Fingerprint fuzzy vault chaff point generation by squares method

In the literature, several abscissae generation methods of chaff points in fingerprint fuzzy vault exist. In this paper, we make an experimental comparison between squares method and threshold methods. The experimental results show that the squares method is far better than methods based on threshold. But minutiae representation in squares method use 2D representation while threshold methods are represented by composite representation. We proposed to implements squares methods using composite representation and made same experiments which showed less gain of time.

[1]  K. Hemachandran,et al.  A Secondary Fingerprint Enhancement and Minutiae Extraction , 2012 .

[2]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[3]  Daesung Moon,et al.  Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[4]  Renfa Li,et al.  A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[5]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[6]  Manvjeet Kaur,et al.  Methods of automatic alignment of fingerprint in fuzzy vault: A review , 2014, 2014 Recent Advances in Engineering and Computational Sciences (RAECS).

[7]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[8]  Julien Bringer,et al.  Fuzzy vault and template-level fusion applied to a binary fingerprint representation , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[9]  W.L. Woo,et al.  Fuzzy Vault Crypto Biometric Key Based on Fingerprint Vector Features , 2008, 2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing.

[10]  Weiguo Sheng,et al.  Fuzzy Vault Fingerprint Smartcard Implementation Using an Orientation-Based Feature Vector , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.

[11]  Muhammad N. Marsono,et al.  Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..

[12]  Sung Bum Pan,et al.  Implementation of automatic fuzzy fingerprint vault , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[13]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[14]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[15]  Sharath Pankanti,et al.  Fingerprint verification using SIFT features , 2008, SPIE Defense + Commercial Sensing.

[16]  V. Evelyn Brindha Finger Knuckle Print as Unimodal Fuzzy Vault Implementation , 2015 .

[17]  Daesung Moon,et al.  Analysis of Tradeoffs among Verification Accuracy, Memory Consumption, and Execution Time in the GH-Based Fuzzy Fingerprint Vault , 2008, 2008 International Conference on Security Technology.

[18]  Mohamed Khalil Hani,et al.  Securing cryptographic key with fuzzy vault based on a new chaff generation method , 2010, 2010 International Conference on High Performance Computing & Simulation.

[19]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[20]  Erkay Savas,et al.  Improved Fuzzy Vault Scheme for Fingerprint Verification , 2008, SECRYPT.

[21]  Benjamin Tams,et al.  Unlinkable minutiae-based fuzzy vault for multiple fingerprints , 2016, IET Biom..

[22]  Eman Alibeigi,et al.  Pipelined minutiae extraction from fingerprint images , 2009, 2009 Canadian Conference on Electrical and Computer Engineering.

[23]  Daesung Moon,et al.  Fuzzy fingerprint vault using multiple polynomials , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[24]  Akshya Swain,et al.  A dissection of fingerprint fuzzy vault schemes , 2012, IVCNZ '12.

[25]  Jiankun Hu,et al.  Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault , 2009, 2009 IEEE International Conference on Communications.

[26]  Yajun Ha,et al.  Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints , 2015, IET Biom..

[27]  Tsuyoshi Isshiki,et al.  Adaptive SIFT-Based Algorithm for Specific Fingerprint Verification , 2011, 2011 International Conference on Hand-Based Biometrics.