skip to main content
10.1145/2905055.2905118acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment

Published: 04 March 2016 Publication History

Abstract

Conventional security methods like password and ID card methods are now rapidly replacing by biometrics for identification of a person. Biometrics uses physiological or behavioral characteristics of a person. Usage of biometric raises critical privacy and security concerns that, due to the noisy nature of biometrics, cannot be addressed using standard cryptographic methods. The loss of an enrollment biometric to an attacker is a security hazard because it may allow the attacker to get an unauthorized access to the system. Biometric template can be stolen and intruder can get access of biometric system using fake input. Hence, it becomes essential to design biometric system with secure template or if the biometric template in an application is compromised, the biometric signal itself is not lost forever and a new biometric template can be issued. One way is to combine the biometrics and cryptography or use transformed data instead of original biometric template. But traditional cryptography methods are not useful in biometrics because of intra-class variation. Biometric cryptosystem can apply fuzzy vault, fuzzy commitment, helper data and secure sketch, whereas, cancelable biometrics uses distorting transforms, Bio-Hashing, and Bio-Encoding techniques. In this paper, biometric cryptosystem is presented with fuzzy vault and fuzzy commitment techniques for fingerprint recognition system.

References

[1]
Anil Jain, Lin Hong and Sharath Pankanti, "Biometric Identification", Communications of the ACM, Vol. 43, No. 2, pp. 91--98, February 2000.
[2]
Koen Simoens, Julien Bringer, Herv� Chabanne, and Stefaan Seys, "A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 833--841, April 2012.
[3]
Peng Li, Xin Yang, Hua Qiao, Kai Cao, Eryun Liu, Jie Tian, "An effective biometric cryptosystem combining fingerprints with error correction codes", Expert Systems with Applications 39, Elsevier, pp. 6562--6574, 2012.
[4]
Bo Fu, Jie Lin and Guiduoduan, "Analysis of Multibiometric Encryption at Feature-level Fusion", Proceedings of the 10th World Congress on Intelligent Control and Automation, pp. 4563--4567, July 2012, Beijing, China.
[5]
Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain, "Biometric Cryptosystems: Issues and Challenges", Proceedings of the IEEE, Vol. 92, No. 6, pp. 948--960, June 2004.
[6]
Ari Juels, Madhu Sudan, "A Fuzzy Vault Scheme", ISIT 2002, Lausanne, Switzerland, 2002.
[7]
Anil K. Jain, "Encyclopedia of Biometrics", Springer, 2009.
[8]
Nalini K. Ratha, Venu Govindaraju, "Advances in Biometrics -- Sensors, Algorithms and Systems", Springer, 2008.
[9]
James Wayman, Anil Jain, Davide Maltoni and Dario Maio, "Biometric Systems: technology, design and performance evaluation", Springer, 2005.
[10]
Christian Rathgeb and Andreas Uhl, "A Survey on Biometric Cryptosystems and Cancelable Biometrics", EURASIP Journal on Information Security, Springer, pp. 2--25, 2011.
[11]
Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai, "A proposal of efficient scheme of key management using ID-based encryption and Biometrics", International Conference on Multimedia and Ubiquitous Engineering, IEEE, 2007.
[12]
Chulhan Lee, Jeung-Yoon Choi, Kar-Ann Toh, Sangyoun Lee, and Jaihie Kim, "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information", IEEE Transactions on Systems, Man, and Cybernetics---Part B: Cybernetics, Vol. 37, No. 4, pp. 980--992, August 2007.
[13]
Benjamin Tams, "Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems".
[14]
Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea and Nalini Ratha, "Anonymous and Revocable Fingerprint Recognition", 2007 IEEE.
[15]
Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, pp. 1--17, 2008.
[16]
Osama Oudaa, Norimichi Tusmuraband, Toshiya Nakaguchi, "Securing Bio-Encoded Iris Codes Against Correlation Attacks", IEEE 2011.
[17]
Abhishek Nagar, Karthik Nandakumar, and Anil K. Jain, "Multibiometric Cryptosystems Based on Feature-Level Fusion", IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, pp. 255--268, February 2012.
[18]
Seira Hidan, Tetsushi Ohki and Kenta Takahashi, "Evaluation of Security for Biometric Guessing Attacks in Biometric Cryptosystem using Fuzzy Commitment Scheme", 2012 International Conference of the Biometrics Special Interest Group (BIOSIG).
[19]
Seira Hidano, Tetsushi Ohki, Naohisa Komatsu and Masao Kasahara, "On Biometric Encryption using Fingerprint and It's Security Evaluation", 10th Intl. Conf. on Control, Automation, Robotics and Vision, Hanoi, Vietnam, pp. 950--956, December 2008.
[20]
Hailun Liu, Dongmei Sun, Ke Xiong, Zhengding Qiu, "Is Fuzzy Vault Scheme very Effective for Key Binding in Biometric Cryptosystems? ", International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 279--284, 2011.
[21]
Liu Hong-wei, Wang Yao, "A New Fuzzy Fingerprint Vault Using Multivariable Linear Function Based on Lorenz Chaotic System", pp. 531--534, 2012 IEEE.
[22]
Alawi A. Al-Saggaf, and Lahouari Ghouti, Haridas S. Acharya, "Biometric Cryptosystem with Renewable Templates", WIAR, Germany, 2012.
[23]
Hisham Al-Assam and Sabah Jassim, "Robust Biometric Based Key Agreement and Remote Mutual Authentication", pp. 59--65, IEEE, 2012.
[24]
Johannes Merkle, Tom Kevenaar, Ulrike Korte, "Multi-Modal and Multi-Instance Fusion for Biometric Cryptosystems", International Conference of the Biometrics Special Interest Group (BIOSIG), 2012.
[25]
Ranjan, Sanjay Kumar Singh, "Improved and Innovative Key Generation Algorithms for Biometric Cryptosystems", pp. 943--946, 2012 IEEE.
[26]
Kareem Kamal A. Ghany, Hesham A. Hefny, Aboul Ella Hassanien, Neveen I. Ghali, "A Hybrid approach for biometric template security", ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 941--942, IEEE, 2012.
[27]
Padma Polash Paul, Marina Gavrilova, "Multimodal Cancelable Biometrics", Proc. 11th IEEE Int. Conf. on Cognitive Informatics & Cognitive Computing, pp. 43--49.
[28]
Shantanu Rane, Ye Wang, Stark C. Draper, and Prakash Ishwar, "Secure Biometrics", IEEE Signal Processing Magazine, pp. 53--64, September 2013.
[29]
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain, "Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors".
[30]
Athos Antonelli, Raffaele Cappelli, Dario Maio, and Davide Maltoni, "Fake Finger Detection by Skin Distortion Analysis", IEEE Transactions on Information Forensics and security, Vol. 1, No. 3, pp. 360--373, September 2006.
[31]
Zahid Akhtar, Battista Biggio, Giorgio Fumera, and Gian Luca Marcialis, "Robustness of Multi-modal Biometric Systems under Realistic Spoof Attacks against All Traits", 2011 IEEE.
[32]
Bo Fu, Simon X. Yang, Jianping Li, and Dekun Hu, "Multibiometric Cryptosystem: Model Structure and Performance Analysis", IEEE Transactions on Information Forensics and security, Vol. 4, No. 4, December, pp. 867--882, 2009.
[33]
Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, "Handbook of Fingerprint recognition", Second Edition, Springer, 2009.
[34]
Umut Uludag, Anil Jain, "Securing Fingerprint Template: Fuzzy Vault with Helper Data", Conference on Computer Vision and Pattern Recognition Workshop, 2006 IEEE.
[35]
Ki Young Moon, Daesung Moon, Jang-Hee Yoo, Hyun-Suk Cho, "Biometrics Information Protection using Fuzzy Vault Scheme", International Conference on Signal Image Technology and Internet Based Systems, IEEE, pp. 124--128, 2012.

