Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features, i.e., adding "chaff" minutiae into the original minutiae set. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint(i.e., "align" the input fingerprint with the stored fingerprint template in the domain of the fuzzy vault) have been proposed. One of the solutions exploits the idea of the geometric hashingto solve the auto-alignment problem. In this paper, we analyze the feature distribution of the generated hash table as a stored fingerprint template and improve the security of the geometric hashing-based fuzzy vault by uniformly distributing the features in the stored fingerprint template. The goals of this addition make the feature distribution of the hash table for the chaff minutiae similar to that of the real minutiae as well as the feature distribution of the fingerprint image for both types of minutiae uniform. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification more securely without a significant degradation of the verification accuracy.
[1]
Anil K. Jain,et al.
Fuzzy Fingerprint Vault
,
2004
.
[2]
Ingrid Verbauwhede,et al.
Automatic secure fingerprint verification system based on fuzzy vault scheme
,
2005,
Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[3]
T. Charles Clancy,et al.
Secure smartcardbased fingerprint authentication
,
2003,
WBMA '03.
[4]
Daesung Moon,et al.
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
,
2005,
CISC.
[5]
Ee-Chien Chang,et al.
Finding the original point set hidden among chaff
,
2006,
ASIACCS '06.
[6]
N. Kiyavash,et al.
Secure Smartcard-Based Fingerprint Authentication ∗
,
2003
.
[7]
Anil K. Jain,et al.
Securing Fingerprint Template: Fuzzy Vault with Helper Data
,
2006,
2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[8]
Madhu Sudan,et al.
A Fuzzy Vault Scheme
,
2006,
Des. Codes Cryptogr..
[9]
Haim J. Wolfson,et al.
Geometric hashing: an overview
,
1997
.