Definition
Fingerprint hashing is merging fingerprint recognition and cryptographic methods. The aim is to perform a recognition using fingerprint while, at the same time, hiding the private information related to the fingerprint, thus enabling public fingerprint templates.
Introduction
Keeping a database in a safe place is not easy. Even with good encryption methods and special care, databases containing sensitive information, such as bank account numbers, are vulnerable to being compromised. Nobody wants something like that to happen when dealing with fingerprint identification.
Security of a fingerprint-based system can be divided into two main areas:
- 1.
The electronic security, which poses the question: “Is the electronic system, at the other end of the wires, a real trustful authorized fingerprint system?”
- 2.
The liveness security, which asks a...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cavoukian, A., Stoianov, A.: Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. White paper, Information and privacy commissioner of Ontario, March (2007)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption, chap. 22, McGraw-Hill (1999)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an off-line biometric based identification scheme. In: Proceedings of the Workshop on Coding and Cryptography, Paris, France, pp. 129–138 (1999)
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Fourth International Conference on Audio and Video based Biometric Person Authentication, Guildford, UK, pp. 393–402 (2003)
Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recognit. 40, 1057–4065 (2007)
Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable Fingerprint Biotokens: Accuracy and Security Analysis. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR’07), Minneapolis, USA, pp. 1–8, 17–22 June (2007)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Proceedings of the Eurocrypt 2004, pp. 523–540 (2004)
Burnett, A., Byrne, F., Dowling, T., Dury, A.: A biometric identity based signature scheme. In: Proceedings of the Applied Cryptography and Network Security Conference, New York, USA (2005)
Costanzo, C.R.: Biometric cryptography: Key generation using feature and parametric aggregation. Online techreport, School of Engineering and Applied Sciences, Department of Computer Science, The George Washington University, October (2004)
Al-Tarawneh, M.S., Khor, L.C., Woo, W.L., Dlay, S.S.: Crypto key generation using contour graph algorithm. In: Proceedings of the 24th IASTED International Multi-Conference Signal Processing, Pattern Recognition and Applications, Insbruck, Austria, February (2005)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceedings of the IEEE International Symposium on Information Theory, p. 408. IEEE Press (2002)
Chang, E.-C., Li, Q.: Hiding secret points amidst Chaff. In: Proceedings of the Eurocrypt, Saint Petersburg, Russia (2006)
Zheng, G., Li, W., Zhan, C.: Cryptographic key generation from biometric data using lattice mapping. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR’06), Washington, DC, USA, pp. 513–516. IEEE Computer Society (2006)
Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings on Workshop: Biometrics: Challenges Arising from Theory to Practice, August 2004, pp. 13–16 (2004)
Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault with helper data. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163–170 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
Mainguet, JF. (2009). Fingerprints Hashing. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_60
Download citation
DOI: https://doi.org/10.1007/978-0-387-73003-5_60
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73002-8
Online ISBN: 978-0-387-73003-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering