Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment

Conventional security methods like password and ID card methods are now rapidly replacing by biometrics for identification of a person. Biometrics uses physiological or behavioral characteristics of a person. Usage of biometric raises critical privacy and security concerns that, due to the noisy nature of biometrics, cannot be addressed using standard cryptographic methods. The loss of an enrollment biometric to an attacker is a security hazard because it may allow the attacker to get an unauthorized access to the system. Biometric template can be stolen and intruder can get access of biometric system using fake input. Hence, it becomes essential to design biometric system with secure template or if the biometric template in an application is compromised, the biometric signal itself is not lost forever and a new biometric template can be issued. One way is to combine the biometrics and cryptography or use transformed data instead of original biometric template. But traditional cryptography methods are not useful in biometrics because of intra-class variation. Biometric cryptosystem can apply fuzzy vault, fuzzy commitment, helper data and secure sketch, whereas, cancelable biometrics uses distorting transforms, Bio-Hashing, and Bio-Encoding techniques. In this paper, biometric cryptosystem is presented with fuzzy vault and fuzzy commitment techniques for fingerprint recognition system.

[1]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[2]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[3]  Gian Luca Marcialis,et al.  Robustness of multi-modal biometric systems under realistic spoof attacks against all traits , 2011, 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS).

[4]  S. K. Singh,et al.  Improved and innovative key generation algorithms for biometric cryptosystems , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[5]  Peng Li,et al.  An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..

[6]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[7]  Bo Fu,et al.  Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.

[8]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[9]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[10]  Hisham Al-Assam,et al.  Robust Biometric Based Key Agreement and Remote Mutual Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Anil K. Jain,et al.  Encyclopedia of Biometrics , 2015, Springer US.

[12]  Marina L. Gavrilova,et al.  Multimodal Cancelable Biometrics , 2012, 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing.

[13]  Seira Hidano,et al.  Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[14]  Ke Xiong,et al.  Is Fuzzy Vault Scheme Very Effective for Key Binding in Biometric Cryptosystems? , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[15]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Nalini K. Ratha,et al.  Advances in Biometrics , 2008 .

[17]  Benjamin Tams Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems , 2013, ArXiv.

[18]  Wang Yao,et al.  A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[19]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[20]  Tom A. M. Kevenaar,et al.  Multi-modal and multi-instance fusion for biometric cryptosystems , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[21]  Qinghai Gao Secure Biometrics , 2009 .

[22]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[23]  Julien Bringer,et al.  A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[25]  Lahouari Ghouti,et al.  Biometric Cryptosystem with Renewable Templates , 2012 .

[26]  Masao Kasahara,et al.  On biometric encryption using fingerprint and it's security evaluation , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[27]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[28]  Venu Govindaraju,et al.  Advances in Biometrics: Sensors, Algorithms and Systems , 2007 .

[29]  Aboul Ella Hassanien,et al.  A Hybrid Approach for Biometric Template Security , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[30]  Bo Fu,et al.  Analysis of multi-biometric encryption at feature-level fusion , 2012, Proceedings of the 10th World Congress on Intelligent Control and Automation.

[31]  D. M. Hutton Advances in Biometrics: Sensors, Algorithms and Systems , 2008 .

[32]  Daesung Moon,et al.  Biometrics Information Protection Using Fuzzy Vault Scheme , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.

[33]  Norimichi Tsumura,et al.  Securing BioEncoded IrisCodes against Correlation Attacks , 2011, 2011 IEEE International Conference on Communications (ICC).

[34]  Tom Gaertner,et al.  Biometric Systems Technology Design And Performance Evaluation , 2016 .

[35]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[36]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[37]  Yoshifumi Ueshige,et al.  A proposal of efficient scheme of key management using ID-based encryption and Biometrics , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).