Improved cancelable fingerprint templates using minutiae-based functional transform

被引:12
作者
Moon, Daesung [1 ]
Yoo, Jang-Hee [1 ]
Lee, Mun-Kyu [2 ]
机构
[1] ETRI, Zurich, Switzerland
[2] Inha Univ, Sch Comp & Informat Engn, Inchon, South Korea
关键词
user authentication; cancelable biometrics; cancelable fingerprint template; functional transform; ALIGNMENT;
D O I
10.1002/sec.788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Ratha et al. introduced the functional transform for cancelable fingerprint templates, a few simulation attacks to this method have been proposed. The attacks are based on the fact that the transform depends only on the predefined parameters. That is, the attacker may fully simulate the transform and partially invert it if the parameters are available. Although an original template is transformed using different parameters for different systems, even the compromise of only one of these systems may reveal the original template, which may be a serious potential threat from a practical viewpoint. In this paper, we propose an improved functional transform, whose parameters are decided by the original template, as well as predefined user-specific keys. Because the information on the original template will not be available to the attacker even when a system is compromised, the proposed method significantly improves the security of the original template by preventing the attacker from reconstructing the transform. Copyright (C) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1543 / 1551
页数:9
相关论文
共 16 条
  • [1] Ang R, 2005, LECT NOTES COMPUT SC, V3574, P242
  • [2] Impact of singular point detection on fingerprint matching performance
    Chikkerur, S
    Ratha, N
    [J]. FOURTH IEEE WORKSHOP ON AUTOMATIC IDENTIFICATION ADVANCED TECHNOLOGIES, PROCEEDINGS, 2005, : 207 - 212
  • [3] Chung Y, 2005, LECT NOTES COMPUT SC, V3822, P358
  • [4] Cracking Cancelable Fingerprint Template of Ratha
    Feng Quan
    Su Fei
    Cai Anni
    Zhao Feifei
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 572 - +
  • [5] Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    Jin, ATB
    Ling, DNC
    Goh, A
    [J]. PATTERN RECOGNITION, 2004, 37 (11) : 2245 - 2255
  • [6] Alignment-free cancelable fingerprint templates based on local minutiae information
    Lee, Chulhan
    Choi, Jeung-Yoon
    Toh, Kar-Ann
    Lee, Sangyoun
    Kim, Jaihie
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2007, 37 (04): : 980 - 992
  • [7] Secure Face Authentication Framework in Open Networks
    Lee, Yongjin
    Lee, Yongki
    Chung, Yunsu
    Moon, Kiyoung
    [J]. ETRI JOURNAL, 2010, 32 (06) : 950 - 960
  • [8] Maio D, 2002, INT C PATT RECOG, P811, DOI 10.1109/ICPR.2002.1048144
  • [9] Localization of corresponding points in fingerprints by complex filtering
    Nilsson, K
    Bigun, J
    [J]. PATTERN RECOGNITION LETTERS, 2003, 24 (13) : 2135 - 2144
  • [10] Nilsson K., 2005, THESIS CHALMERS U TE