Secret Distribution for Secure Fingerprint Verification

被引:2
作者
Choi, Hanna [1 ]
Lee, Sungju [1 ]
Moon, Daesung [2 ]
Chung, Yongwha [1 ]
Pan, Sungbum [3 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
[2] ETRI, Biometr Technol Res Team, Daejeon, South Korea
[3] Chosun Univ, Div Informat & Control Measurement Engn, Gwangju, South Korea
来源
ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ICHIT.2008.177
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a smart-card and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the smart-card and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the smart-card and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a smart-card and a server without significant degradation of the verification accuracy.
引用
收藏
页码:535 / 540
页数:6
相关论文
共 17 条
[1]  
[Anonymous], FVC2002
[2]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[3]  
Chung Y, 2005, LECT NOTES COMPUT SC, V3822, P358
[4]  
Clancy T.C., 2003, P 2003 ACM SIGMM WOR, P45
[5]  
JAIN A, 1999, FINGERPRINT PERSONAL
[6]   A fuzzy vault scheme [J].
Juels, A ;
Sudan, M .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :408-408
[7]  
Lee S, 2007, LECT NOTES COMPUT SC, V4432, P432
[8]  
Maltoni D., 2003, HDB FINGERPRINT RECO
[9]  
Pan SB, 2003, IEEE T CONSUM ELECTR, V49, P453, DOI 10.1109/TCE.2003.1209540
[10]  
PARK B, 2007, LNCS, V4298, P110