Skip to main content

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault

  • Conference paper
Book cover Information Security and Cryptology (CISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3822))

Included in the following conference series:

Abstract

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stallings, W.: Cryptography and Network Security, Pearson Ed. Inc (2003)

    Google Scholar 

  2. Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)

    MATH  Google Scholar 

  3. Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  MATH  Google Scholar 

  4. Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)

    Article  Google Scholar 

  5. Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33–42 (2003)

    Google Scholar 

  6. Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges. Proc. of IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  7. Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and En-cryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)

    Google Scholar 

  8. Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)

    Google Scholar 

  9. Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82 (1999)

    Google Scholar 

  10. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 28–36 (1999)

    Google Scholar 

  11. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)

    Google Scholar 

  12. Linnartz, J., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biomet-ric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentica-tion. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)

    Google Scholar 

  15. Uludag, U., Pankanti, S., Jain, A.: Fuzzy Fingerprint Vault. In: Proc. of Workshop Bio-metrics: Challenges arising from Theory to Practice, pp. 13–16 (2004)

    Google Scholar 

  16. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)

    Article  Google Scholar 

  18. Ratha, N., Jain, A.: A Real-Time Matching System for Large Fingerprint Database. IEEE Trans on PAMI 18, 799–813 (1996)

    Google Scholar 

  19. Ahn, D., et al.: Specification of ETRI Fingerprint Database(in Korean). Technical Report – ETRI (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D. (2005). Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_31

Download citation

  • DOI: https://doi.org/10.1007/11599548_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30855-3

  • Online ISBN: 978-3-540-32424-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics