Abstract
Recent techniques based on error-correction enable the derivation of a secret key for the (varying) measured biometric data. Such techniques are opening the way towards broader uses of biometrics for security, beyond identification. In this paper, we propose a method based on fingerprints to associate, and further retrieve, a committed value which can be used as a secret for security applications. Unlike previous work, this method uses a stable and ordered representation of biometric data, which makes it of practical use.
Most of the research work that this article stems from was carried out by the authors at France Telecom Research and Development in Caen (France).
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bazen, A.M., Guerez, H.: Directional field computation for fingerprints based on the principal component analysis of local gradients. In: Proc. of 11th annual Workshop on Circuits, Systems and Signal Processing, 2000 (2000)
Bolle, R., Pankanti, S.: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, Norwell, MA, USA (1998)
Chang, E.-C., Li, Q.: Hiding secret points amidst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 59–72. Springer, Heidelberg (2006)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: WBMA 2003. Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pp. 45–52. ACM Press, New York (2003)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Jain, A., Prabhakar, S., Hong, L., Pankanti, S.: Filterbank-based fingerprint matching. Proc. of IEEE Transactions on Image Processing 9(5), 846–859 (2000)
Jain, A., Ross, A., Prabhakar, S.: Fingerprint matching using minutiae and texture features. In: ICIP. Proc. of International Conference on Image Processing, Thessaloniki, Greece, pp. 282–285 (October 2001)
Jain, A., Uludag, U.: Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence (2003)
Jain, A.K., Maltoni, D.: Handbook of Fingerprint Recognition. Springer, New York (2003)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: CCS 1999. Proceedings of the 6th ACM conference on Computer and communications security, pp. 28–36. ACM Press, New York (1999)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes, Part II. North-Holland, Amsterdam (1977)
Prabhakar, S.: Fingerprint Classification and Matching Using a Filterbank. PhD thesis
Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proc. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp. 13–16 (2004)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.: Biometric cryptosystems: Issues and challenges (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tong, V.V.T., Sibert, H., Lecœur, J., Girault, M. (2007). Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes. In: Lee, SW., Li, S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, vol 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-74549-5_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74548-8
Online ISBN: 978-3-540-74549-5
eBook Packages: Computer ScienceComputer Science (R0)