Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 337))

Abstract

Biometric is proved to be an exceptional tool for identifying an individual. Security of biometric template is the most challenging aspect of biometric identification system. Storing the biometric template in the database increases the chance of compromising it which may lead to misuse of the individual identity. This paper proposes a novel and computationally simpler approach to store a biometric sample in the form of template by using cryptographic salts. Use of Personal Image Identification (PII) makes the proposed algorithm more robust and adds another level of security. The saltcrypted templates are created and stored instead of storing the actual sample behaving as a fuzzy vault. The algorithm has been analytically proved computationally simple compared to the existing template security mechanisms. The fuzzy structure of saltcrypted template is entirely dependent on user interaction through PII. Actual template is not stored at any point of time which adds new dimension to the security and hence to individual identity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A., Ross, A., Uludag, U.: Biometric template security: Challenges and solutions. In: Proceedings of European Signal Processing Conference (EUSIPCO), pp. 469–472 (2005)

    Google Scholar 

  2. Jain, A.K., Nandakumar, K., Nagar, A.: Review Article Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 (2008), doi:10.1155/2008/579416

    Google Scholar 

  3. Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12), 1892–1901 (2006)

    Article  Google Scholar 

  4. Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfacesversusfisherfaces: recognition using class specific linear projection. IEEE Transactions on Pattern Analysis and MachineIntelligence 9(7), 711–720 (1997)

    Article  Google Scholar 

  5. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactionson Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  6. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Symposium on Information Theory, vol. 6(3), p. 408 (2002)

    Google Scholar 

  7. Brindha, E.: Biometric Template Security using Fuzzy Vault. In: IEEE 15th International Symposium on Consumer Electronics (2011)

    Google Scholar 

  8. Clancy, T., et al.: Secure Smartcard-based Fingerprint Authentication. In: Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45–52 (2003)

    Google Scholar 

  9. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy vault for fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Nandakumar, et al.: Fingerprint-based Fuzzy Vault: Implementation and Performance. EEE Transactions on Information Forensics and Security 2(4), 744–757 (2007)

    Article  MathSciNet  Google Scholar 

  11. Yang, S., Verbauwhede, I.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609–612 (2005)

    Google Scholar 

  12. Chung, Y., Moon, D.-s., Lee, S.-J., Jung, S.-H., Kim, T., Ahn, D.: Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 358–369. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Moon, D., et al.: Configurable Fuzzy Fingerprint Vault for Match-on-Card System. IEICE Electron Express 6(14), 993–999 (2009)

    Article  Google Scholar 

  14. Zhang, P., Hu, J., Li, C., Bennamound, M., Bhagavatulae, V.: A Pitfall in Fingerprint Bio-Cryptographic Key Generation. In: Computers and Security. Elsevier (2011)

    Google Scholar 

  15. Wolfson, H., Rigoutsos, I.: Geometric Hashing: an Overview. IEEE Computational Science and Engineering 4, 10–21 (1997)

    Article  Google Scholar 

  16. Yang, S., Verbauwhede, I.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. 609–612 (2005)

    Google Scholar 

  17. Zhe, J.: Fingerprint Template Protection with Minutia Vicinity Decomposition. ©2011 IEEE (2011) 9781- 4577-1359-0/11/$26.00

    Google Scholar 

  18. Sharma, N., Rathi, R., Jain, V., Saifi, M.W.: A novel technique for secure information transmission in videos using salt cryptography. In: 2012 Nirma University International Conference on Engineering (NUiCONE), December 6-8, pp. 1–6 (2012)

    Google Scholar 

  19. Santhi, B., Ramkumar, K.: Novel hybrid Technology in ATM security using Biometrics. Journal of Theoretical and Applied Information Technology 37(2) ISSN: 1992- 8645

    Google Scholar 

  20. Moon, D.-s., Lee, S.-J., Jung, S.-H., Chung, Y., Park, M., Yi, O.: Fingerprint Template Protection Using Fuzzy Vault. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol. 4707, pp. 1141–1151. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Uludag, U., Pankanti, S., Jain, A.: Fuzzy Vault for Fingerprints. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310–319. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  22. Long, T.B., Thai, L.H., Hanh, T.: Multimodal Biometric Person Authentication Using Fingerprint, Face Features. In: Anthony, P., Ishizuka, M., Lukose, D. (eds.) PRICAI 2012. LNCS, vol. 7458, pp. 613–624. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  23. Qader, H.A., Ramli, A.R., Al-Haddad, S.: Fingerprint Recognition Using Zernike Moments. The International Arab Journal of Information Technology 4(4) (October 2007)

    Google Scholar 

  24. Shrivastava, R., Thakur, S.: Performance Analysis of Fingerprint Based Biometric Authentication System using RSA. Engineering Universe for Scientific Research and Management 6(2) (February 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarika Khandelwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Khandelwal, S., Gupta, P.C. (2015). Implementation of Secure Biometric Fuzzy Vault Using Personal Image Identification. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-319-13728-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13728-5_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13727-8

  • Online ISBN: 978-3-319-13728-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics