Abstract
Biometrics-based authentication is playing an attractive and potential approach nowadays. However, the end-users do not feel comfortable to use it once the performance and security are not ensured. Fuzzy vault is one of the most popular methods for biometric template security. It binds a key with the biometric template and obtains the helper data. However, the main problem of fuzzy vault is that it is unable to guarantee the revocability property. In addition, most of the fuzzy vault schemes are performed on two biometrics modalities, fingerprints and iris. In previous works, authors suggested some cancelable transformations attached to a fuzzy vault scheme to overcome these weaknesses. However, the computational cost of these proposals was quite large. In this paper, we present a new hybrid scheme of fuzzy vault and periodic function-based feature transformation for biometric template protection. Our transformation is not only simpler but also suitable for many kinds of biometrics modalities. The newly proposed fuzzy vault scheme guarantees the revocability property with an acceptable error rate.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Ratha, N., Chikkerur, S., Connell, J., Bolle, R.: Privacy Enhancements for Inexact Biometric Templates. In: Security with Noisy Data, pp. 153–168. Springer, London (2007)
Salomon, D.: Elements of Computer Security. Springer (2010). 978-0-85729-005-2
Maio, D., Jain, A.K.: Handbook of fingerprint recognition. Springer (2009)
Clancy, T C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45–52. ACM (2003)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)
Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings of Workshop Biometrics: Challenges Arising from Theory to Practice, pp. 13–16 (2004)
Lee, Y.-J., Bae, K., Lee, S.-J., Park, K.R., Kim, J.H.: Biometric key binding: Fuzzy vault based on iris images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800–808. Springer, Heidelberg (2007)
Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)
Jain, A.K., Nandakumar, K, Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing 2008(113) (2008)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Huỳnh, V.Q.P., Thai, T.T.T., Dang, T.K., Wagner, R.: A Combination of ANN and Secure Sketch for Generating Strong Biometric Key. Journal of Science and Technology, Vietnamese Academy of Science and Technology 51(4B), 203–212 (2013). ISSN 0866-708X
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)
Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38(2), 237–257 (2006)
Vo, T.T.L., Dang, T.K., Küng, J.: A Hash-Index Method for Securing Fuzzy Vaults. In: Eckert, C., Katsikas, Sokratis K., Pernul, G. (eds.) TrustBus 2014. LNCS, vol. 8647, pp. 60–71. Springer, Heidelberg (2014)
Wu, Y., Qiu, B.: Transforming a pattern identifier into biometric key generators. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 78–82 (2010)
Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Proceedings of the Biometrics Symposium, Baltimore, Md, USA (September 2007)
Nguyen, M.T., Truong, Q.H., Dang, T.K.: Enhance Fuzzy Vault Security using Nonrandom Chaff Point Generator. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., Küng, J., Thoai, N. (eds.) FDSE 2014. LNCS, vol. 8860, pp. 204–219. Springer, Heidelberg (2014)
Jin, A.T.B., Ling, D.N.C., Goh, A.: Bio hashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11), 2245–2255 (2004)
Kanade, S., et al.: Three factor scheme for biometric-based cryptographic key regeneration using iris. In: Biometrics Symposium 2008 (BSYM 2008), pp. 59–64. IEEE (2008)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)
Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 111–116. ACM (2005)
Baek, K., Draper, B.A., Beveridge, J.R., She, K.: PCA vs. ICA: A Comparison on the FERET Data Set. In: Proc. of the 4th International Conference on Computer Vision (ICCV 2002), pp. 824–827 (2002)
Nguyen, V.N., Nguyen, V.Q., Nguyen, M.N.B., Dang, T.K.: Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication System. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) CT-EurAsia 2014. LNCS, vol. 8407, pp. 365–374. Springer, Heidelberg (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Le, T.T.B., Dang, T.K., Truong, Q.C., Nguyen, T.A.T. (2014). Protecting Biometric Features by Periodic Function-Based Transformation and Fuzzy Vault. In: Hameurlain, A., Küng, J., Wagner, R., Dang, T., Thoai, N. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI. Lecture Notes in Computer Science(), vol 8960. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45947-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-45947-8_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45946-1
Online ISBN: 978-3-662-45947-8
eBook Packages: Computer ScienceComputer Science (R0)