Advertisement

A Critical Comparison of Fingerprint Fuzzy Vault Techniques

  • Hachemi Nabil Dellys
  • Noussaiba Benadjimi
  • Meriem Romaissa Boubakeur
  • Layth SlimanEmail author
  • Karima Benatchba
  • Saliha Artabaz
  • Mouloud Koudil
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9429)

Abstract

Fuzzy Vault is an interesting error tolerant method to encrypt data. This method has been widely used in the field of biometrics because of the unstable nature of captured biometric modalities. In this paper, we present main works on Fuzzy Vault when used to secure fingerprint templates. We describe the contributions proposed in different stages of the two Fuzzy Vault phases. The purpose of this work is to show the implementation to be chosen at each stage of a specific Fuzzy Vault application. To this end, in this paper, we conduct a comparative study of these works from a theoretical point of view, and according to some practical criteria.

Keywords

Fuzzy vault Fingerprint Interpolation Feature extraction Feature representation 

References

  1. 1.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of the 2002 IEEE International Symposium on Information Theory (2002)Google Scholar
  2. 2.
    Nguyen, T.H., Wang, Y., Ha, Y., Li, R.: Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints. IET Biometrics 4(1), 29–39 (2015)CrossRefGoogle Scholar
  3. 3.
    Brindha, V.E.: Finger knuckle print as unimodal fuzzy vault implementation. Procedia Comput. Sci. 47, 205–213 (2015)CrossRefGoogle Scholar
  4. 4.
    Tams, B.: Unlinkable minutiae-based fuzzy vault for multiple fingerprints. In: IET Biometric (2015)Google Scholar
  5. 5.
    Bringer, J., Favre, M., Pelle, C., Saxce, H.: Fuzzy vault and template-level fusion applied to a binary fingerprint representation. In: Biometrics Special Interest Group (BIOSIG) (2014)Google Scholar
  6. 6.
    Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Conference on Computer Vision and Pattern Recognition Workshop 2006 (CVPRW 2006). IEEE (2006)Google Scholar
  7. 7.
    Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237–257 (2006)zbMATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Zhou, R., et al.: Adaptive sift-based algorithm for specific fingerprint verification. In: International Conference on Hand-Based Biometrics (ICHB). IEEE (2011)Google Scholar
  9. 9.
    Jeffers, J., Arakala, A.: Fingerprint alignment for a minutiae-based fuzzy vault. In: Biometrics Symposium. IEEE (2007)Google Scholar
  10. 10.
    Lee, S., et al.: Analysis of tradeoffs among verification accuracy, memory consumption, and execution time in the GH-based fuzzy fingerprint vault. In: International Conference on Security Technology 2008 (SECTECH 2008). IEEE (2008)Google Scholar
  11. 11.
    Choi, W., et al.: Apparatus and method for polynomial reconstruction in fuzzy vault system. Google Patents (2012)Google Scholar
  12. 12.
    Khalil-Hani, M., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener. Comput. Syst. 29(3), 800–810 (2013)CrossRefGoogle Scholar
  13. 13.
    Nguyen, T.H., et al.: A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: International Conference on Signal Processing, Communication and Computing (ICSPCC). IEEE (2013)Google Scholar
  14. 14.
    Nandakumar, K., Nagar, A., Jain, A.K.: Hardening fingerprint fuzzy vault using password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927–937. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Moon, D., et al.: Implementation of automatic fuzzy fingerprint vault. In: International Conference on Machine Learning and Cybernetics. IEEE (2008)Google Scholar
  16. 16.
    Jeffers, J., Arakala, A.: Minutiae-based structures for a fuzzy vault. In: Biometric Consortium Conference, 2006 Biometrics Symposium: Special Session on Research IEEE (2006)Google Scholar
  17. 17.
    Xi, K., Hu, J.: Biometric mobile template protection: a composite feature based fingerprint fuzzy vault. In: IEEE International Conference on Communications 2009 (ICC 2009). IEEE (2009)Google Scholar
  18. 18.
    AlTarawneh, M., Woo, W., Dlay, S.: Fuzzy vault crypto biometric key based on fingerprint vector features. In: 6th International Symposium on Communication Systems, Networks and Digital Signal Processing 2008 (CNSDSP 2008). IEEE (2008)Google Scholar
  19. 19.
    Harmer, K., et al.: Fuzzy vault fingerprint smartcard implementation using an orientation-based feature vector. In: BLISS (2008)Google Scholar
  20. 20.
    Park, U., Pankanti, S., Jain, A.: Fingerprint verification using SIFT features. In: SPIE Defense and Security Symposium on International Society for Optics and Photonics (2008)Google Scholar
  21. 21.
    Khachatryan, G., Jivanyan, A., Khasikyan, H.: Alignment-free fuzzy vault scheme for fingerprints (2013)Google Scholar
  22. 22.
    Moon, D., et al.: Fuzzy fingerprint vault using multiple polynomials. In: 13th International Symposium on Consumer Electronics 2009 (ISCE 2009). IEEE (2009)Google Scholar
  23. 23.
    Örencik, C., et al.: Improved fuzzy vault scheme for fingerprint verification (2008)Google Scholar
  24. 24.
    Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition 2008 (ICPR 2008). IEEE (2008)Google Scholar
  25. 25.
    Krivokuća, V., Abdulla, W., Swain, A.: A dissection of fingerprint fuzzy vault schemes. In: Proceedings of the 27th Conference on Image and Vision Computing New Zealand. ACM (2012)Google Scholar
  26. 26.
    Sood, P., Kaur, M.: Methods of automatic alignment of fingerprint in fuzzy vault: a review. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS). IEEE (2014)Google Scholar
  27. 27.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. Inf. Forensics Secur. IEEE Trans. 2(4), 744–757 (2007)CrossRefGoogle Scholar
  28. 28.
    Alibeigi, E., Rizi, M.T., Behnamfar, P.: Pipelined minutiae extraction from fingerprint images. In: Canadian Conference on Electrical and Computer Engineering 2009 (CCECE 2009). IEEE (2009)Google Scholar
  29. 29.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  30. 30.
    Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications. ACM (2003)Google Scholar
  31. 31.
    Yang, S., Verbauwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: IEEE International Conference on Acoustics, Speech and Signal Processing 2005 Proceedings (ICASSP 2005)Google Scholar
  32. 32.
    Fei, S., et al.: Fingerprint singular points extraction based on the properties of orientation model. J. Chin. Univ. Posts Telecommun. 18(1), 98–104 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Hachemi Nabil Dellys
    • 1
  • Noussaiba Benadjimi
    • 1
  • Meriem Romaissa Boubakeur
    • 1
  • Layth Sliman
    • 2
    Email author
  • Karima Benatchba
    • 1
  • Saliha Artabaz
    • 1
  • Mouloud Koudil
    • 1
  1. 1.Laboratoire de Méthodes de Conception de Systèmes (LMCS)Ecole nationale Supérieure en Informatique (ESI)Oued-Smar, AlgiersAlgeria
  2. 2.Ecole d’Ingénieur Informatique et technologies du numérique (EFREI)ParisFrance

Personalised recommendations