Private Fingerprint Verification without Local Storage

We describe a protocol to solve the problem of comparing fingerprints without actually exchanging them. We extend this to private verification where the verifier does not obtain fingerprint information. We show that no substantial information is leaked to the other party even during multiple protocol runs and present evaluation results from a prototype implementation.

[1]  Joan Feigenbaum,et al.  Secure multiparty computation of approximations , 2001, TALG.

[2]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[3]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[4]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[5]  Wenliang Du,et al.  Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.

[6]  Arun Ross,et al.  A hybrid fingerprint matcher , 2002, Object recognition supported by user interaction for service robots.

[7]  Sharath Pankanti,et al.  Learning fingerprint minutiae location and type , 2003, Pattern Recognit..

[8]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[9]  Joan Feigenbaum,et al.  Secure Multiparty Computation of Approximations (Extended Abstract) , 2001 .

[10]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[11]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[12]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[13]  Robin Milner,et al.  On Observing Nondeterminism and Concurrency , 1980, ICALP.

[14]  Dario Maio,et al.  Synthetic fingerprint-image generation , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[15]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[16]  Randall K. Nichols ICSA guide to cryptography , 1998 .

[17]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[18]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.