http://iet.metastore.ingenta.com
1887

Chaff point generation mechanism for improving fuzzy vault security

Chaff point generation mechanism for improving fuzzy vault security

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances the security level of current biometric cryptographic systems in terms of hiding secret key and protecting the template. Although the original scheme suggests the use of error-correction techniques (e.g. the Reed–Solomon code) to reconstruct the original polynomial, recent implementations do not share the same point of view. Instead, cyclic redundant code (CRC) is applied to identify the genuine polynomial from a set of candidates due to its simplicity. Within the scope of this study, the authors address a significant flaw of current CRC-based fuzzy vault schemes, which allows the potential of successful blend substitution attack. To overcome this problem, an integration of two novel modules into general fuzzy vault scheme, namely chaff point generator and verifier, is proposed. The new modules are designed to be integrated easily into the existing systems as well as simple to enhance. The proposed scheme can detect any modification in vault and, as a result, eliminate the blend substitution attack to improve general security. Moreover, the experimental results of this study with real-world datasets show an increase in genuine acceptance rates.

References

    1. 1)
    2. 2)
      • 2. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 3, (1), pp. 125.
    3. 3)
    4. 4)
      • 4. Uludag, U., Pankanti, S., Jain, A.K.: ‘Fuzzy vault for fingerprints’. Proc. of Audio-and Video-Based Biometric Person Authentication, January 2005, pp. 310319.
    5. 5)
      • 5. Uludag, U., Jain, A.: ‘Securing fingerprint template: fuzzy vault with helper data’. Proc. Computer Vision and Pattern Recognition Workshop, June 2006, pp. 163163.
    6. 6)
    7. 7)
      • 7. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingerprint fuzzy vault using password’. Proc. Advances in Biometrics, 2007, pp. 927937.
    8. 8)
      • 8. Clancy, T.C., Kiyavash, N., Lin, D.J.: ‘Secure smartcard based fingerprint authentication’. Proc. ACM SIGMM Workshop on Biometrics Methods and Applications, November 2003, pp. 4552.
    9. 9)
      • 9. Poon, H.T., Miri, A.: ‘On efficient decoding for the fuzzy vault scheme’. Proc. Information Science, Signal Processing and their Applications (ISSPA), July 2012, pp. 454459.
    10. 10)
    11. 11)
    12. 12)
      • 12. Mihailescu, P.: ‘The fuzzy vault for fingerprints is vulnerable to brute force attack’, arXiv preprint arXiv:0708.2974, 2007.
    13. 13)
      • 13. Chang, E.C., Shen, R., Teo, F.W.: ‘Finding the original point set hidden among chaff’. Proc. ACM Symp. on Information, Computer and Communications Security, March 2006, pp. 182188.
    14. 14)
      • 14. Poona, H.T., Miria, A.: ‘A collusion attack on the fuzzy vault scheme’, ISC Int. J. Inf. Security, 2009, Bd, 1, (1), pp. 2734.
    15. 15)
      • 15. Scheirer, W.J., Boult, T.E.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., September 2007, pp. 16.
    16. 16)
      • 16. Hong, S., Jeon, W., Kim, S., et al: ‘The vulnerabilities analysis of fuzzy vault using password’. Proc. Future Generation Communication and Networking, December 2008, vol. 3, pp. 7683.
    17. 17)
      • 17. Tams, B.: ‘Unlinkable minutiae-based fuzzy vault for multiple fingerprints’, IET Biometrics, 2015DOI: 10.1049/iet-bmt.2014.0093, Online ISSN 2047-4946, Available online: 23 June 2015.
    18. 18)
    19. 19)
      • 19. Maio, D., Maltoni, D., Cappelli, R., et al: ‘FVC2002: second fingerprint verification competition’, Proc. Pattern Recognit., 2002, 3, pp. 811814.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0023
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0023
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address