YOU Lin, YANG Ling, YU Wangke, et al., “A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 236-243, 2017, doi: 10.1049/cje.2017.01.009
Citation: YOU Lin, YANG Ling, YU Wangke, et al., “A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 236-243, 2017, doi: 10.1049/cje.2017.01.009

A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features

doi: 10.1049/cje.2017.01.009
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272045), Zhejiang Qianjiang Talents Project (No.2013R10071), The Key Program of the Zhejiang Natural Science Foundation (No.LZ17020002), and the Zhejiang Science and Technology Innovation Team (No.2013TD03).
  • Received Date: 2015-03-04
  • Rev Recd Date: 2015-08-19
  • Publish Date: 2017-03-10
  • Juels and Sudan proposed in 2002 an algorithm for computing a fuzzy vault that binds a user's biometric template with his secret. It was suggested that this vault could be used to securely store one's secret or a cryptographic key without losing his biometric information. However, in this classical fuzzy vault, if an attacker captures multiple vaults generated from one biometric template, he is able to obtain some biometric template information by cross-matching, and then he can use it to illegally recover the secret message. To overcome this disadvantage, in this paper, a cancelable fuzzy vault algorithm is proposed based on the user's transformed fingerprint features which are used to generate a fuzzy vault. Our novel fuzzy vault is secure and can overcome the cross-matching attack without intensive computational complexity. Also, the use of three check values makes our vault have a much higher probability to detect a false query fingerprint template than some other vault versions, and it will highly improve the probability whether the reconstructed polynomial is correct or not.
  • loading
  • U. Uludag, S. Pankanti, S. Prabhakar, et al., "Biometric cryptosystems:Issues and challenges", Proc. of the IEEE, Vol.92, No.6, pp.948-960, 2004.
    H. Feng, A. Ross and D. John, "Combining cryptography with biometrics effectively", IEEE Transactions on Computers, Vol.55, No.9, pp.1081-1088, 2006.
    R. Christian and U. Andreas, "A survey on biometric cryptosystems and cancelable biometrics", EURASIP Journal on Information Security, Vol.201, No.3, pp.1-25, 2011.
    A. Juels and M. Sudan, "A fuzzy vault scheme", Proc. of Int. Symp. on Information Theory, Lausanne, USA, pp.408, 2002.
    W. Yongjin and K.N. Pmataniotis, "Fuzzy vault for face based cryptographic key generation", Proc. of Biometrics Symposium, Baltimore, MD, USA, pp.1-6, 2007.
    U. Uludag, S. Pankanti and A. Jain, "Fuzzy vault for fingerprints". Proc. 5th Int. Conf. on Audio-Based and Video-Based Biometric Person Authentication, LNCS, Vol.3546, pp.310-319, 2005.
    J. Deng and H. Yuan, "Fingerprint minutiae feature encryption based on fuzzy vault scheme", The Computer Engineering and Design, Vol.10, No.4, pp.73-76, 2010.
    Q. Li, X.M. Niu and S.H. Sun, "A novel biometric key scheme", Chinese Journal of Electronics, Vol.15, No.1, pp.99-102, 2006.
    B. Fu and J.P. Li, "Efficient fuzzy vault based on pairing and its application to fingerprint encryption", Chinese Journal of Electronics, Vol.19, No.2, pp.249-255, 2010.
    N.K. Ratha, S. Chikkerur and J.H. Connemm, "Generating cancelable fingerprint templates". IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol.29, No.4, pp.561-572, 2007.
    D. Xu and X. Wang, "A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence", Proc. Int. Conf. on Mechatronics and Automation, Xi'an, China, pp.329-332, 2010.
    I.M. Verbauwhede and S. Yang, "Secure fuzzy vault based fingerprint verification system", Asilomar Conference on Signals Systems and Computers, California, USA, pp.577-581, 2004.
    Y. Dodis, R.Ostrovsky, L. Reyzin, et al., "Fuzzy extractors:How to generate strong keys from biometrics and other noisy data", EUROCRYPT 2004, pp.523-540, 2004.
    K. Nandakumar and A.K. Jain, "Multibiometric template security using fuzzy vault", Proc. IEEE 2nd Int. Conf. on Biometrics:Theory, Applications and Systems, VA, USA, pp.1-6, 2008.
    X. Li and D. Sun, "A dual-mode fingerprint fusion encryption method based on fuzzy vault", Proc. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Sanya, China, pp.208-215, 2012.
    A. Nagar, K. Nandakumar and A.K. Jain, "Multibiometric cryptosystems based on feature level fusion", IEEE Trans. on Information Forensics and Security, Vol.7, No.1, pp.255-268, 2012.
    M.K. Geetika, "Multimodal based fuzzy vault using iris retina and finger vein", Proc. the Fourth International Conference on Computing,Communications and Networking Technologies, Tiruchengode, India, pp.1-5, 2013.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (390) PDF downloads(501) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return