FE-SViT

As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.

[1]  O. Khan,et al.  ACM Transactions on Embedded Computing Systems continued on back cover , 2018 .

[2]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[3]  Jiankun Hu,et al.  Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.

[4]  Boris Skoric,et al.  Key Extraction From General Nondiscrete Signals , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Xudong Jiang,et al.  Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[6]  Jiankun Hu,et al.  Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..

[7]  Marina Blanton,et al.  On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting , 2012, IACR Cryptol. ePrint Arch..

[8]  Jiankun Hu,et al.  An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures , 2014, Pattern Recognit..

[9]  Jiankun Hu,et al.  A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Jiankun Hu,et al.  Dual Layer Structure Check (DLSC) fingerprint verification scheme designed for biometric mobile template protection , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.

[11]  Govinda R. Poudel,et al.  The multi-modal Australian ScienceS Imaging and Visualization Environment (MASSIVE) high performance computing infrastructure: applications in neuroscience and neuroinformatics research , 2014, Front. Neuroinform..

[12]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[14]  Shaogang Gong,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[15]  Bir Bhanu,et al.  Fingerprint Indexing Based on Novel Features of Minutiae Triplets , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[16]  Jiankun Hu,et al.  Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..

[17]  Emanuele Maiorana,et al.  Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography , 2007 .

[18]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[19]  Peng Li,et al.  An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..

[20]  Pieter H. Hartel,et al.  Constructing practical Fuzzy Extractors using QIM , 2007 .

[21]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[22]  Jiankun Hu,et al.  An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.

[23]  Jiankun Hu,et al.  A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[24]  Jiankun Hu,et al.  A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.

[25]  Kathy J. Horadam,et al.  Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.

[26]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[27]  Luis Hernández Encinas,et al.  A crypto-biometric scheme based on iris-templates with fuzzy extractors , 2012, Inf. Sci..

[28]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[29]  Peng Li,et al.  A key binding system based on n-nearest minutiae structure of fingerprint , 2011, Pattern Recognit. Lett..

[30]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[31]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[32]  Weiwei Zhang,et al.  Core-based structure matching algorithm of fingerprint verification , 2002, Object recognition supported by user interaction for service robots.

[33]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[34]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[35]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[36]  Cagatay Karabat,et al.  Biohashing with fingerprint spectral minutiae , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).

[37]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[38]  V Evelyn Brindha,et al.  Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault , 2012 .