Abstract
As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.
- Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https://www.open-mpi.org/.Google Scholar
- Tohari Ahmad, Jiankun Hu, and Song Wang. 2011. Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44, 10-11 (October 2011), 2555--2564. Google Scholar
Digital Library
- Arathi Arakala, Jason Jeffers, and K. Horadam. 2007. Fuzzy extractors for minutiae-based fingerprint authentication. In Advances in Biometrics. LNCS, Vol. 4642. 760--769. Google Scholar
Digital Library
- Bir Bhanu and Xuejun Tan. 2003. Fingerprint indexing based on novel features of minutiae triplets. IEEE TPAMI 25 (2003), 616--622. Google Scholar
Digital Library
- Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol, ePrint Archive.Google Scholar
- Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http://www.cheatsheet.com/technology/how-much-can-you-trust-your-phones-fingerprint-unlock.html.Google Scholar
- V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).Google Scholar
- Ileana Buhan, Jeroen Doumen, Pieter Hartel, and Raymond Veldhuis. 2007. Constructing practical fuzzy extractors usingQIM. In University of Twente, CTIT technical report, 07-52.Google Scholar
- Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 1 (March 2008), 97--139. Google Scholar
Digital Library
- Wojtek James Goscinski, Paul McIntosh, Ulrich Felzmann, Anton Maksimenko, Christopher J. Hall, Timur Gureyev, Darren Thompson, Andrew Janke, Graham Galloway, Neil E. B. Killeen, Parnesh Raniga, Owen Kaluza, Amanda Ng, Govinda Poudel, David G. Barnes, Toan Nguyen, Paul Bonnington, and Gary F. Egan. 2014. The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014).Google Scholar
- A. K. Jain and David Maltoni. 2003. Handbook of Fingerprint Recognition. Springer, New York. Google Scholar
Digital Library
- Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. In Eurasip Journal on Advances in Signal Processing. Google Scholar
Digital Library
- J. Jeffers and A. Arakala. 2006. Minutiae-based structures for a fuzzy vault. In Biometric Consortium Conference. 1--6.Google Scholar
- Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR.Google Scholar
- A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In IEEE International Information Theory Symposium.Google Scholar
- Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, and Jie Tian. 2010. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33, 3 (2010), 207--220. Google Scholar
Digital Library
- Peng Li, Xin Yang, Hua Qiao, Kai Cao, Eryun Liu, and Jie Tian. 2012. An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, no. 7 (2012). Google Scholar
Digital Library
- Eryun Liu, Heng Zhao, and etc. 2011. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters 32, 5 (April 2011), 666--675. Google Scholar
Digital Library
- Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI.Google Scholar
- R Alvarez Marinoa, F Hernandez Alvarez, and L Hernandez Encinasb. 2012. A crypto-biometric scheme based on iris-templates with fuzzy extractors. Information Sciences 195 (2012), 91--102. Google Scholar
Digital Library
- A. Nagar, K. Nandakumar, and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.Google Scholar
- K. Nandakumar, A. K. Jain, and S. Pankanti. 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2, 4 (Dec 2007), 744--757. Google Scholar
Digital Library
- NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com.Google Scholar
- Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. An analysis of minutiae matching strength. In Audio- and Video-Based Biometric Person Authentication. LNCS, Vol. 2091. 223--228. Google Scholar
Digital Library
- Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle. 2007. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis Machine Intelligence 29, 4 (2007), 561--572. Google Scholar
Digital Library
- Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https://www.cs.bu.edu/reyzin/code/fuzzy.html.Google Scholar
- M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.Google Scholar
- Victor Shoup. 2015. NTL: A Library for doing Number Theory. Retrieved from http://www.shoup.net/ntl.Google Scholar
- K. Simoens, P. Tuyls, and B. Preneel. 2009. Privacy weaknesses in biometric sketches. In 2009 30th IEEE Symposium on Security and Privacy. 188--203. DOI:http://dx.doi.org/10.1109/SP.2009.24 Google Scholar
Digital Library
- Andrew B. J. Teoh, Alwyn Goh, and David C. L. Ngo. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE TPAMI 28 (2006), 1892--1901. Google Scholar
Digital Library
- B. Topcu, H. Erdogan, C. Karabat, and B. Yanikoglu. 2013. Biohashing with fingerprint spectral minutiae. In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12.Google Scholar
- E. A. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric. 2010. Key extraction from general nondiscrete signals. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 269--279. Google Scholar
Digital Library
- Song Wang and Jiankun Hu. 2012. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognition 45, 12 (Dec. 2012), 4129--4137. Google Scholar
Digital Library
- Kai Xi, Tohari Ahmad, Fengling Han, and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security Comm. Networks (dec. 2010).Google Scholar
- Kai Xi and Jiankun Hu. 2009. Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In IEEE Conference on Industrial Electronics and Applications.Google Scholar
- Kai Xi, Jiankun Hu, and Fengling Han. 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm. In ICIEA.Google Scholar
- Kai Xi, Jiankun Hu, and Fengling Han. 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system. In IEEE ICIEA.Google Scholar
- Wencheng Yang, Jiankun Hu, Song Wang, and Milos Stojmenovic. 2014a. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognition 47, 3 (2014), 1309--1320. Google Scholar
Digital Library
- Wencheng Yang, Jiankun Hu, and Song Wang. 2012. A delaunay triangle-based fuzzy extractor for fingerprint authentication. In IEEE TrustCom, 2012. 66--70. Google Scholar
Digital Library
- Wencheng Yang, Jiankun Hu, and Song Wang. 2014b. A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Transactions on Information Forensics and Security 9, 7 (July 2014), 1179--1192. Google Scholar
Digital Library
- Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR. Google Scholar
Digital Library
Index Terms
FE-SViT: A SViT-Based Fuzzy Extractor Framework
Recommendations
Minutiae and modified Biocode fusion for fingerprint-based key generation
Key generation from biometrics has been studied intensively in recent years, linking a key with certain biometric enhances the strength of identity authentication. But the state-of-the-art key generation systems are far away from practicality due to low ...
Biometric template protection using cancelable biometrics and visual cryptography techniques
Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual ...
Securing Biometric Template using a Hybrid Scheme
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsBiometric authentication has pulled in significant attention in the course of recent years. Due to the recognition accuracy of biometric verification system, it has been used in various fields. As biometrics used in more and more applications, it is ...






Comments