Abstract
Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications. In order to correct inevitable noise during scanning and processing, a known approach extracts and publishes an additional information, known as secure sketch from the minutiae. During subsequent scanning, the sketch aids in correcting the noise to give the consistent bits. However, for minutiae (represented as 2D point set), known constructions produce sketches that are large, and are difficult to adapt to slight variations of the 2D point representation. Furthermore, even with simplified model on the noise and distribution of the minutiae, it is not clear what is the entropy of the bits extracted. To overcome the problems, we suggest using a locality preserving hash in sketch construction. We give a method that produces a small sketch and thus suitable for applications involving mobile devices. Since the sketch size is small, with a reasonable assumption, we can estimate the entropy of the secret bits extracted. In addition, we can incorporate statistical properties of the noise, and distribution of the minutiae in fine-tuning the method. Our method also includes registration of fingerprints. Experiments conducted on 4000 fingerprint images from the NIST 4 database show promising results. Assuming that an intermediate representation is uniformly distributed, with FNMR = 0.09% we are able to extract about 8 secret bits (by a conservative estimate) or 10 bits (with certain assumption on the underlying codebook).
Chapter PDF
Similar content being viewed by others
References
Buhan, I., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: ASIACCS, pp. 353–355 (2007)
Chang, E.-C., Fedyukovych, V., Li, Q.: Secure sketch for multi-sets. Cryptology ePrint Archive, Report 2006/090 (2006)
Chang, E.-C., Li, Q.: Hiding secret points amongst chaff. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
Chang, E.-C., Shen, R., Teo, W.: Finding the original point set hideen among chaff. In: Proc. ACM Sym on Information, Computer and Communications Security, ACM Press, New York (2006)
Chikkerur, S., Ratha, N.: Impact of singular point detection on fingerprint matching performance. In: IEEE AUTOID, IEEE Computer Society Press, Los Alamitos (2005)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcardbased fingerprint authentication. In: ACM SIGMM workshop on Biometrics methods and applications, pp. 45–52. ACM Press, New York (2003)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE Intl. Symp. on Information Theory, IEEE Computer Society Press, Los Alamitos (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conf. on Computer and Communications Security, pp. 28–36. ACM Press, New York (1999)
Linnartz, J.-P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393–402. Springer, Heidelberg (2003)
Nilsson, K.: Localization of corresponding points in fingerprints by complex filtering. PhD thesis, Chalmers University of Technology, Sweden (2005)
Verbauwhede, I.M., Yang, S.: Secure fuzzy vault based fingerprint verification system. In: 38th Asilomar Conf. on Signals, Systems, and Computers, vol. 1, pp. 577–581 (2004)
Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, IEEE Computer Society Press, Los Alamitos (2006)
Watson, C., Garris, M., Tabassi, E., Wilson, C., McCabe, R., Janet, S.: NIST fingerprint image software 2. NIST Special Database (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, EC., Roy, S. (2007). Robust Extraction of Secret Bits from Minutiae. In: Lee, SW., Li, S.Z. (eds) Advances in Biometrics. ICB 2007. Lecture Notes in Computer Science, vol 4642. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74549-5_79
Download citation
DOI: https://doi.org/10.1007/978-3-540-74549-5_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74548-8
Online ISBN: 978-3-540-74549-5
eBook Packages: Computer ScienceComputer Science (R0)