Neoteric chaff generation method of ngerprint fuzzy vault
Neoteric chaff generation method of ngerprint fuzzy vault
Authentication using biometrics has an edge over traditional authentication mechanisms. Fuzzy vault is an eminent biometric cryptosystem technique that aims to protect a secret using a biometric template. Authorized users can, however, access the secret by providing the valid biometric. In a fuzzy vault, noise is incorporated in the form of chaff points in order to increase the security. While implementing fuzzy vault schemes in real scenarios, the most critical but computing-intensive and time-consuming task is chaff generation. In this paper, a neoteric method for chaff generation is proposed, which is less time-consuming in generating large numbers of chaff points.
___
- [1] Jain AK, Ross A, Prabhakar S. An introduction to biometric recognition. IEEE T Circ Syst Vid 2004; 14: 4-20.
- [2] Ratha NK, Connell JH, Bolle RM. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 2001; 40: 614-34.
- [3] Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP J Adv Sig Pr 2008; 2008: 579416.
- [4] Juels A, Sudan M. A fuzzy vault scheme. In: Proceedings of the IEEE 2002 International Symposium on Information Theory; 30 June{5 July 2002. New York, NY, USA: IEEE. p. 408.
- [5] Clancy TC, Kiyavash N, Lin DJ. Secure smartcard-based ngerprint authentication. In: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications; 8 November 2003. New York, NY, USA: ACM. pp. 45-52.
- [6] Nguyen TH, Wang Y, Ha Y, Li R. Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrics 2013; 2: 48-55.
- [7] Nandakumar K, Nagar A, Jain AK. Hardening ngerprint fuzzy vault using password. In: Proceedings of the 2007 International Conference on Advances in Biometrics; 2007. Berlin, Germany: Springer-Verlag. pp. 927-937.
- [8] Khalil-Hani M, Bakhteri R. Securing cryptographic key with fuzzy vault based on a new chaff generation method. In: IEEE 2010 International Conference on High Performance Computing and Simulation; 28 June 2010. New York, NY, USA: IEEE. pp. 259-265.
- [9] Uludag U, Pankanti S, Jain AK. Fuzzy vault for ngerprints. In: Proceedings of the Fifth International Conference on Audio- and Video-Based Biometric Person Authentication; 20{22 July 2005; Hilton Rye Town, NY, USA. Berlin, Germany: Springer. pp. 310-319.
- [10] Yang S, Verbauwhede I. Automatic secure ngerprint veri cation system based on fuzzy vault scheme. In: IEEE 2005 International Conference on Acoustics, Speech, and Signal Processing; 23 March 2005. New York, NY, USA: IEEE. pp. 609-612.
- [11] Uludag U, Jain A. Securing ngerprint template: fuzzy vault with helper data. In: IEEE 2006 Conference on Computer Vision and Pattern Recognition Workshop; 17{22 June 2006; Washington, DC, USA. New York, NY, USA: IEEE. pp. 163-163.
- [12] Nandakumar K, Jain AK, Pankanti S. Fingerprint-based fuzzy vault: implementation and performance. IEEE T Inf Foren Sec 2007; 2: 744-757.
- [13] Moon D, Lee S, Chung Y, Pan SB, Moon K. Implementation of automatic fuzzy ngerprint vault. In: IEEE 2008 International Conference on Machine Learning and Cybernetics; 12{15 July 2008. New York, NY, USA: IEEE. pp. 3781-3786.
- [14] Li P, Yang X, Cao K, Shi P, Tian J. Security-enhanced fuzzy ngerprint vault based on minutiae's local ridge information. In: Proceedings of the Third International Conference on Biometrics; 2{5 June 2009; Alghero, Italy. Berlin, Germany: Springer. pp. 930-939.
- [15] Li P, Yang X, Cao K, Tao X, Wang R, Tian J. An alignment-free ngerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 2010; 33: 207-220.
- [16] Orencik C, Pedersen TB, Savas E, Keskinoz M. Securing fuzzy vault schemes through biometric hashing. Turk J Elec Eng & Comp Sci 2010; 18: 515-539.
- [17] Benhammadi F, Bey KB. Password hardened fuzzy vault for ngerprint authentication system. Image Vision Comput 2014; 32: 487-496.
- [18] Bansal D, Sofat S, Kaur M. Fingerprint fuzzy vault using Hadamard transformation. In: IEEE 2015 International Conference on Advances in Computing, Communications and Informatics; 10{13 August 2015. New York, NY, USA: IEEE. pp. 1830-1834.
- [19] Nguyen TH, Wang Y, Ha Y, Li R. Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted ngerprints. IET Biometrics 2015; 4: 29-39.
- [20] Orencik C, Pedersen TB, Savas E, Keskinoz M. Improved fuzzy vault scheme for ngerprint veri cation. In: SECRYPT 2008 - International Conference on Security and Cryptography; January 2008. pp. 37-43.
- [21] Khalil-Hani M, Marsono MN, Bakhteri R. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Gener Comp Sy 2013; 29: 800-810.
- [22] Nguyen TH, Wang Y, Nguyen TN, Li R. A ngerprint fuzzy vault scheme using a fast chaff point generation algorithm. In: IEEE 2013 International Conference on Signal Processing, Communication and Computing; 5{8 August 2013. New York, NY, USA: IEEE. pp. 1-6.
- [23] Hooda R, Kaur M. Novel chaff generation for ngerprint fuzzy vault. British Journal of Mathematics & Computer Science 2015; 10: 1-9.
- [24] Nguyen MT, Truong QH, Dang TK. Enhance fuzzy vault security using nonrandom chaff point generator. Inform Process Lett 2016; 116: 53-64.
- [25] Chang EC, Shen R, Teo FW. Finding the original point set hidden among chaff. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security; 21{24 March 2006; Taipei, Taiwan. New York, NY, USA: ACM. pp. 182-188.
- [26] Nandakumar K. Multibiometric systems: fusion strategies and template security. PhD, Michigan State University, East Lansing, MI, 2008.