Abstract
Biometric identification has caused a multitude of problems in the networking environment, such as the storage of user’s biometric template and the leakage of user’s privacy, therefore, biometric encryption has been the focus of the recent studies which are based on Fuzzy Vault, Fuzzy Commitment, and dynamic key generation. However, due to fuzzy information inherent biological characteristics, essentially deterministic analysis techniques, Fuzzy Vault, and Fuzzy Commitment have been accused of stored biometric templates and short keys. Fuzzy Information Processing needs suitable technology, such as fuzzy logic, to obtain better results. In this paper, we propose a new fingerprint encryption scheme which utilizes the high-dimension space projection. Unlike the reliance on biometric templates in Fuzzy Vault-based scheme or “encrypted” templates in Fuzzy Commitment-based scheme, this new scheme, similar to the dynamic biometric key generation scheme, protects biometric key in a polynomial, and hence saves “nothing” on the biometric characteristics. Thus, it integrates the advantages of Fuzzy Vault, Fuzzy Commitment, and dynamic key generation into one scheme.
Similar content being viewed by others
References
Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177
Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908
Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2008) Theoretical and practical boundaries of binary secure sketches. IEEE Trans Inf Forensics Secur 3(4):673–683
Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3d healthcare data. Futur Gener Comput Syst 43:120–134
Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15
Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553
Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52
Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput. doi:10.1109/TC.2015.2389952
Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69
Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311
Kelkboom EJ, Breebaart J, Kevenaar TA, Buhan I, Veldhuis RN (2011) Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Trans Inf Forensics Secur 6(1):107–121
Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472
Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536
Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5
Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561
Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220
Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574
Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971
Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N
Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757
Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25
Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381
Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6
Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191
Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
Tistarelli M, Schouten B (2011) Biometrics in ambient intelligence. J Ambient Intell Humaniz Comput 2(2):113–126
Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319
Wang XA, Ma J, Yang X (2015) A new proxy re-encryption scheme for protecting critical information systems. J Ambient Intell Humaniz Comput pp 1–13. doi:10.1007/s12652-015-0261-3
Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180
Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: 2012 5th IAPR international conference on biometrics (ICB), IEEE, pp 238–244
Acknowledgments
This research was supported by Zhejiang Province Science and Technology Innovation Program under Grant Number (2013TD03) and the National Science Foundation of China (No. 61272045), (No. 61201301), (No. 61472091). And the Guangzhou Zhujiang Science and Technology Future Fellow Fund (Grant No. 2012J2200094), Distinguished Young Scholars Fund of Department of Education.(No. Yq2013126), Guangdong Province. We gratefully acknowledge funding support from the Major Program of National Social Science Foundation of China (No.11&ZD088).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Wu, Z., Liang, B., You, L. et al. High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20, 4907–4918 (2016). https://doi.org/10.1007/s00500-015-1778-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-015-1778-2