Cited By

View all
  • (2024)On Efficiency of Square-Boundaries Chaff Points Generation With Composite Representation in Fingerprint Fuzzy VaultIEEE Access10.1109/ACCESS.2024.343807612(110691-110704)Online publication date: 2024
  • (2023)Fingerprint Digital Twin for Secure and Privacy Preserving Biometric Authentication2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC53992.2023.10394138(1805-1812)Online publication date: 1-Oct-2023
  • (2020)A Framework for Evaluation of Biometric Based Authentication System2020 3rd International Conference on Intelligent Sustainable Systems (ICISS)10.1109/ICISS49785.2020.9315933(925-932)Online publication date: 3-Dec-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
March 2016
843 pages
ISBN:9781450339629
DOI:10.1145/2905055
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 March 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Biometric cryptosystem
  2. Biometrics
  3. Fuzzy commitment
  4. Fuzzy vault
  5. Template security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICTCS '16

Acceptance Rates

Overall Acceptance Rate 97 of 270 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)2
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)On Efficiency of Square-Boundaries Chaff Points Generation With Composite Representation in Fingerprint Fuzzy VaultIEEE Access10.1109/ACCESS.2024.343807612(110691-110704)Online publication date: 2024
  • (2023)Fingerprint Digital Twin for Secure and Privacy Preserving Biometric Authentication2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC53992.2023.10394138(1805-1812)Online publication date: 1-Oct-2023
  • (2020)A Framework for Evaluation of Biometric Based Authentication System2020 3rd International Conference on Intelligent Sustainable Systems (ICISS)10.1109/ICISS49785.2020.9315933(925-932)Online publication date: 3-Dec-2020
  • (2019)Face template protection using deep LDPC codes learningIET Biometrics10.1049/iet-bmt.2018.51568:3(190-197)Online publication date: 29-Jan-2019
  • (2019)Security Analysis on Gait-Based Biometric Fuzzy Commitment Scheme Using SmartphoneSimulation Tools and Techniques10.1007/978-3-030-32216-8_34(353-362)Online publication date: 24-Oct-2019
  • (2018)Security analysis of prealigned fingerprint template using fuzzy vault schemeCluster Computing10.1007/s10586-018-1762-6Online publication date: 20-Jan-2018
  • (2018)Highly secure palmprint based biometric template using fuzzy vaultConcurrency and Computation: Practice and Experience10.1002/cpe.451331:12Online publication date: 27-May-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media