Blended substitution attack independent;fuzzy vault for fingerprint template security

The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. The fuzzy vault scheme provides supreme security to the templates which are stored in a database or smart card. Compared to an ordinary system which stores the templates as such without any protection, the protection enabled by this fuzzy vault system is tremendous. It is almost impossible for an attacker to guess any information out of the fuzzy vault regarding fingerprint templates. But still some kind of attacks such as correlation attack, Attacks via record multiplicity and Blended substitution attack can be launched on the fuzzy vault, which is stored in a database. Among them Blended substitution attack is the major one, which is still unresolved. Hence in this paper the Blended substitution attack is launched by corrupting the fuzzy vault data with a random data and the attack is determined using the statistical features of the fuzzy vault data and the fuzzy vault is self recovered back after the attack without any user's re-enrollment again, by storing the genuine points of the vault which corresponds to fingerprint features set in a server, which is assumed to be connected with the vault database continuously.

[1]  Xiang Ming,et al.  Fingerprint Image Enhancement and Minutiae Extraction , 2009 .

[2]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[3]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[4]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[5]  Axel Munk,et al.  Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[7]  Mohamed Khalil Hani,et al.  Securing cryptographic key with fuzzy vault based on a new chaff generation method , 2010, 2010 International Conference on High Performance Computing & Simulation.

[8]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.