Improved cancelable fingerprint templates using minutiae-based functional transform

被引:13
作者
Moon, Daesung [1 ]
Yoo, Jang-Hee [1 ]
Lee, Mun-Kyu [2 ]
机构
[1] ETRI, Zurich, Switzerland
[2] Inha Univ, Sch Comp & Informat Engn, Inchon, South Korea
关键词
user authentication; cancelable biometrics; cancelable fingerprint template; functional transform; ALIGNMENT;
D O I
10.1002/sec.788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Ratha et al. introduced the functional transform for cancelable fingerprint templates, a few simulation attacks to this method have been proposed. The attacks are based on the fact that the transform depends only on the predefined parameters. That is, the attacker may fully simulate the transform and partially invert it if the parameters are available. Although an original template is transformed using different parameters for different systems, even the compromise of only one of these systems may reveal the original template, which may be a serious potential threat from a practical viewpoint. In this paper, we propose an improved functional transform, whose parameters are decided by the original template, as well as predefined user-specific keys. Because the information on the original template will not be available to the attacker even when a system is compromised, the proposed method significantly improves the security of the original template by preventing the attacker from reconstructing the transform. Copyright (C) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1543 / 1551
页数:9
相关论文
共 16 条
[1]  
Ang R, 2005, LECT NOTES COMPUT SC, V3574, P242
[2]   Impact of singular point detection on fingerprint matching performance [J].
Chikkerur, S ;
Ratha, N .
FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, :207-212
[3]  
Chung Y, 2005, LECT NOTES COMPUT SC, V3822, P358
[4]   Cracking Cancelable Fingerprint Template of Ratha [J].
Feng Quan ;
Su Fei ;
Cai Anni ;
Zhao Feifei .
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, :572-+
[5]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255
[6]   Alignment-free cancelable fingerprint templates based on local minutiae information [J].
Lee, Chulhan ;
Choi, Jeung-Yoon ;
Toh, Kar-Ann ;
Lee, Sangyoun ;
Kim, Jaihie .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (04) :980-992
[7]   Secure Face Authentication Framework in Open Networks [J].
Lee, Yongjin ;
Lee, Yongki ;
Chung, Yunsu ;
Moon, Kiyoung .
ETRI JOURNAL, 2010, 32 (06) :950-960
[8]  
Maio D, 2002, INT C PATT RECOG, P811, DOI 10.1109/ICPR.2002.1048144
[9]   Localization of corresponding points in fingerprints by complex filtering [J].
Nilsson, K ;
Bigun, J .
PATTERN RECOGNITION LETTERS, 2003, 24 (13) :2135-2144
[10]  
Nilsson K., 2005, THESIS CHALMERS U TE