Securing Fingerprint Template: Fuzzy Vault with Helper Data
- 10 July 2006
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
An important issue gaining attention in biometrics community is the security and privacy of biometric systems: How robust are these systems against attacks? What happens if the biometric template is lost or stolen? Can the privacy of the users be preserved even when a security breach occurs? Among the numerous attacks that can be launched against these systems, protecting the user template that is stored either locally (e.g., on a smart card) or centrally (e.g., on the server) is a major concern. As a possible solution to this problem, a new class of algorithms, termed biometric cryptosystems has been proposed. These systems do not store the original template but only a transformed version of the template within a cryptographic framework. An example of such systems is the fuzzy vault construct proposed by Juels and Sudan. In this construct, the biometric template is converted to a 2D point cloud, containing a secret such as a symmetric encryption key. The operation of the vault requires some "helper" data. In this paper, we present an implementation of the fuzzy fingerprint vault based on orientation field based helper data that is automatically extracted from the fingerprints. We further show that this helper data does not leak any information about fingerprint minutiae, hence complementing the increased user privacy afforded by the fuzzy fingerprint vault. We demonstrate the vault performance on a public domain fingerprint database.Keywords
This publication has 11 references indexed in Scilit:
- Biometric cryptosystems: issues and challengesProceedings of the IEEE, 2004
- New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric TemplatesLecture Notes in Computer Science, 2003
- Secure smartcardbased fingerprint authenticationPublished by Association for Computing Machinery (ACM) ,2003
- On enabling secure applications through off-line biometric identificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Cryptographic key generation from voicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- ICP registration using invariant featuresIEEE Transactions on Pattern Analysis and Machine Intelligence, 2002
- An Analysis of Minutiae Matching StrengthLecture Notes in Computer Science, 2001
- Password hardening based on keystroke dynamicsPublished by Association for Computing Machinery (ACM) ,1999
- High confidence visual recognition of persons by a test of statistical independenceIEEE Transactions on Pattern Analysis and Machine Intelligence, 1993
- A method for registration of 3-D shapesIEEE Transactions on Pattern Analysis and Machine Intelligence, 1992