Abstract
Biometric is proved to be an exceptional tool for identifying an individual. Security of biometric template is the most challenging aspect of biometric identification system. Storing the biometric template in the database increases the chance of compromising it which may lead to misuse of the individual identity. This paper proposes a novel and computationally simpler approach to store a biometric sample in the form of template by using cryptographic salts. Use of Personal Image Identification (PII) makes the proposed algorithm more robust and adds another level of security. The saltcrypted templates are created and stored instead of storing the actual sample behaving as a fuzzy vault. The algorithm has been analytically proved computationally simple compared to the existing template security mechanisms. The fuzzy structure of saltcrypted template is entirely dependent on user interaction through PII. Actual template is not stored at any point of time which adds new dimension to the security and hence to individual identity.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Jain, A., Ross, A., Uludag, U.: Biometric template security: Challenges and solutions. In: Proceedings of European Signal Processing Conference (EUSIPCO), pp. 469–472 (2005)
Jain, A.K., Nandakumar, K., Nagar, A.: Review Article Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 (2008), doi:10.1155/2008/579416
Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12), 1892–1901 (2006)
Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfacesversusfisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and MachineIntelligence 9(7), 711–720 (1997)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactionson Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Symposium on Information Theory, vol. 6(3), p. 408 (2002)
Brindha, E.: Biometric Template Security using Fuzzy Vault. In: IEEE 15th International Symposium on Consumer Electronics (2011)
Clancy, T., et al.: Secure Smartcard-based Fingerprint Authentication. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Nandakumar, et al.: Fingerprint-based Fuzzy Vault: Implementation and Performance. EEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)
Yang, S., Verbauwhede, I.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609–612 (2005)
Chung, Y., Moon, D.-s., Lee, S.-J., Jung, S.-H., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)
Moon, D., et al.: Configurable Fuzzy Fingerprint Vault for Match-on-Card System. IEICE Electron Express 6(14), 993–999 (2009)
Zhang, P., Hu, J., Li, C., Bennamound, M., Bhagavatulae, V.: A Pitfall in Fingerprint Bio-Cryptographic Key Generation. In: Computers and Security. Elsevier (2011)
Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)
Yang, S., Verbauwhede, I.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609–612 (2005)
Zhe, J.: Fingerprint Template Protection with Minutia Vicinity Decomposition. ©2011 IEEE (2011) 9781- 4577-1359-0/11/$26.00
Sharma, N., Rathi, R., Jain, V., Saifi, M.W.: A novel technique for secure information transmission in videos using salt cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE), December 6-8, pp. 1–6 (2012)
Santhi, B., Ramkumar, K.: Novel hybrid Technology in ATM security using Biometrics. Journal of Theoretical and Applied Information Technology 37(2) ISSN: 1992- 8645
Moon, D.-s., Lee, S.-J., Jung, S.-H., Chung, Y., Park, M., Yi, O.: Fingerprint Template Protection Using Fuzzy Vault. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1141–1151. Springer, Heidelberg (2007)
Uludag, U., Pankanti, S., Jain, A.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)
Long, T.B., Thai, L.H., Hanh, T.: Multimodal Biometric Person Authentication Using Fingerprint, Face Features. In: Anthony, P., Ishizuka, M., Lukose, D. (eds.) PRICAI 2012. LNCS, vol. 7458, pp. 613–624. Springer, Heidelberg (2012)
Qader, H.A., Ramli, A.R., Al-Haddad, S.: Fingerprint Recognition Using Zernike Moments. The International Arab Journal of Information Technology 4(4) (October 2007)
Shrivastava, R., Thakur, S.: Performance Analysis of Fingerprint Based Biometric Authentication System using RSA. Engineering Universe for Scientific Research and Management 6(2) (February 2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Khandelwal, S., Gupta, P.C. (2015). Implementation of Secure Biometric Fuzzy Vault Using Personal Image Identification. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-13728-5_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13727-8
Online ISBN: 978-3-319-13728-5
eBook Packages: EngineeringEngineering (R0)