Improved fuzzy commitment scheme

To ensure privacy and secrecy of biometric data, template protection schemes are widely used. Template protection schemes ensure renewability, irreversibility, and unlinkability among the templates. The Fuzzy Commitment Scheme is one of the widely used template protection schemes. This biometric cryptosystem combines cryptography and error correction codes. The original fuzzy commitment scheme is not secure. In this paper, an improved fuzzy commitment scheme has been introduced. The introduced scheme is validated using biometric data from the CASIA-Iris-Thousand dataset. In this paper, improved fuzzy commitment scheme or code-offset constructions are presented that use more than one key to secure the biometric data. The additional keys increase the exhaustive search space. The additional key made it impossible for an intruder to utilize the decoding algorithms to gain information about the user biometrics.

[1]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[2]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[3]  Boris Skoric,et al.  The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Yevgeniy Dodis,et al.  Correcting errors without leaking partial information , 2005, STOC '05.

[5]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[6]  Christoph Busch,et al.  Comparing Binary Iris Biometric Templates Based on Counting Bloom Filters , 2013, CIARP.

[7]  Julien Bringer,et al.  Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).

[8]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[9]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[10]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[11]  Christoph Busch,et al.  Towards generating protected fingerprint templates based on bloom filters , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[12]  Kenta Takahashi,et al.  Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Sonam Chauhan,et al.  Fuzzy Commitment Scheme based on Reed Solomon Codes , 2016, SIN.

[14]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[15]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[16]  Naser Damer,et al.  Helper data scheme for 2D cancelable face recognition using bloom filters , 2014, IWSSIP 2014 Proceedings.

[17]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[18]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[19]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[20]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[21]  Rama Chellappa,et al.  Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[23]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[24]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[25]  Christoph Busch,et al.  Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[26]  Huiqi Lu,et al.  A Novel Logarithmic Mapping Algorithm for the Human IRIS Recognition using a MACH Filter , 2007, 2007 IEEE 15th Signal Processing and Communications Applications.

[27]  Andreas Uhl,et al.  Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[28]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Kenta Takahashi,et al.  Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[30]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[31]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[32]  Yu-Jin Zhang,et al.  Multimodal biometrics fusion using Correlation Filter Bank , 2008, 2008 19th International Conference on Pattern Recognition.

[33]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[34]  Christoph Busch,et al.  Preventing the cross-matching attack in Bloom filter-based cancelable biometrics , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[35]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[36]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[37]  Nasir D. Memon,et al.  Secure Sketch for Biometric Templates , 2006, ASIACRYPT.

[38]  Sonam Chauhan,et al.  Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching , 2018 .

[39]  Ee-Chien Chang,et al.  Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.

[40]  Christoph Busch,et al.  Towards Bloom filter-based indexing of iris biometric data , 2015, 2015 International Conference on Biometrics (ICB).

[41]  Plamen Petrov,et al.  Kernel-based face detection and tracking with adaptive control by Kalman filtering , 2009, 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[42]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[43]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[44]  Julian Fiérrez,et al.  Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters , 2014, 2014 22nd International Conference on Pattern Recognition.

[45]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[46]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[47]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[48]  Narishige Abe,et al.  Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[49]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[50]  Ee-Chien Chang,et al.  Robust Extraction of Secret Bits from Minutiae , 2007, ICB.

[51]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..