VLSI Architecture of the Fuzzy Fingerprint Vault System

  • Sung Jin Lim
  • Seung-Hoon Chae
  • Sung Bum Pan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5998)


User authentication using fingerprint information provides convenience as well as strong security at the same time. However, serious problems may cause if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers. Recently, research in fuzzy fingerprint vault system has been carried out actively to safely protect fingerprint information in a fingerprint authentication system. In this paper, we propose hardware architecture for a geometric hashing based fuzzy fingerprint vault system. The proposed architecture consists of the software module and hardware module. The hardware module performs the matching for the transformed minutiae in the enrollment and verification hash table. We also propose a hardware architecture which parallel processing technique is applied for high speed processing.


Fingerprint authentication fuzzy vault geometric hashing fuzzy fingerprint vault 


  1. 1.
    Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)zbMATHGoogle Scholar
  2. 2.
    Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault with helper data. In: Conf. on Computer Vision and Pattern Recognition Workshop, pp. 163–172 (2006)Google Scholar
  3. 3.
    Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium on Information Theory, p. 408 (2002)Google Scholar
  4. 4.
    Clancy, T., Kiyavash, N., Lin, D.: Secure smartcard-based fingerprint authentication. ACM SIGMM Multim., Biom. Met. & App., 45–52 (2003)Google Scholar
  5. 5.
    Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)Google Scholar
  6. 6.
    Chung, Y., Moon, D., Lee, S., Jung, S., Kim, T., Ahn, D.: Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Lee, S., Moon, D., Jung, S., Chung, Y.: Protecting secret keys with fuzzy fingerprint vault based on a 3D geometric hash table. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 432–439. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Wolfson, H., Rigoutsos, I.: Geometric hashing: an overview. IEEE Computational Science and Engineering 4, 10–21 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Sung Jin Lim
    • 1
  • Seung-Hoon Chae
    • 1
  • Sung Bum Pan
    • 1
    • 2
  1. 1.Dept. of Information and Communication EngineeringChosun Univ.GwangjuKorea
  2. 2.Dept. of Control, Instrumentation, and Robot EngineeringChosun Univ.GwangjuKorea

Personalised recommendations