A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault

Enhanced security can be achieved combining biometrics and cryptographic concepts together. Aiming for security enhancement, this paper presents a scheme for merging multiple fingerprints with a cryptographic concept, the fuzzy vault. Thereby multiple fingerprints are eligible to lock and unlock a secret securely embedded within the multiple-control fuzzy vault. Given either threshold, compartmented or multilevel secret sharing access structures, different security aspects can be directed and enhanced. Given the capability of merging multiple biometrics/fingerprints with secret sharing structures implies additionally a major security enhancement. Valuable application scenarios are outlined and security achievements highlighted.

[1]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[2]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[3]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Anil K. Jain Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..

[5]  Ed Dawson,et al.  Shamir's Scheme Says It all , 1993, SEC.

[6]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[9]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[10]  Sanjeev Arora,et al.  Fitting algebraic curves to noisy data , 2002, STOC '02.

[11]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[12]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[13]  Colin Boyd,et al.  A Multiple-Control Fuzzy Vault , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[14]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[15]  Phong Q. Nguyen,et al.  Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.