Abstract
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stallings, W.: Cryptography and Network Security, Pearson Ed. Inc (2003)
Maltoni, D., et al.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Bolle, R., Connell, J., Ratha, N.: Biometric Perils and Patches. Pattern Recognition 35, 2727–2738 (2002)
Schneier, B.: The Uses and Abuses of Biometrics. Communications of the ACM 42(8), 136 (1999)
Prabhakar, S., Pankanti, S., Jain, A.: Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, 33–42 (2003)
Uludag, U., et al.: Biometric Cryptosystems: Issues and Challenges. Proc. of IEEE 92(6), 948–960 (2004)
Maio, D., Maltoni, D.: A Secure Protocol for Electronic Commerce based on Fingerprints and En-cryption. In: Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519–525 (1999)
Davida, G., Frankel, Y., Matt, B.: On Enabling Secure Applications through Off-Line Biometric Identification. In: Proc. of Symp. on Privacy and Security, pp. 148–157 (1998)
Monrose, F., Reiter, M., Wetzel, S.: Password Hardening based on Keystroke Dynamics. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 73–82 (1999)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Proc. of ACM Conf. on Computer and Comm. Security, pp. 28–36 (1999)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of Symp. on Information Theory, p. 408 (2002)
Linnartz, J., Tuyls, P.: New Shielding Functions to Enhance Privacy and Prevent Misuse of Biomet-ric Templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Clancy, T., Kiyavash, N., Lin, D.: Secure Smartcard-based Fingerprint Authentica-tion. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)
Uludag, U., Pankanti, S., Jain, A.: Fuzzy Fingerprint Vault. In: Proc. of Workshop Bio-metrics: Challenges arising from Theory to Practice, pp. 13–16 (2004)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)
Ratha, N., Jain, A.: A Real-Time Matching System for Large Fingerprint Database. IEEE Trans on PAMI 18, 799–813 (1996)
Ahn, D., et al.: Specification of ETRI Fingerprint Database(in Korean). Technical Report – ETRI (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D. (2005). Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_31
Download citation
DOI: https://doi.org/10.1007/11599548_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30855-3
Online ISBN: 978-3-540-32424-9
eBook Packages: Computer ScienceComputer Science (R0)