access icon free Chaff point generation mechanism for improving fuzzy vault security

A combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances the security level of current biometric cryptographic systems in terms of hiding secret key and protecting the template. Although the original scheme suggests the use of error-correction techniques (e.g. the Reed–Solomon code) to reconstruct the original polynomial, recent implementations do not share the same point of view. Instead, cyclic redundant code (CRC) is applied to identify the genuine polynomial from a set of candidates due to its simplicity. Within the scope of this study, the authors address a significant flaw of current CRC-based fuzzy vault schemes, which allows the potential of successful blend substitution attack. To overcome this problem, an integration of two novel modules into general fuzzy vault scheme, namely chaff point generator and verifier, is proposed. The new modules are designed to be integrated easily into the existing systems as well as simple to enhance. The proposed scheme can detect any modification in vault and, as a result, eliminate the blend substitution attack to improve general security. Moreover, the experimental results of this study with real-world datasets show an increase in genuine acceptance rates.

Inspec keywords: fuzzy set theory; biometrics (access control); data protection; polynomials; private key cryptography; cyclic redundancy check codes

Other keywords: cyclic redundant code; CRC; cryptographic key system; fuzzy vault security; binding technique; biometric template system; secret key hiding; template protection; chaff point generation mechanism; polynomial identification

Subjects: Cryptography; Combinatorial mathematics; Codes; Algebra; Algebra; Data security; Combinatorial mathematics

References

    1. 1)
      • 16. Hong, S., Jeon, W., Kim, S., et al: ‘The vulnerabilities analysis of fuzzy vault using password’. Proc. Future Generation Communication and Networking, December 2008, vol. 3, pp. 7683.
    2. 2)
      • 17. Tams, B.: ‘Unlinkable minutiae-based fuzzy vault for multiple fingerprints’, IET Biometrics, 2015DOI: 10.1049/iet-bmt.2014.0093, Online ISSN 2047-4946, Available online: 23 June 2015.
    3. 3)
      • 13. Chang, E.C., Shen, R., Teo, F.W.: ‘Finding the original point set hidden among chaff’. Proc. ACM Symp. on Information, Computer and Communications Security, March 2006, pp. 182188.
    4. 4)
      • 7. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingerprint fuzzy vault using password’. Proc. Advances in Biometrics, 2007, pp. 927937.
    5. 5)
      • 14. Poona, H.T., Miria, A.: ‘A collusion attack on the fuzzy vault scheme’, ISC Int. J. Inf. Security, 2009, Bd, 1, (1), pp. 2734.
    6. 6)
    7. 7)
    8. 8)
      • 2. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 3, (1), pp. 125.
    9. 9)
      • 4. Uludag, U., Pankanti, S., Jain, A.K.: ‘Fuzzy vault for fingerprints’. Proc. of Audio-and Video-Based Biometric Person Authentication, January 2005, pp. 310319.
    10. 10)
      • 5. Uludag, U., Jain, A.: ‘Securing fingerprint template: fuzzy vault with helper data’. Proc. Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163163.
    11. 11)
      • 8. Clancy, T.C., Kiyavash, N., Lin, D.J.: ‘Secure smartcard based fingerprint authentication’. Proc. ACM SIGMM Workshop on Biometrics Methods and Applications, November 2003, pp. 4552.
    12. 12)
    13. 13)
      • 15. Scheirer, W.J., Boult, T.E.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., September 2007, pp. 16.
    14. 14)
    15. 15)
      • 12. Mihailescu, P.: ‘The fuzzy vault for fingerprints is vulnerable to brute force attack’, arXiv preprint arXiv:0708.2974, 2007.
    16. 16)
      • 19. Maio, D., Maltoni, D., Cappelli, R., et al: ‘FVC2002: second fingerprint verification competition’, Proc. Pattern Recognit., 2002, 3, pp. 811814.
    17. 17)
    18. 18)
    19. 19)
      • 9. Poon, H.T., Miri, A.: ‘On efficient decoding for the fuzzy vault scheme’. Proc. Information Science, Signal Processing and their Applications (ISSPA), July 2012, pp. 454459.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0023
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0023
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading