An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms

Bio-cryptography represents a relative new and emerging domain, which proposes to strengthen the usual biometric systems, by adding the traditional cryptography layer to their architecture. Its main benefit lies in the elimination of the need for storing enrolled users biometric templates. Although bio-cryptographic algorithms confer a certain level of security, their main disadvantage is the high consumption of computational resources they exhibit, as they perform many complex mathematical operations and need large amounts of data for their completion. This paper proposes the error-correcting codes method for reducing bio-cryptographic algorithms computational complexity and aims to evaluate the usage of Reed-Solomon error-correcting codes during the polynomial reconstruction phase of the biometric decryption stage within the Fuzzy Vault scheme.

[1]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[2]  Robert Sabourin,et al.  A bio-cryptographic system based on offline signature images , 2014, Inf. Sci..

[3]  Manvjeet Kaur,et al.  Methods of automatic alignment of fingerprint in fuzzy vault: A review , 2014, 2014 Recent Advances in Engineering and Computational Sciences (RAECS).

[4]  Victor Valeriu Patriciu,et al.  Bio-cryptographic authentication in cloud storage sharing , 2014, 2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI).

[5]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[6]  Graham H. Norton,et al.  The Berlekamp-Massey Algorithm via Minimal Polynomials , 2010, ArXiv.

[7]  Sim Hiew Moi,et al.  Error Correction on IRIS Biometric Template Using Reed Solomon Codes , 2010, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.

[8]  Ann Cavoukian Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .

[9]  Victor-Valeriu Patriciu,et al.  Methods of reducing bio-cryptographic algorithms computational complexity , 2014, 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI).

[10]  Hazem Abd,et al.  Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm , 2010 .