skip to main content
research-article

FE-SViT: A SViT-Based Fuzzy Extractor Framework

Published:02 August 2016Publication History
Skip Abstract Section

Abstract

As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.

References

  1. Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https://www.open-mpi.org/.Google ScholarGoogle Scholar
  2. Tohari Ahmad, Jiankun Hu, and Song Wang. 2011. Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44, 10-11 (October 2011), 2555--2564. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Arathi Arakala, Jason Jeffers, and K. Horadam. 2007. Fuzzy extractors for minutiae-based fingerprint authentication. In Advances in Biometrics. LNCS, Vol. 4642. 760--769. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bir Bhanu and Xuejun Tan. 2003. Fingerprint indexing based on novel features of minutiae triplets. IEEE TPAMI 25 (2003), 616--622. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol, ePrint Archive.Google ScholarGoogle Scholar
  6. Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http://www.cheatsheet.com/technology/how-much-can-you-trust-your-phones-fingerprint-unlock.html.Google ScholarGoogle Scholar
  7. V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).Google ScholarGoogle Scholar
  8. Ileana Buhan, Jeroen Doumen, Pieter Hartel, and Raymond Veldhuis. 2007. Constructing practical fuzzy extractors usingQIM. In University of Twente, CTIT technical report, 07-52.Google ScholarGoogle Scholar
  9. Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 1 (March 2008), 97--139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Wojtek James Goscinski, Paul McIntosh, Ulrich Felzmann, Anton Maksimenko, Christopher J. Hall, Timur Gureyev, Darren Thompson, Andrew Janke, Graham Galloway, Neil E. B. Killeen, Parnesh Raniga, Owen Kaluza, Amanda Ng, Govinda Poudel, David G. Barnes, Toan Nguyen, Paul Bonnington, and Gary F. Egan. 2014. The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014).Google ScholarGoogle Scholar
  11. A. K. Jain and David Maltoni. 2003. Handbook of Fingerprint Recognition. Springer, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. In Eurasip Journal on Advances in Signal Processing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Jeffers and A. Arakala. 2006. Minutiae-based structures for a fuzzy vault. In Biometric Consortium Conference. 1--6.Google ScholarGoogle Scholar
  14. Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR.Google ScholarGoogle Scholar
  15. A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In IEEE International Information Theory Symposium.Google ScholarGoogle Scholar
  16. Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, and Jie Tian. 2010. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33, 3 (2010), 207--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Peng Li, Xin Yang, Hua Qiao, Kai Cao, Eryun Liu, and Jie Tian. 2012. An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, no. 7 (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Eryun Liu, Heng Zhao, and etc. 2011. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters 32, 5 (April 2011), 666--675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI.Google ScholarGoogle Scholar
  20. R Alvarez Marinoa, F Hernandez Alvarez, and L Hernandez Encinasb. 2012. A crypto-biometric scheme based on iris-templates with fuzzy extractors. Information Sciences 195 (2012), 91--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Nagar, K. Nandakumar, and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.Google ScholarGoogle Scholar
  22. K. Nandakumar, A. K. Jain, and S. Pankanti. 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2, 4 (Dec 2007), 744--757. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com.Google ScholarGoogle Scholar
  24. Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. An analysis of minutiae matching strength. In Audio- and Video-Based Biometric Person Authentication. LNCS, Vol. 2091. 223--228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle. 2007. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis Machine Intelligence 29, 4 (2007), 561--572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https://www.cs.bu.edu/reyzin/code/fuzzy.html.Google ScholarGoogle Scholar
  27. M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.Google ScholarGoogle Scholar
  28. Victor Shoup. 2015. NTL: A Library for doing Number Theory. Retrieved from http://www.shoup.net/ntl.Google ScholarGoogle Scholar
  29. K. Simoens, P. Tuyls, and B. Preneel. 2009. Privacy weaknesses in biometric sketches. In 2009 30th IEEE Symposium on Security and Privacy. 188--203. DOI:http://dx.doi.org/10.1109/SP.2009.24 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Andrew B. J. Teoh, Alwyn Goh, and David C. L. Ngo. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE TPAMI 28 (2006), 1892--1901. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. B. Topcu, H. Erdogan, C. Karabat, and B. Yanikoglu. 2013. Biohashing with fingerprint spectral minutiae. In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12.Google ScholarGoogle Scholar
  32. E. A. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric. 2010. Key extraction from general nondiscrete signals. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 269--279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Song Wang and Jiankun Hu. 2012. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognition 45, 12 (Dec. 2012), 4129--4137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Kai Xi, Tohari Ahmad, Fengling Han, and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security Comm. Networks (dec. 2010).Google ScholarGoogle Scholar
  35. Kai Xi and Jiankun Hu. 2009. Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In IEEE Conference on Industrial Electronics and Applications.Google ScholarGoogle Scholar
  36. Kai Xi, Jiankun Hu, and Fengling Han. 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm. In ICIEA.Google ScholarGoogle Scholar
  37. Kai Xi, Jiankun Hu, and Fengling Han. 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system. In IEEE ICIEA.Google ScholarGoogle Scholar
  38. Wencheng Yang, Jiankun Hu, Song Wang, and Milos Stojmenovic. 2014a. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognition 47, 3 (2014), 1309--1320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wencheng Yang, Jiankun Hu, and Song Wang. 2012. A delaunay triangle-based fuzzy extractor for fingerprint authentication. In IEEE TrustCom, 2012. 66--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wencheng Yang, Jiankun Hu, and Song Wang. 2014b. A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Transactions on Information Forensics and Security 9, 7 (July 2014), 1179--1192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FE-SViT: A SViT-Based Fuzzy Extractor Framework

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!