Implementation of automatic fuzzy fingerprint vault

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non-invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In this paper, we implement the fuzzy fingerprint vault system combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. Fuzzy vault is a recently developed cryptographic construct to secure critical data with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. However, all the previous results assumed that fingerprint features were pre-aligned. To solve this problem, we perform the automatic alignment of fingerprint features by using the geometric hashing technique. Also, we implement a new RS decoding algorithm based on the Extended Euclidean algorithm proposed by Gao. Based on the experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and perform fingerprint verification with the protected template in real-time.

[1]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[2]  Shuhong Gao,et al.  A New Algorithm for Decoding Reed-Solomon Codes , 2003 .

[3]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[4]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[5]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[6]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[7]  Elwyn R. Berlekamp,et al.  Algebraic coding theory , 1984, McGraw-Hill series in systems science.

[8]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[9]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[10]  Haim J. Wolfson,et al.  Geometric hashing: an overview , 1997 .

[11]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[12]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.