of the wires, a real trustful authorized fingerprint system?”

     
  2. 2.

    The liveness security, which asks a...

This is a preview of subscription content, log in to check access.

References

  1. 1.
    Cavoukian, A., Stoianov, A.: Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. White paper, Information and privacy commissioner of Ontario, March (2007)Google Scholar
  2. 2.
    Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption, chap. 22, McGraw-Hill (1999)Google Scholar
  3. 3.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRefGoogle Scholar
  4. 4.
    Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an off-line biometric based identification scheme. In: Proceedings of the Workshop on Coding and Cryptography, Paris, France, pp. 129–138 (1999)Google Scholar
  5. 5.
    Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, UK, pp. 393–402 (2003)Google Scholar
  6. 6.
    Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recognit. 40, 1057–4065 (2007)zbMATHCrossRefGoogle Scholar
  7. 7.
    Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable Fingerprint Biotokens: Accuracy and Security Analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’07), Minneapolis, USA, pp. 1–8, 17–22 June (2007)Google Scholar
  8. 8.
    Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of the Eurocrypt 2004, pp. 523–540 (2004)Google Scholar
  9. 9.
    Burnett, A., Byrne, F., Dowling, T., Dury, A.: A biometric identity based signature scheme. In: Proceedings of the Applied Cryptography and Network Security Conference, New York, USA (2005)Google Scholar
  10. 10.
    Costanzo, C.R.: Biometric cryptography: Key generation using feature and parametric aggregation. Online techreport, School of Engineering and Applied Sciences, Department of Computer Science, The George Washington University, October (2004)Google Scholar
  11. 11.
    Al-Tarawneh, M.S., Khor, L.C., Woo, W.L., Dlay, S.S.: Crypto key generation using contour graph algorithm. In: Proceedings of the 24th IASTED International Multi-Conference Signal Processing, Pattern Recognition and Applications, Insbruck, Austria, February (2005)Google Scholar
  12. 12.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceedings of the IEEE International Symposium on Information Theory, p. 408. IEEE Press (2002)Google Scholar
  13. 13.
    Chang, E.-C., Li, Q.: Hiding secret points amidst Chaff. In: Proceedings of the Eurocrypt, Saint Petersburg, Russia (2006)Google Scholar
  14. 14.
    Zheng, G., Li, W., Zhan, C.: Cryptographic key generation from biometric data using lattice mapping. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR’06), Washington, DC, USA, pp. 513–516. IEEE Computer Society (2006)Google Scholar
  15. 15.
    Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings on Workshop: Biometrics: Challenges Arising from Theory to Practice, August 2004, pp. 13–16 (2004)Google Scholar
  16. 16.
    Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault with helper data. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163–170 (2006)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Jean-François Mainguet
    • 1
  1. 1.Grenoble France