Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack

Biometric Systems have an edge over the traditional security methods as they strengthen the level of security by authenticating only the genuine person. Various security breaches and their remedial solutions for biometric systems are proposed by eminent researchers. Template security is one of the major concerns in the field of Biometric Security. Fuzzy vault is a proven template protection scheme. The basis of the scheme is to bind the biometric information with the secret key and scramble it by adding random data to add more security. However, the scheme is vulnerable to the correlation attack. A successful correlation attack may lead to the recovery of genuine minutiae points in the input fingerprint, which may lead to the recreation of the input finger. The main focus of the current research work is to design a secure Fuzzy Vault scheme to prevent correlation attack. The proposed scheme combines fuzzy vault and hadamard transformation technique, providing the indemnity against correlation attack to an appreciable level.

[1]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[2]  Song Wang,et al.  A Hadamard transform-based method for the design of cancellable fingerprint templates , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[3]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[4]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[5]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[6]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[7]  G. Padmavathi,et al.  Security Analysis of Multimodal Biometric Fuzzy Vault , 2009 .

[8]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[9]  Axel Munk,et al.  Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[11]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[12]  Dongho Won,et al.  The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[13]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[14]  G. Padmavathi,et al.  Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .

[15]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[16]  Nalini K. Ratha,et al.  Biometrics break-ins and band-aids , 2003, Pattern Recognit. Lett..

[17]  Cengiz Örencik,et al.  Securing fuzzy vault schemes through biometric hashing , 2010 .

[18]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[19]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[20]  Anil K. Jain,et al.  Multibiometric systems: fusion strategies and template security , 2008 .

[21]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[22]  Christoph Busch,et al.  Enhanced template protection with passwords for fingerprint recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[23]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[24]  G. Armah,et al.  Application of residue number system (RNS) to image processing using orthogonal transformation , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).

[25]  Farid Benhammadi,et al.  Password hardened fuzzy vault for fingerprint authentication system , 2014, Image Vis. Comput..