Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security

The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for fingerprints may either be too weak to offer enough security or suffer from the performance limitations. In this paper, a new fuzzy cryptographic technique without use of chaff data, Randomized Dissolvent Template (RDT), is proposed for biometric set modalities. The proposed technique is designed to dissolve the enrolled biometric set into a random secret resource, so as to construct robust secured templates by exploiting at least two resources of randomness. In this way, when one fingerprint is used for multiple applications, each time the additional information leakage by secured templates will not exceed the new introduced random information, so RDT is reusable. We thus provide two novel RDT-based constructions in practice: Fuzzy Reconciler using set difference threshold and Fuzzy Dissolver using set intersection threshold. Security analysis proves the new constructions have enough computational complexity for the required security properties, and implementations on FVC2002DB fingerprint database show that the proposed schemes can bring about better accuracy performance over current Fuzzy Vault and Fuzzy Extractor, thus are more promising for biometric-based security applications.

[1]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[2]  Sachin Agarwal,et al.  On the scalability of data synchronization protocols for PDAs and mobile devices , 2002, IEEE Netw..

[3]  Ming Gu,et al.  Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions , 2008, 2008 19th International Conference on Pattern Recognition.

[4]  Kwok-Yan Lam,et al.  MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem , 2009, ISA.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Dubravko Culibrk,et al.  Practical Secure Biometrics using Set Intersection as a Similarity Measure , 2007, SECRYPT.

[7]  Kathy J. Horadam,et al.  Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.

[8]  THE CHINESE REMAINDER THEOREM MATH 372 , 2005 .

[9]  Michael Rosen,et al.  A classical introduction to modern number theory , 1982, Graduate texts in mathematics.

[10]  A. Kondracki,et al.  The Chinese Remainder Theorem , 2019, Certain Number-Theoretic Episodes in Algebra.

[11]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[12]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[13]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[14]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[15]  Michael K. Reiter,et al.  Towards practical biometric key generation with randomized biometric templates , 2008, CCS.

[16]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.