RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates

Biometrics systems are used in a wide range of areas, including the area of crime prevention, due to their unique characteristics. However, serious problems can occur if biometric information is disclosed to an unauthorized user. To address these issues, this paper proposes a real valued fuzzy vault method, which adopts a real number error correction code to implement a fuzzy vault scheme for protecting fingerprint temples. The proposed method provides the benefit of allowing the private key value to be changed at any time, unlike biometric template such as a fingerprint, which is not easily renewable even if its security has been breached. The validity of the proposed method is verified for fingerprint verification.

[1]  Myung-Geun Chun,et al.  Biometric and Identity Reference Protection , 2009 .

[2]  Venu Govindaraju,et al.  Feature Extraction Using a Chaincoded Contour Representation of Fingerprint Images , 2003, AVBPA.

[3]  T. Marshall,et al.  Coding of Real-Number Sequences for Error Correction: A Digital Signal Processing Problem , 1984, IEEE J. Sel. Areas Commun..

[4]  Kang Ryoung Park,et al.  A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[5]  Yong Chan Kim,et al.  Rough Approximations on Preordered Sets , 2011, Int. J. Fuzzy Log. Intell. Syst..

[6]  Hong Chang,et al.  Sparse Reconfigurable Adaptive Filter with an Upgraded Connection Constraint Algorithm , 2011, Int. J. Fuzzy Log. Intell. Syst..

[7]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[8]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[9]  Christoph Busch,et al.  Fuzzy Vault for 3D Face Recognition Systems , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[10]  Anamitra Makur,et al.  Improved Coding-Theoretic and Subspace-Based Decoding Algorithms for a Wider Class of DCT and DST Codes , 2010, IEEE Transactions on Signal Processing.

[11]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[12]  Venu Govindaraju,et al.  K-plet and Coupled BFS: A Graph Based Fingerprint Representation and Matching Algorithm , 2006, ICB.

[13]  Robert S. Schriebman Error Correcting Code , 2006 .

[14]  Sabih H. Gerez,et al.  Fingerprint matching by thin-plate spline modelling of elastic deformations , 2003, Pattern Recognit..

[15]  Sang-Ho Lee,et al.  Secure Binding of Identity Reference and Biometric Reference , 2010 .

[16]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[17]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..