Improved fuzzy commitment scheme

被引:8
作者
Chauhan S. [1 ]
Sharma A. [1 ]
机构
[1] Department of Computer Science and Engineering, Delhi-NCR, Haryana, Sonipat
关键词
BCH code; Biometrics; Fuzzy commitment scheme; RS Code;
D O I
10.1007/s41870-018-0275-0
中图分类号
学科分类号
摘要
To ensure privacy and secrecy of biometric data, template protection schemes are widely used. Template protection schemes ensure renewability, irreversibility, and unlinkability among the templates. The Fuzzy Commitment Scheme is one of the widely used template protection schemes. This biometric cryptosystem combines cryptography and error correction codes. The original fuzzy commitment scheme is not secure. In this paper, an improved fuzzy commitment scheme has been introduced. The introduced scheme is validated using biometric data from the CASIA-Iris-Thousand dataset. In this paper, improved fuzzy commitment scheme or code-offset constructions are presented that use more than one key to secure the biometric data. The additional keys increase the exhaustive search space. The additional key made it impossible for an intruder to utilize the decoding algorithms to gain information about the user biometrics. © 2019, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:1321 / 1331
页数:10
相关论文
共 53 条
  • [31] Simoens K., Tuyls P., Preneel B., Privacy weaknesses in biometric sketches, Proceedings of the 2009 IEEE Symposium on Security and Privacy, (2009)
  • [32] Chang E.-C., Roy S., Robust extraction of secret bits from minutiae, Proceedings of International Conference on Biometrics, pp. 750-759, (2007)
  • [33] Skoric B., De Vreede N., The spammed code offset method, IEEE Trans Inf Forensics Sec, 9, 5, pp. 875-884, (2014)
  • [34] Juels A., Wattenberg M., A fuzzy commitment scheme, Proceedings of the 6Th ACM Conference on Computer and Communications Security, pp. 28-36, (1999)
  • [35] Hao F., Anderson R., Daugman J., Combining crypto with biometrics effectively, IEEE Trans Comput, 55, 9, pp. 1081-1088, (2006)
  • [36] Rathgeb C., Uhl A., Adaptive fuzzy commitment scheme based on iris-code error analysis, Proceedings of the 2Nd European Workshop on Visual Information Processing (EUVIP’10), pp. 41-44, (2010)
  • [37] Juels A., Sudan M (2002) A fuzzy vault scheme, Proceedings of the IEEE International Symposium on Information Theory (IS1T, (2002)
  • [38] Juels A., Sudan M., A fuzzy vault scheme, Des Codes Crypt, 38, 2, pp. 237-257, (2006)
  • [39] Uludag U., Pankanti S., Jain A.K., Fuzzy vault for fingerprint, Proceedings of Audio-And Video-Based Biometric Person Authentication (AVBPA 2005), LNCS, 3546, pp. 310-319, (2005)
  • [40] Nandakumar K., Jain A.K., Pankanti S., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans Inf Forensics Sec, 2, 4, pp. 744-757, (2007)