Effectiveness of authenticating users with randomly constructed fingerprint templates

In recent years, using fingerprints to authenticate users in physical and logical access control has been gaining popularity. Thus protecting fingerprint data becomes an important issue. One of the ideas proposed in literature to safeguard fingerprint data is to construct secure fingerprint template from fingerprint image(s). One requirement for this proposal is that the template can be utilized to authenticate its owner but an impostor cannot use it to reconstruct the original fingerprints. How to satisfy this requirement is still an ongoing research problem. Partial fingerprints are more readily available than full fingerprints. Application of 3D finger scanner renders fast capturing of multiple partial fingerprints without any distortion. Recognition based on partial fingerprints from different fingers can significantly increase the number of available fingerprint templates. A secret-key based randomized selection of multiple partial fingerprints from multiple fingers can protect the privacy of fingerprint data. In this paper we propose a novel approach to constructing fingerprint templates from multiple partial fingerprint images. The randomized construction process makes reverse engineering more resource consuming. Our testing results show that individual partial fingerprints from different parts of a finger do not match with each other. By enrolling a combined template from multiple partial fingerprints, authentication can be done successfully. The matching score exponentially increase with the number of minutiae in a fingerprint. The randomly constructed template from multiple original templates does not cause an increase in false recognition rate (FRR), compared with the matching results of the original template.

[1]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[2]  J.H.A.M. Grijpink,et al.  Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge , 2004, IS&T/SPIE Electronic Imaging.

[3]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[4]  Alexander M. Bronstein,et al.  Biometrics was no match for hair-raising tricks , 2002, Nature.

[5]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Craig I. Watson,et al.  Studies of Fingerprint Matching Using the NIST Verification Test Bed (VTB) | NIST , 2003 .

[9]  Andrew Beng Jin Teoh,et al.  FuzzyHash: A Secure Biometric Template Protection Technique , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.

[10]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[11]  Justas Kranauskas,et al.  Fingerprint Minutiae Matching without Global Alignment Using Local Structures , 2022 .

[12]  Meredith Wadman Biometrics group counters privacy fears , 1999, Nature.

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  Hee-seung Choi,et al.  Fingerprint Image Mosaicking by Recursive Ridge Mapping , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Hakil Kim,et al.  Super-template Generation Using Successive Bayesian Estimation for Fingerprint Enrollment , 2005, AVBPA.

[16]  Weiguo Sheng,et al.  Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.

[17]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[18]  Chris J. Hill,et al.  Risk of Masquerade Arising from the Storage of Biometrics , 2001 .

[19]  Julien Bringer,et al.  Identification with Encrypted Biometric Data Made Feasible , 2009, ArXiv.

[20]  Romany F. Mansour,et al.  A New Technique to Fingerprint Recognition Based on Partial Window , 2012 .

[21]  Pieter H. Hartel,et al.  The state of the art in abuse of biometrics , 2005 .

[22]  Venu Govindaraju,et al.  A minutia-based partial fingerprint recognition system , 2005, Pattern Recognit..

[23]  Krzysztof Kryszczuk,et al.  Study of the Distinctiveness of Level 2 and Level 3 Features in Fragmentary Fingerprint Comparison , 2004, ECCV Workshop BioAW.

[24]  Ann Cavoukian Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .

[25]  Yi Chen,et al.  Dots and Incipients: Extended Features for Partial Fingerprint Matching , 2007, 2007 Biometrics Symposium.

[26]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[27]  Andreas Dresen An Authentication Protocol with encrypted Biometric Data , 2010 .

[28]  Jiankun Hu,et al.  Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..

[30]  Su Fei,et al.  Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.

[31]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[32]  J.H.A.M. Grijpink Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud , 2005, Comput. Law Secur. Rev..