On the realization of fuzzy identity-based identification scheme using fingerprint biometrics

被引:5
作者
Tan, Syh-Yuan [2 ]
Jin, Zhe [3 ]
Teoh, Andrew Beng Jin [1 ,5 ]
Goi, Bok-Min [4 ]
Heng, Swee-Huay [3 ]
机构
[1] Yonsei Univ, Sch Elect & Elect Engn, Coll Engn, Seoul 120749, South Korea
[2] Tunku Abdul Rahman Univ, Fac Informat & Commun Technol, Perak, Malaysia
[3] Multimedia Univ, Fac Informat Sci & Technol, Melaka, Malaysia
[4] Tunku Abdul Rahman Univ, Fac Sci & Engn, Kuala Lumpur, Malaysia
[5] Sunway Univ, Bandar Sunway 46150, Pj Selangor, Malaysia
关键词
fuzzy identity-based identification; Lagrange polynomial; biometrics; fingerprint; SIGNATURE;
D O I
10.1002/sec.408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy identity-based identification (FIBI) scheme is a recently proposed cryptographic identification protocol. The scheme utilizes user biometric trait as public keys. The authentication is deemed success in the presence of the genuine query biometric together with the valid private key. Because of the fuzziness nature of biometrics, FIBI does not correct the errors on the query biometric with respect to the public key; instead, it tolerates the errors using Lagrange polynomial interpolation. Therefore, FIBI requires the biometric trait to be represented in a discrete (binary or integer) array that is fixed in length. In this paper, we report the first realization of FIBI scheme by means of fingerprint biometrics using minutia representation where our technique integrates the security features of both biometric and cryptography effectively. The simulation shows that the entire protocol can be completed within 1?s where false acceptance rate (FAR)?=?0% and false reject rate (FRR)?=?0.25% in FVC2002 DB1, and FAR?=?0% and FRR?=?0.125% in FVC2002 DB2. Our integration technique may also be applied on other fuzzy identity-based cryptosystems. Copyright (C) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:1312 / 1324
页数:13
相关论文
共 28 条
[1]   Pair-polar coordinate-based cancelable fingerprint templates [J].
Ahmad, Tohari ;
Hu, Jiankun ;
Wang, Song .
PATTERN RECOGNITION, 2011, 44 (10-11) :2555-2564
[2]  
[Anonymous], 2006, Foundations of Cryptography: Volume 1, Basic Tools
[3]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[4]  
[Anonymous], J SECURITY COMMUNICA
[5]  
[Anonymous], P UNESST 2009
[6]  
[Anonymous], 2 INT FING VER COMP
[7]  
[Anonymous], SEC HASH STAND
[8]  
[Anonymous], 2008, FUZZY IDENTITY BASED
[9]  
[Anonymous], INT J DIGITAL CONTEN
[10]  
[Anonymous], 2007, 2007 IEEE S SECURITY