Generating Registration-free Cancelable Fingerprint Templates

Cancelable biometrics bridges the gap between the convenience of biometric authentication and security offered by cryptographic systems. There have been several prior attempts to construct cancelable templates out of fingerprint biometrics. However, existing approaches require pre-alignment of fingerprint images and therefore, are not robust to image registration errors. In this paper, we propose a provably secure, registration-free construction of cancelable fingerprint templates. Firstly, we present a new fingerprint representation based on localized, self-aligned texture features. Secondly, we demonstrate how to construct cancelable templates from them and also show how to harden the security of the proposed construction further. And finally, we present arguments for it resilience against various modes of adversarial attack.

[1]  Josef Bigün,et al.  Localization of corresponding points in fingerprints by complex filtering , 2003, Pattern Recognit. Lett..

[2]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[3]  Venu Govindaraju,et al.  Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.

[4]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[5]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[6]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[7]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[8]  Sharath Pankanti,et al.  Fingerprint Representation Using Localized Texture Features , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[9]  Dario Maio,et al.  Synthetic fingerprint-image generation , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[10]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[11]  Tsuhan Chen,et al.  Biometrics : Challenges arising from Theory to Practice , 2004 .

[12]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[13]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[14]  Anil K. Jain,et al.  Fuzzy Fingerprint Vault , 2004 .

[15]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[16]  Nalini K. Ratha,et al.  Biometrics break-ins and band-aids , 2003, Pattern Recognit. Lett..

[17]  Venu Govindaraju,et al.  Singular point detection in fingerprint images using linear phase portraits , 2005 .

[18]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[19]  John Daugman,et al.  Neural networks for image transformation, analysis, and compression , 1988, Neural Networks.

[20]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Anil K. Jain,et al.  Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..