Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Chaff point generation mechanism for improving fuzzy vault security

A combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances the security level of current biometric cryptographic systems in terms of hiding secret key and protecting the template. Although the original scheme suggests the use of error-correction techniques (e.g. the Reed–Solomon code) to reconstruct the original polynomial, recent implementations do not share the same point of view. Instead, cyclic redundant code (CRC) is applied to identify the genuine polynomial from a set of candidates due to its simplicity. Within the scope of this study, the authors address a significant flaw of current CRC-based fuzzy vault schemes, which allows the potential of successful blend substitution attack. To overcome this problem, an integration of two novel modules into general fuzzy vault scheme, namely chaff point generator and verifier, is proposed. The new modules are designed to be integrated easily into the existing systems as well as simple to enhance. The proposed scheme can detect any modification in vault and, as a result, eliminate the blend substitution attack to improve general security. Moreover, the experimental results of this study with real-world datasets show an increase in genuine acceptance rates.

References

    1. 1)
      • 16. Hong, S., Jeon, W., Kim, S., et al: ‘The vulnerabilities analysis of fuzzy vault using password’. Proc. Future Generation Communication and Networking, December 2008, vol. 3, pp. 7683.
    2. 2)
      • 17. Tams, B.: ‘Unlinkable minutiae-based fuzzy vault for multiple fingerprints’, IET Biometrics, 2015DOI: 10.1049/iet-bmt.2014.0093, Online ISSN 2047-4946, Available online: 23 June 2015.
    3. 3)
      • 13. Chang, E.C., Shen, R., Teo, F.W.: ‘Finding the original point set hidden among chaff’. Proc. ACM Symp. on Information, Computer and Communications Security, March 2006, pp. 182188.
    4. 4)
      • 7. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingerprint fuzzy vault using password’. Proc. Advances in Biometrics, 2007, pp. 927937.
    5. 5)
      • 14. Poona, H.T., Miria, A.: ‘A collusion attack on the fuzzy vault scheme’, ISC Int. J. Inf. Security, 2009, Bd, 1, (1), pp. 2734.
    6. 6)
    7. 7)
    8. 8)
      • 2. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 3, (1), pp. 125.
    9. 9)
      • 4. Uludag, U., Pankanti, S., Jain, A.K.: ‘Fuzzy vault for fingerprints’. Proc. of Audio-and Video-Based Biometric Person Authentication, January 2005, pp. 310319.
    10. 10)
      • 5. Uludag, U., Jain, A.: ‘Securing fingerprint template: fuzzy vault with helper data’. Proc. Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163163.
    11. 11)
      • 8. Clancy, T.C., Kiyavash, N., Lin, D.J.: ‘Secure smartcard based fingerprint authentication’. Proc. ACM SIGMM Workshop on Biometrics Methods and Applications, November 2003, pp. 4552.
    12. 12)
    13. 13)
      • 15. Scheirer, W.J., Boult, T.E.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., September 2007, pp. 16.
    14. 14)
    15. 15)
      • 12. Mihailescu, P.: ‘The fuzzy vault for fingerprints is vulnerable to brute force attack’, arXiv preprint arXiv:0708.2974, 2007.
    16. 16)
      • 19. Maio, D., Maltoni, D., Cappelli, R., et al: ‘FVC2002: second fingerprint verification competition’, Proc. Pattern Recognit., 2002, 3, pp. 811814.
    17. 17)
    18. 18)
    19. 19)
      • 9. Poon, H.T., Miri, A.: ‘On efficient decoding for the fuzzy vault scheme’. Proc. Information Science, Signal Processing and their Applications (ISSPA), July 2012, pp. 454459.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0023
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0023
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address