Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault

被引:0
作者
Lee, Sungju [2 ]
Moon, Daesung [1 ]
Chung, Yongwha [2 ]
机构
[1] Elect & Telecommun Res Inst, Biometr Technol Res Team, Taejon 305700, South Korea
[2] Korea Univ, Dept Comp & Informat Sci, Chungnam 339700, South Korea
关键词
crypto-biometric; fingerprint verification; fuzzy vault; geometric hashing; information security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint have been proposed. One of the solutions exploits the idea of the geometric hashing to solve the auto-alignment problem. In this paper, we analyze the feature distribution of the generated hash table as a stored fingerprint template and improve the security of the geometric hashing-based fizzy vault by uniformly distributing the features in the stored fingerprint template. That is, after analyzing the geometric transform from the real and chaff minutiae in the fingerprint image to the generated hash table, we modify the way to add the chaff minutiae. The goals of this addition make the feature distribution of the hash table for the chaff minutiae similar to that of the real minutiae as well as the feature distribution of the fingerprint image for both types of minutiae uniform. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification more securely without a significant degradation of the verification accuracy.
引用
收藏
页码:1177 / 1190
页数:14
相关论文
共 18 条
[1]  
AHN D, 2002, SPECIFICATION ETRI F
[2]  
[Anonymous], P COMP VIS PATT REC
[3]  
[Anonymous], 2003, Handbook of fingerprint recognition
[4]  
[Anonymous], 2006, PROC ACM S INF COMPU
[5]   Biometric perils and patches [J].
Bolle, RM ;
Connell, JH ;
Ratha, NK .
PATTERN RECOGNITION, 2002, 35 (12) :2727-2738
[6]  
Chung Y, 2005, LECT NOTES COMPUT SC, V3822, P358
[7]  
Clancy T.C., 2003, P 2003 ACM SIGMM WOR, P45
[8]  
Farooq F., 2007, Conference Proceedings presented in Signal Processing and Its Applications, P1
[9]   Fingerprint matching using transformation parameter clustering [J].
Germain, RS ;
Califano, A ;
Colville, S .
IEEE COMPUTATIONAL SCIENCE & ENGINEERING, 1997, 4 (04) :42-49
[10]  
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714