Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

FE-SViT: A SViT-Based Fuzzy Extractor Framework

Published: 02 August 2016 Publication History
  • Get Citation Alerts
  • Abstract

    As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.

    References

    [1]
    Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https://www.open-mpi.org/.
    [2]
    Tohari Ahmad, Jiankun Hu, and Song Wang. 2011. Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44, 10-11 (October 2011), 2555--2564.
    [3]
    Arathi Arakala, Jason Jeffers, and K. Horadam. 2007. Fuzzy extractors for minutiae-based fingerprint authentication. In Advances in Biometrics. LNCS, Vol. 4642. 760--769.
    [4]
    Bir Bhanu and Xuejun Tan. 2003. Fingerprint indexing based on novel features of minutiae triplets. IEEE TPAMI 25 (2003), 616--622.
    [5]
    Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol, ePrint Archive.
    [6]
    Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http://www.cheatsheet.com/technology/how-much-can-you-trust-your-phones-fingerprint-unlock.html.
    [7]
    V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).
    [8]
    Ileana Buhan, Jeroen Doumen, Pieter Hartel, and Raymond Veldhuis. 2007. Constructing practical fuzzy extractors usingQIM. In University of Twente, CTIT technical report, 07-52.
    [9]
    Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 1 (March 2008), 97--139.
    [10]
    Wojtek James Goscinski, Paul McIntosh, Ulrich Felzmann, Anton Maksimenko, Christopher J. Hall, Timur Gureyev, Darren Thompson, Andrew Janke, Graham Galloway, Neil E. B. Killeen, Parnesh Raniga, Owen Kaluza, Amanda Ng, Govinda Poudel, David G. Barnes, Toan Nguyen, Paul Bonnington, and Gary F. Egan. 2014. The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014).
    [11]
    A. K. Jain and David Maltoni. 2003. Handbook of Fingerprint Recognition. Springer, New York.
    [12]
    Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. In Eurasip Journal on Advances in Signal Processing.
    [13]
    J. Jeffers and A. Arakala. 2006. Minutiae-based structures for a fuzzy vault. In Biometric Consortium Conference. 1--6.
    [14]
    Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR.
    [15]
    A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In IEEE International Information Theory Symposium.
    [16]
    Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, and Jie Tian. 2010. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33, 3 (2010), 207--220.
    [17]
    Peng Li, Xin Yang, Hua Qiao, Kai Cao, Eryun Liu, and Jie Tian. 2012. An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, no. 7 (2012).
    [18]
    Eryun Liu, Heng Zhao, and etc. 2011. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters 32, 5 (April 2011), 666--675.
    [19]
    Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI.
    [20]
    R Alvarez Marinoa, F Hernandez Alvarez, and L Hernandez Encinasb. 2012. A crypto-biometric scheme based on iris-templates with fuzzy extractors. Information Sciences 195 (2012), 91--102.
    [21]
    A. Nagar, K. Nandakumar, and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.
    [22]
    K. Nandakumar, A. K. Jain, and S. Pankanti. 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2, 4 (Dec 2007), 744--757.
    [23]
    NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com.
    [24]
    Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. An analysis of minutiae matching strength. In Audio- and Video-Based Biometric Person Authentication. LNCS, Vol. 2091. 223--228.
    [25]
    Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle. 2007. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis Machine Intelligence 29, 4 (2007), 561--572.
    [26]
    Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https://www.cs.bu.edu/reyzin/code/fuzzy.html.
    [27]
    M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.
    [28]
    Victor Shoup. 2015. NTL: A Library for doing Number Theory. Retrieved from http://www.shoup.net/ntl.
    [29]
    K. Simoens, P. Tuyls, and B. Preneel. 2009. Privacy weaknesses in biometric sketches. In 2009 30th IEEE Symposium on Security and Privacy. 188--203.
    [30]
    Andrew B. J. Teoh, Alwyn Goh, and David C. L. Ngo. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE TPAMI 28 (2006), 1892--1901.
    [31]
    B. Topcu, H. Erdogan, C. Karabat, and B. Yanikoglu. 2013. Biohashing with fingerprint spectral minutiae. In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12.
    [32]
    E. A. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric. 2010. Key extraction from general nondiscrete signals. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 269--279.
    [33]
    Song Wang and Jiankun Hu. 2012. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognition 45, 12 (Dec. 2012), 4129--4137.
    [34]
    Kai Xi, Tohari Ahmad, Fengling Han, and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security Comm. Networks (dec. 2010).
    [35]
    Kai Xi and Jiankun Hu. 2009. Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In IEEE Conference on Industrial Electronics and Applications.
    [36]
    Kai Xi, Jiankun Hu, and Fengling Han. 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm. In ICIEA.
    [37]
    Kai Xi, Jiankun Hu, and Fengling Han. 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system. In IEEE ICIEA.
    [38]
    Wencheng Yang, Jiankun Hu, Song Wang, and Milos Stojmenovic. 2014a. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognition 47, 3 (2014), 1309--1320.
    [39]
    Wencheng Yang, Jiankun Hu, and Song Wang. 2012. A delaunay triangle-based fuzzy extractor for fingerprint authentication. In IEEE TrustCom, 2012. 66--70.
    [40]
    Wencheng Yang, Jiankun Hu, and Song Wang. 2014b. A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Transactions on Information Forensics and Security 9, 7 (July 2014), 1179--1192.
    [41]
    Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR.

    Cited By

    View all
    • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
    • (2021)Secure Chaff-less Fuzzy Vault for Face Identification SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/344219817:3(1-22)Online publication date: 22-Jul-2021
    • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 15, Issue 4
    Special Issue on ESWEEK2015 and Regular Papers
    August 2016
    411 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/2982215
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 02 August 2016
    Accepted: 01 April 2016
    Revised: 01 March 2016
    Received: 01 July 2015
    Published in TECS Volume 15, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Fuzzy extractor
    2. biometric template protection
    3. fingerprint security
    4. key generation

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • ARC Linkage

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
    • (2021)Secure Chaff-less Fuzzy Vault for Face Identification SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/344219817:3(1-22)Online publication date: 22-Jul-2021
    • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
    • (2016)Embedded Device Forensics and SecurityACM Transactions on Embedded Computing Systems10.1145/301566216:2(1-5)Online publication date: 12-Dec-2016

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media