A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion

被引:55
作者
Li, Cai [1 ]
Hu, Jiankun [1 ]
Pieprzyk, Josef [2 ]
Susilo, Willy [3 ]
机构
[1] Univ New S Wales, Sch Engn & Informat Technol, Canberra, ACT 2600, Australia
[2] Queensland Univ Technol, Fac Sci & Engn, Sch Elect Engn & Comp Sci, Brisbane, Qld 4000, Australia
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
关键词
Biometric cryptosystems; min-entropy; Shannon-entropy; authentication accuracy; template protection; security; CRYPTOGRAPHIC KEY GENERATION; CONDORCET-JURY-THEOREM; REED-SOLOMON; FUZZY VAULT; FINGERPRINT; TEMPLATE;
D O I
10.1109/TIFS.2015.2402593
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric cryptosystems provide an innovative solution for cryptographic key generation, encryption as well as biometric template protection. Besides high authentication accuracy, a good biometric cryptosystem is expected to protect biometric templates effectively, which requires that helper data does not reveal significant information about the templates. Previous works predominantly follow an appropriate entropy definition to measure the security of biometric cryptosystems. In this paper, we point out limitations of entropy-based security analysis and propose a new security analysis framework that combines information-theoretic approach with computational security. In addition, we construct a fingerprint-based multibiometric cryptosystem (MBC) using decision level fusion. Hash functions are employed in our construction to further protect each single biometric trait. The experimental results and security analysis demonstrate that the proposed MBC provides stronger security and better authentication accuracy compared with a cryptosystem based on single biometric.
引用
收藏
页码:1193 / 1206
页数:14
相关论文
共 44 条
[1]   Pair-polar coordinate-based cancelable fingerprint templates [J].
Ahmad, Tohari ;
Hu, Jiankun ;
Wang, Song .
PATTERN RECOGNITION, 2011, 44 (10-11) :2555-2564
[2]  
[Anonymous], P SPIE
[3]  
[Anonymous], 3D FINGER PRINT DATA
[4]   Condorcet's Jury Theorem and the reliability of majority voting [J].
Berg, S .
GROUP DECISION AND NEGOTIATION, 1996, 5 (03) :229-238
[5]  
Berlekamp E. R., 1968, Algebraic coding theory
[6]   SIMPLE MAJORITY VOTING, GAME-THEORY, AND RESOURCE USE [J].
BUCHANAN, JM .
CANADIAN JOURNAL OF ECONOMICS & POLITICAL SCIENCE, 1961, 27 (03) :337-348
[7]  
Buhan I., 2007, P 2 ACM S INF COMP C, P353
[8]  
Cavoukian A., 2007, Biometric Encryption: A Positive-Sum Technology That Achieves Strong Authentication, Security AND Privacy
[9]   Biometrics-based cryptographic key generation [J].
Chang, YJ ;
Zhang, WD ;
Chen, TS .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :2203-2206
[10]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523