Skip to main content
Erschienen in: Soft Computing 11/2019

14.03.2018 | Methodologies and Application

A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion

verfasst von: Lin You, Ting Wang

Erschienen in: Soft Computing | Ausgabe 11/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy vault scheme uses a single biological template, and the biological feature parameters are directly present in the fuzzy vault, this will not effectively protect the biological template. To deal with this problem, we propose a novel fuzzy vault scheme based on fingerprint and finger vein feature fusion which can alleviate the limitation of the fuzzy vault using one biological template. It is difficult for attackers to restore each biological template from the fusion template. In addition, the fusion encoding not the feature point parameters is stored in our fuzzy vault, and this fusion encoding will not reveal the information of feature point. Our experiment results show that our scheme can also achieve a high genuine acceptance rate and a low false acceptance rate.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90–98 Cavoukian A, Stoianov A (2011) Biometric encryption. In: Van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Springer, New York, pp 90–98
Zurück zum Zitat Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286–4290CrossRef Chae CJ, Choi KN, Choi K, Kin JS, Shin YJ (2014) Enhanced biometric encryption algorithm for private key protection in BioPKI system. J Cent South Univ Technol 21(11):4286–4290CrossRef
Zurück zum Zitat Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT’ 2004). Interlaken, pp 523–540 Dodis Y, Reyzin L. FuzzyeExtractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the international conference on advances in cryptology (EUROCRYPT’ 2004). Interlaken, pp 523–540
Zurück zum Zitat Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1–5 Geetika, Kaur M (2013) Multimodal based fuzzy vault using iris retina and finger vein. In: Proceedings of the fourth international conference on computing, communications and networking technologies. Tiruchengode, pp 1–5
Zurück zum Zitat Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540–547 Hirschbichler M, Boyd C, Boles W (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In: the Proceeding of the 2008 international conference on digital image computing: techniques and applications. Canberra, pp 540–547
Zurück zum Zitat Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of the international symposium on information theory. Lausanne, p 408 Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of the international symposium on information theory. Lausanne, p 408
Zurück zum Zitat Li S, Kot AC (2013) Fingerprint combination for privacy protection. IEEE Trans Inf Forensics Secur 8(2):350–360CrossRef Li S, Kot AC (2013) Fingerprint combination for privacy protection. IEEE Trans Inf Forensics Secur 8(2):350–360CrossRef
Zurück zum Zitat Liu H, Sun D, Xiong K, et al (2010) 3D fuzzy vault based on palmprint. In: Proceedings of the 2010 IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). Huangshan, pp 230–234 Liu H, Sun D, Xiong K, et al (2010) 3D fuzzy vault based on palmprint. In: Proceedings of the 2010 IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). Huangshan, pp 230–234
Zurück zum Zitat Lu L, Peng J (2014) Finger multi-biometric cryptosystem using feature-level fusion. Int J Signal Process Image Process Pattern Recognit 7:1035–1046 Lu L, Peng J (2014) Finger multi-biometric cryptosystem using feature-level fusion. Int J Signal Process Image Process Pattern Recognit 7:1035–1046
Zurück zum Zitat Moon D, Chung Y, Seo C et al (2014) A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25(2):293–302CrossRef Moon D, Chung Y, Seo C et al (2014) A practical implementation of fuzzy fingerprint vault for smart cards. J Intell Manuf 25(2):293–302CrossRef
Zurück zum Zitat Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268CrossRef
Zurück zum Zitat Nandakumar K, Jain A K (2008) Multibiometric template security using fuzzy vault. In: the Proceeding of the 2008 international conference on biometrics: theory, applications and systems. Arlington, pp 1–6 Nandakumar K, Jain A K (2008) Multibiometric template security using fuzzy vault. In: the Proceeding of the 2008 international conference on biometrics: theory, applications and systems. Arlington, pp 1–6
Zurück zum Zitat Nandakumar K, Nagar A, Jain A K (2007) Hardening fingerprint fuzzy vault using password. In: Proceeding of the 2007 international conference on Advances in Biometrics. Berlin, pp 927–937 Nandakumar K, Nagar A, Jain A K (2007) Hardening fingerprint fuzzy vault using password. In: Proceeding of the 2007 international conference on Advances in Biometrics. Berlin, pp 927–937
Zurück zum Zitat Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in cloud computing. In: Proceeding of 2014 international symposium on biometrics and security technologies (ISBAST’ 15). Kuala Lumpur, pp 45–50 Omar MN, Salleh M, Bakhtiari M (2014) Biometric encryption to enhance confidentiality in cloud computing. In: Proceeding of 2014 international symposium on biometrics and security technologies (ISBAST’ 15). Kuala Lumpur, pp 45–50
Zurück zum Zitat Uludag U, Jain A (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of Cvpr workshop on privacy research in vision. New York, pp 17–22 Uludag U, Jain A (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of Cvpr workshop on privacy research in vision. New York, pp 17–22
Zurück zum Zitat Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Lecture notes in computer science, vol 3546, pp 310–319 Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Lecture notes in computer science, vol 3546, pp 310–319
Zurück zum Zitat Wu L, Xiao P, Jiang S, et al (2011) A fuzzy vault scheme for feature fusion. In: Proceedings of the 6th Chinese conference on Biometric recognition (CCBR’11). Beijing, pp 237–243 Wu L, Xiao P, Jiang S, et al (2011) A fuzzy vault scheme for feature fusion. In: Proceedings of the 6th Chinese conference on Biometric recognition (CCBR’11). Beijing, pp 237–243
Zurück zum Zitat Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 second international symposium on data, privacy, and e-commerce. New York, pp 45–49 Wu L, Yuan S (2010) A face based fuzzy vault scheme for secure online authentication. In: Proceedings of the 2010 second international symposium on data, privacy, and e-commerce. New York, pp 45–49
Metadaten
Titel
A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion
verfasst von
Lin You
Ting Wang
Publikationsdatum
14.03.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 11/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3046-8

Weitere Artikel der Ausgabe 11/2019

Soft Computing 11/2019 Zur Ausgabe