A fuzzy vault implementation for securing revocable iris templates

In recent years biometric cryptosystem evolved as a means for solving key management issues as well as protecting biometric templates. The fuzzy vault is a well known cryptotographic construction well suited for biometric systems. It has been studied theoretically as well as practically implemented in biometric systems using different biometric traits. When implemented in iris-based biometric system, the fuzzy vault faces two main challenges: 1) it requires an unordered set for successful implementation, and 2) it needs to deal with intra-class variations. In this paper, we implement a fuzzy vault based on the iris templates. A modified fuzzy vault resolves the issue of unordered set and error correction coding is used to deal with intra-class variations. An iris shuffling algorithm is also integrated into the system to ensure revocability. The proposed structure can be integrated with existing databases using binary iris templates and hence does not require the redesign of the biometric authentication system. Revocability ensures that even if the system is compromised new templates can be issued without compromising privacy of the individuals. The system is evaluated using the CASIA database and results show that the system is successful in ensuring security and revocability of the iris templates without compromising the performance

[1]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[2]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[3]  S. Kanade,et al.  Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.

[4]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[5]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[6]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[7]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[8]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[9]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.