Using Distributed Source Coding to Secure Fingerprint Biometrics

We describe a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data does not suffice to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to the loss of biometric data. At the same time the stored data suffices to validate a probe fingerprint. Our approach is based on the use of distributed source coding techniques implemented with graph-based codes. We present a statistical model of the relationship between the enrollment biometric and the (noisy) biometric measurement taking during authentication. We describe how to validate or reject a candidate biometric probe given the probe and the stored encoded data. We report the effectiveness of our method as tested on a database consisting of 579 data sets, each containing roughly 15 measurements of a single finger. We thereby demonstrate a working secure biometric system for fingerprints.

[1]  Tsuhan Chen,et al.  Biometrics : Challenges arising from Theory to Practice , 2004 .

[2]  S. Yang,et al.  Secure fuzzy vault based fingerprint verification system , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[3]  Anil K. Jain,et al.  Fuzzy Fingerprint Vault , 2004 .

[4]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[5]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[6]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[7]  Stark C. Draper,et al.  Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes , 2007 .

[8]  X. Jin Factor graphs and the Sum-Product Algorithm , 2002 .

[9]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[10]  Sergey Yekhanin,et al.  Secure Biometrics Via Syndromes , 2005 .

[11]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .