Cracking Cancelable Fingerprint Template of Ratha

被引:79
作者
Feng Quan [1 ]
Su Fei [1 ]
Cai Anni [1 ]
Zhao Feifei [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100088, Peoples R China
[2] Gansu Agr Univ, Lanzhou, Peoples R China
来源
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS | 2008年
关键词
cancelable biometrics; fingerprint template; minutiae; privacy; security;
D O I
10.1109/ISCSCT.2008.226
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. It uses some parameterized transforms to convert an original biometric template into a new version for authentication. The security of cancelable biometrics lies on noninvertibility of the transformed template, that is, the transforms should be noninvertible so that the original template can not be recovered. One way to achieve the noninvertibilty is through the use of many-to-one transforms. The idea of Ratha's scheme of generating fingerprint templates just depends on this. However, it is revealed in this paper that the form of the transforms and the parameters chosen in his implementation weaken the many-to-one property. This results in the possible recovery of original minutiae from one transformed template.
引用
收藏
页码:572 / +
页数:2
相关论文
共 19 条
  • [1] [Anonymous], 2004, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
  • [2] [Anonymous], 2004, PATTERN RECOGN, DOI DOI 10.1016/j.patcog.2004.04.011
  • [3] [Anonymous], 1999, ICSA GUIDE CRYPTOGRA
  • [4] Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096
  • [5] CHEUNG K, 2006, REVEALING SECRET FAC, P106, DOI DOI 10.1007/11608288
  • [6] PalmHashing: a novel approach for dual-factor authentication
    Connie, T
    Teoh, A
    Goh, M
    Ngo, D
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2004, 7 (03) : 255 - 268
  • [7] DENNIS JE, 1983, NUMBERICAL METHODS U, P4
  • [8] Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
  • [9] An analysis of BioHashing and its variants
    Kong, Adams
    Cheung, King-Hong
    Zhang, David
    Kamel, Mohamed
    You, Jane
    [J]. PATTERN RECOGNITION, 2006, 39 (07) : 1359 - 1368
  • [10] Alignment-free cancelable fingerprint templates based on local minutiae information
    Lee, Chulhan
    Choi, Jeung-Yoon
    Toh, Kar-Ann
    Lee, Sangyoun
    Kim, Jaihie
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (04): : 980 - 992