Skip to main content
Log in

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Biometric identification has caused a multitude of problems in the networking environment, such as the storage of user’s biometric template and the leakage of user’s privacy, therefore, biometric encryption has been the focus of the recent studies which are based on Fuzzy Vault, Fuzzy Commitment, and dynamic key generation. However, due to fuzzy information inherent biological characteristics, essentially deterministic analysis techniques, Fuzzy Vault, and Fuzzy Commitment have been accused of stored biometric templates and short keys. Fuzzy Information Processing needs suitable technology, such as fuzzy logic, to obtain better results. In this paper, we propose a new fingerprint encryption scheme which utilizes the high-dimension space projection. Unlike the reliance on biometric templates in Fuzzy Vault-based scheme or “encrypted” templates in Fuzzy Commitment-based scheme, this new scheme, similar to the dynamic biometric key generation scheme, protects biometric key in a polynomial, and hence saves “nothing” on the biometric characteristics. Thus, it integrates the advantages of Fuzzy Vault, Fuzzy Commitment, and dynamic key generation into one scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177

  • Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908

    Google Scholar 

  • Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683

    Article  Google Scholar 

  • Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134

    Article  Google Scholar 

  • Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15

  • Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553

    Article  Google Scholar 

  • Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52

  • Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903

    Article  Google Scholar 

  • Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput. doi:10.1109/TC.2015.2389952

  • Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69

    Google Scholar 

  • Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311

    Article  Google Scholar 

  • Kelkboom EJ, Breebaart J, Kevenaar TA, Buhan I, Veldhuis RN (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107–121

    Article  Google Scholar 

  • Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472

    Article  Google Scholar 

  • Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536

    Article  MATH  Google Scholar 

  • Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689

    Article  MATH  MathSciNet  Google Scholar 

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5

  • Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561

    Article  Google Scholar 

  • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  • Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220

    Article  Google Scholar 

  • Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574

    Article  Google Scholar 

  • Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971

    Article  Google Scholar 

  • Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N

  • Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757

    Article  Google Scholar 

  • Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25

    Google Scholar 

  • Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381

  • Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6

  • Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191

    Article  Google Scholar 

  • Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6

  • Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Humaniz Comput 2(2):113–126

    Article  Google Scholar 

  • Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319

  • Wang XA, Ma J, Yang X (2015) A new proxy re-encryption scheme for protecting critical information systems. J Ambient Intell Humaniz Comput pp 1–13. doi:10.1007/s12652-015-0261-3

  • Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180

    Google Scholar 

  • Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: 2012 5th IAPR international conference on biometrics (ICB), IEEE, pp 238–244

Download references

Acknowledgments

This research was supported by Zhejiang Province Science and Technology Innovation Program under Grant Number (2013TD03) and the National Science Foundation of China (No. 61272045), (No. 61201301), (No. 61472091). And the Guangzhou Zhujiang Science and Technology Future Fellow Fund (Grant No. 2012J2200094), Distinguished Young Scholars Fund of Department of Education.(No. Yq2013126), Guangdong Province. We gratefully acknowledge funding support from the Major Program of National Social Science Foundation of China (No.11&ZD088).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhendong Wu.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, Z., Liang, B., You, L. et al. High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20, 4907–4918 (2016). https://doi.org/10.1007/s00500-015-1778-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-1778-2

Keywords

Navigation