From Watermarks to Fuzzy Extractors: a Practical Construction

Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the source data is discrete while in practice source data is continuous. Using quantizers to transform continuous data into discrete data is a commonly used solution. However, as far as we know no study has been made of the effect of the quantization strategy on the performance of fuzzy extractors. We use an unexplored parallel between watermarking theory and fuzzy extractors to study the effects of quantization. We construct the encoder and the decoder function of a fuzzy extractor using quantization index modulation (QIM) and we express performance properties of a fuzzy extractor in terms of geometric properties of the used QIM. In the end we present and analyze, as an exercise, two constructions in the two dimensional space. Our 6-hexagonal tiling construction offers ( (log2 6)/2-1) approximately 0.3 extra bits per dimension of the space compared to the known square quantization based fuzzy extractor. The other construction turns out to be optimal from resilience to noise perspective.

[1]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[2]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[3]  G. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).

[4]  Allen Gersho,et al.  Number of nearest neighbors in a Euclidean code , 1994, IEEE Trans. Inf. Theory.

[5]  Allen Gersho,et al.  Asymptotically optimal block quantization , 1979, IEEE Trans. Inf. Theory.

[6]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[7]  Nasir D. Memon,et al.  Secure Sketch for Biometric Templates , 2006, ASIACRYPT.

[8]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[9]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[10]  Gregory W. Wornell,et al.  Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..

[11]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[12]  G. Wornell,et al.  Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[13]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[14]  Allen Gersho,et al.  Principles of quantization , 1978 .