Skip to main content
Erschienen in: Soft Computing 12/2019

21.02.2018 | Methodologies and Application

Multiply information coding and hiding using fuzzy vault

verfasst von: Katarzyna Koptyra, Marek R. Ogiela

Erschienen in: Soft Computing | Ausgabe 12/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we show some new ideas of hiding several secrets with the use of fuzzy vault construction and, in addition, a few systems based on presented concept. The main assumption is that all pieces of information are put into single vault and each of the secrets is linked with individual key. The keys are required to be disjunctive, and each of them should be in form of unordered set. In recovering process, revealed information is dependent on used key. Presented method is error-tolerant and thus is suitable for working together with biometrics. The interesting characteristic of multi-secret fuzzy vault is that the adversary is not able to distinguish it from the single-secret version. The article describes also a number of information systems built on the basis of presented scheme, including cooperation with false steganography (where every biometric trait encodes different steganographic key), password management and multi-user systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Aboalsamh HA (2011) A multi biometric system using combined vein and fingerprint identification. Int J Circuits Syst Signal Process 5(1):9–36 Aboalsamh HA (2011) A multi biometric system using combined vein and fingerprint identification. Int J Circuits Syst Signal Process 5(1):9–36
Zurück zum Zitat Castiglione A, D’Alessio B, De Santis A (2011) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), pp 363–368. https://doi.org/10.1109/BWCCA.2011.60 Castiglione A, D’Alessio B, De Santis A (2011) Steganography and secure communication on online social networks and online photo sharing. In: 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), pp 363–368. https://​doi.​org/​10.​1109/​BWCCA.​2011.​60
Zurück zum Zitat Clancy TC, Kiyavash N, Lin D (2003) Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM 2003 multimedia, biometrics methods and applications workshop, pp 45–52 Clancy TC, Kiyavash N, Lin D (2003) Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM 2003 multimedia, biometrics methods and applications workshop, pp 45–52
Zurück zum Zitat Freire-Santos M, Fierrez-Aguilar J, Ortega-Garcia J (2006) Cryptographic key generation using handwritten signature. In: Biometric technology for human identification III, SPIE, International Society for Optical Engineering, Bellingham Freire-Santos M, Fierrez-Aguilar J, Ortega-Garcia J (2006) Cryptographic key generation using handwritten signature. In: Biometric technology for human identification III, SPIE, International Society for Optical Engineering, Bellingham
Zurück zum Zitat Khalil-Hani M, Marsono MN, Bakhteri R (2013) Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Futur Gener Comput Syst 29(3):800–810 special Section: Recent Developments in High Performance Computing and SecurityCrossRef Khalil-Hani M, Marsono MN, Bakhteri R (2013) Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Futur Gener Comput Syst 29(3):800–810 special Section: Recent Developments in High Performance Computing and SecurityCrossRef
Zurück zum Zitat Koptyra K, Ogiela MR (2015) Fuzzy vault schemes in multi-secret digital steganography. In: 10th international conference on broadband and wireless computing, communication and applications, BWCCA 2015, Krakow, Poland, November 4–6, 2015, pp 183–186. https://doi.org/10.1109/BWCCA.2015.87 Koptyra K, Ogiela MR (2015) Fuzzy vault schemes in multi-secret digital steganography. In: 10th international conference on broadband and wireless computing, communication and applications, BWCCA 2015, Krakow, Poland, November 4–6, 2015, pp 183–186. https://​doi.​org/​10.​1109/​BWCCA.​2015.​87
Zurück zum Zitat Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2:744–757CrossRef Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2:744–757CrossRef
Zurück zum Zitat Nguyen MT, Truong QH, Dang TK (2014) Enhance fuzzy vault security using nonrandom chaff point generator. In: Proceedings of the future data and security engineering—first international conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19–21, 2014, pp 204–219. https://doi.org/10.1007/978-3-319-12778-1_16 Nguyen MT, Truong QH, Dang TK (2014) Enhance fuzzy vault security using nonrandom chaff point generator. In: Proceedings of the future data and security engineering—first international conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19–21, 2014, pp 204–219. https://​doi.​org/​10.​1007/​978-3-319-12778-1_​16
Zurück zum Zitat Ogiela MR, Ogiela U (2009) Security of linguistic threshold schemes in multimedia systems. In: Damiani E, Jeong J, JHowlett R, Jain LC (eds) New directions in intelligent interactive multimedia systems and services-2, vol 226. Springer, Berlin, pp 13–20CrossRef Ogiela MR, Ogiela U (2009) Security of linguistic threshold schemes in multimedia systems. In: Damiani E, Jeong J, JHowlett R, Jain LC (eds) New directions in intelligent interactive multimedia systems and services-2, vol 226. Springer, Berlin, pp 13–20CrossRef
Zurück zum Zitat Reichl D (2003) KeePass—the official website of keepass, the free, open source, light-weight and easy-to-use password manager. http://keepass.info/. Accessed 17 Sep 2016 Reichl D (2003) KeePass—the official website of keepass, the free, open source, light-weight and easy-to-use password manager. http://​keepass.​info/​. Accessed 17 Sep 2016
Zurück zum Zitat Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960CrossRef Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960CrossRef
Zurück zum Zitat Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Proceedings of the 5th international conference on audio- and video-based biometric person authentication, AVBPA’05. Springer, Berlin, pp 310–319. https://doi.org/10.1007/11527923_32 Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Proceedings of the 5th international conference on audio- and video-based biometric person authentication, AVBPA’05. Springer, Berlin, pp 310–319. https://​doi.​org/​10.​1007/​11527923_​32
Zurück zum Zitat Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of 2005 IEEE international conference on acoustics, speech, and signal, vol 5, pp 609–612 Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of 2005 IEEE international conference on acoustics, speech, and signal, vol 5, pp 609–612
Metadaten
Titel
Multiply information coding and hiding using fuzzy vault
verfasst von
Katarzyna Koptyra
Marek R. Ogiela
Publikationsdatum
21.02.2018
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 12/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3089-x

Weitere Artikel der Ausgabe 12/2019

Soft Computing 12/2019 Zur Ausgabe