Skip to main content
Top
Published in: Soft Computing 12/2016

14-07-2015 | Methodologies and Application

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

Authors: Zhendong Wu, Bin Liang, Lin You, Zhihua Jian, Jin Li

Published in: Soft Computing | Issue 12/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Biometric identification has caused a multitude of problems in the networking environment, such as the storage of user’s biometric template and the leakage of user’s privacy, therefore, biometric encryption has been the focus of the recent studies which are based on Fuzzy Vault, Fuzzy Commitment, and dynamic key generation. However, due to fuzzy information inherent biological characteristics, essentially deterministic analysis techniques, Fuzzy Vault, and Fuzzy Commitment have been accused of stored biometric templates and short keys. Fuzzy Information Processing needs suitable technology, such as fuzzy logic, to obtain better results. In this paper, we propose a new fingerprint encryption scheme which utilizes the high-dimension space projection. Unlike the reliance on biometric templates in Fuzzy Vault-based scheme or “encrypted” templates in Fuzzy Commitment-based scheme, this new scheme, similar to the dynamic biometric key generation scheme, protects biometric key in a polynomial, and hence saves “nothing” on the biometric characteristics. Thus, it integrates the advantages of Fuzzy Vault, Fuzzy Commitment, and dynamic key generation into one scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177 Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177
go back to reference Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908 Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908
go back to reference Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683CrossRef Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683CrossRef
go back to reference Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134CrossRef Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134CrossRef
go back to reference Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15 Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15
go back to reference Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553CrossRef Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553CrossRef
go back to reference Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52 Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52
go back to reference Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903CrossRef Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903CrossRef
go back to reference Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69 Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69
go back to reference Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311CrossRef Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311CrossRef
go back to reference Kelkboom EJ, Breebaart J, Kevenaar TA, Buhan I, Veldhuis RN (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107–121CrossRef Kelkboom EJ, Breebaart J, Kevenaar TA, Buhan I, Veldhuis RN (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107–121CrossRef
go back to reference Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472CrossRef Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472CrossRef
go back to reference Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536CrossRefMATH Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536CrossRefMATH
go back to reference Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5
go back to reference Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561CrossRef Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561CrossRef
go back to reference Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRef
go back to reference Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220CrossRef Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220CrossRef
go back to reference Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574CrossRef Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574CrossRef
go back to reference Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971CrossRef Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971CrossRef
go back to reference Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N
go back to reference Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757CrossRef Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757CrossRef
go back to reference Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25 Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25
go back to reference Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381 Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381
go back to reference Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6 Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6
go back to reference Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191CrossRef Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191CrossRef
go back to reference Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6 Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
go back to reference Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Humaniz Comput 2(2):113–126CrossRef Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Humaniz Comput 2(2):113–126CrossRef
go back to reference Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319 Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319
go back to reference Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180 Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180
go back to reference Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: 2012 5th IAPR international conference on biometrics (ICB), IEEE, pp 238–244 Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: 2012 5th IAPR international conference on biometrics (ICB), IEEE, pp 238–244
Metadata
Title
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia
Authors
Zhendong Wu
Bin Liang
Lin You
Zhihua Jian
Jin Li
Publication date
14-07-2015
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 12/2016
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-015-1778-2

Other articles of this Issue 12/2016

Soft Computing 12/2016 Go to the issue

Premium Partner