Abstract
Identity theft is a growing concern in the digital era. As per the US Federal Trade Commission, millions of people got victimized in each year [1]. Traditional authentication methods such as passwords and identity documents are not sufficient to combat ID theft or ensure security. Such representations of identity can easily be forgotten, lost, guessed, stolen, or shared. On the contrary, biometric systems recognize individuals based on their anatomical traits (e.g., fingerprint, face, palm print, iris, and voice) or behavioral traits (e.g., signature, gait). As such traits are physically linked to the user, biometric recognition is a natural and more reliable mechanism for ensuring that only legitimate or authorized users are able to enter a facility, access a computer system, or cross international borders. Biometric systems also offer unique advantages such as deterrence against repudiation and the ability to detect whether an individual has multiple identity cards (e.g., passports) under different names. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. In this paper, an attempt has been made to secure the biometric data using sudoku puzzle.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Roberts, C.: Biometric attack vectors and defenses. Comput. Secur. 26(1), 14–25 (2007)
Jain, A.K., Ross, A., Uludag, U.: Biometric template security: challenges and solutions. In: Proceedings of the European Signal Processing Conference (EUSIPCO ’05), Antalya, Turkey, Sept 2005
Cukic, B., Bartlow, N.: Biometric system threats and countermeasures: a risk based approach. In: Proceedings of the Biometric Consortium Conference (BCC ’05), Crystal City, USA, Sept 2005
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)
Jussien, N.: A–Z of Sudoku. ISTE Ltd., USA (2007)
Lee, W.-M.: Programming Sudoku. Apress, USA (2006)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Berlin (2003)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
Cavoukian, A., Stoianov, A.: Biometric encryption: a positive-sum technology that achieves strong authentication, security, and privacy. Technical Report, Office of the Information and Privacy Commissioner of Ontario, Toronto, Ontario, Canada, March 2007
Vetro, A., Memon, N.: Biometric system security. In: Proceedings of the Second International Conference on Biometrics, Seoul, South Korea, Aug 2007
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this chapter
Cite this chapter
Maji, A.K., Pal, R.K. (2015). A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_7
Download citation
DOI: https://doi.org/10.1007/978-81-322-1988-0_7
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1987-3
Online ISBN: 978-81-322-1988-0
eBook Packages: EngineeringEngineering (R0)