Abstract
Traditional cryptography helps to protect information and establish secure interactions by using a cryptographic key to encode/decode user secret data. The problem related to managing such keys has gained much attention from the research as well as commercial communities, but there exists many security concerns that are still open. Such limitations can be solved by Biometric Cryptosystems (BCSs). We propose a method to help increasing the security level of one of the most popular key-binding BCSs: Fuzzy Vault. We remove x-coordinates out of the vault while indexing y-coordinates by evaluation of corresponding x-coordinate values based on a suitable hash function. We carry out experiments on a Fuzzy Vault scheme based on iriscode. Our method has increased the min-entropy to 52 bits (it was 40 bits in the original scheme) and reduced the size of the vault dramatically. The proposed method also helps to prevent attacks via record multiplicity and stolen key attacks.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Cavoukian, A., Stoianov, A.: Biometric Encryption. In: Encyclopedia of Biometrics, pp. 260–269. Springer (2009)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractor: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Huynh Van, Q.P., Thai, T.T.T., Dang, T.K., Wagner, R.: A Combination of ANN and Secure Sketch for Generating Strong Biometric Key. Journal of Science and Technology, Vietnamese Academy of Science and Technology 51(4B), 203–212 (2013)
Dang, T.T., Truong, Q.C., Dang, T.K.: Practical Constructions of Face-based Authentication Systems with Template Protection Using Secure Sketch. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 121–130. Springer, Heidelberg (2013)
Truong, Q.C., Le, T.B.T., Nguyen, T.A.T., Dang, T.K.: A Hybrid Scheme of Fuzzy Vault and Feature Transformation for Biometric Template Protection. Journal of Science and Technology, Vietnamese Academy of Science and Technology 51(4B), 30–39 (2013) ISSN 0866-708X
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proc. of IEEE, International Symposium on Information Theory, p. 408 (2002)
Chang, E.-C., Shen, R., Teo, F.W.: Finding the Original Point Set Hidden among Chaff. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security, pp. 182–188 (2006)
Ăllescu, P.M.: The Fuzzy Vault Fingerprints is Vulnerable to Brute Force Attack. In: Proceedigs of the International Conference of Biometrics Special Interest Group (BIOSIG), pp. 43–54 (2009)
Merkle, J., Niesing, M., Schwaiger, M., Lhmor, H.: Performance of the Fuzzy Vault for Multiple Fingerprints. In: Proceedings of the International Conferece of Biometrics Special Interest Group (BIOSIG), pp. 57–72 (2010)
Nandakumar, K., Jain, A.K.: Multibiometric Template Security Using Fuzzy Vault. In: Proceedings of the IEEE Second International Conference on Biometrics: Theory, Application and Systems (BTAS), Arlington, VA, USA, pp. 1–6 (2008)
Moon, D., Choi, W.-Y., Moon, K., Chung, Y.: Fuzzy Fingerprint Vault using Multiple Polynomials. In: Proceedings of the 13th IEEE International Symposium on Consumer Electronics, Kyoto, Japan, pp. 290–293 (2009)
AlTarawneh, M.S., Woo, W.L., Dlay, S.S.: Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features. In: Proceedings of the 6th International Symposium on Communication Systems, Networks and Digital Signal Processing, Graz, pp. 452–456 (2008)
Scheirer, W.J., Boult, T.E.: Cracking Fuzzy Vaults and Biometric Enscryption. In: Proceedings of Biometrics Symposium, Baltimore, MD, pp. 1–6 (2007)
Kholmatov, A., Yanikoglu, B.: Realization of Correlation Attack Against the Fuzzy Vault Scheme. In: Proceedings of the SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X (2008)
Poona, H.T., Miria, A.: A Collusion Attack on the Fuzzy Vault Scheme. The ISC International Journal of Information Security, 27–34 (2009)
Nagar, A., et al.: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors. In: Proceedings of the 19th International Conference on Pattern Recognition (ICPR), pp. 1–4 (2008)
Daugman, J.: How Iris Recognition Works? IEEE Transactions on Circuits and Systems for Video Technology 14(1), 21–30 (2004)
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081–1088 (2006)
CASIA Iris Image Database: http://biometrics.idealtest.org/
Krichen, E., Dorizzi, B., Sun, Z., Garcia-Salicetti, S., Tan, T.: Iris Recognition. In: Petrovska-Delacrétaz, D., Chollet, G., Dorizzi, B. (eds.) Guide to Biometric Reference Systems and Performance Evaluation, pp. 25–50. Springer (2009)
Van Nguyen, N., Nguyen, V.Q., Nguyen, M.N.B., Dang, T.K.: Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems. In: Linawati, Mahendra, M.S., Neuhold, E.J., Tjoa, A.M., You, I. (eds.) ICT-EurAsia 2014. LNCS, vol. 8407, pp. 365–374. Springer, Heidelberg (2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Vo, T.T.L., Dang, T.K., Küng, J. (2014). A Hash-Based Index Method for Securing Biometric Fuzzy Vaults. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-09770-1_6
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09769-5
Online ISBN: 978-3-319-09770-1
eBook Packages: Computer ScienceComputer Science (R0)