Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

FE-SViT: A SViT-Based Fuzzy Extractor Framework

Published: 02 August 2016 Publication History

Abstract

As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.

References

[1]
Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https://www.open-mpi.org/.
[2]
Tohari Ahmad, Jiankun Hu, and Song Wang. 2011. Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recognition 44, 10-11 (October 2011), 2555--2564.
[3]
Arathi Arakala, Jason Jeffers, and K. Horadam. 2007. Fuzzy extractors for minutiae-based fingerprint authentication. In Advances in Biometrics. LNCS, Vol. 4642. 760--769.
[4]
Bir Bhanu and Xuejun Tan. 2003. Fingerprint indexing based on novel features of minutiae triplets. IEEE TPAMI 25 (2003), 616--622.
[5]
Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol, ePrint Archive.
[6]
Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http://www.cheatsheet.com/technology/how-much-can-you-trust-your-phones-fingerprint-unlock.html.
[7]
V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).
[8]
Ileana Buhan, Jeroen Doumen, Pieter Hartel, and Raymond Veldhuis. 2007. Constructing practical fuzzy extractors usingQIM. In University of Twente, CTIT technical report, 07-52.
[9]
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38, 1 (March 2008), 97--139.
[10]
Wojtek James Goscinski, Paul McIntosh, Ulrich Felzmann, Anton Maksimenko, Christopher J. Hall, Timur Gureyev, Darren Thompson, Andrew Janke, Graham Galloway, Neil E. B. Killeen, Parnesh Raniga, Owen Kaluza, Amanda Ng, Govinda Poudel, David G. Barnes, Toan Nguyen, Paul Bonnington, and Gary F. Egan. 2014. The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014).
[11]
A. K. Jain and David Maltoni. 2003. Handbook of Fingerprint Recognition. Springer, New York.
[12]
Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar. 2008. Biometric template security. In Eurasip Journal on Advances in Signal Processing.
[13]
J. Jeffers and A. Arakala. 2006. Minutiae-based structures for a fuzzy vault. In Biometric Consortium Conference. 1--6.
[14]
Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR.
[15]
A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In IEEE International Information Theory Symposium.
[16]
Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang, and Jie Tian. 2010. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications 33, 3 (2010), 207--220.
[17]
Peng Li, Xin Yang, Hua Qiao, Kai Cao, Eryun Liu, and Jie Tian. 2012. An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Systems with Applications 39, no. 7 (2012).
[18]
Eryun Liu, Heng Zhao, and etc. 2011. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters 32, 5 (April 2011), 666--675.
[19]
Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI.
[20]
R Alvarez Marinoa, F Hernandez Alvarez, and L Hernandez Encinasb. 2012. A crypto-biometric scheme based on iris-templates with fuzzy extractors. Information Sciences 195 (2012), 91--102.
[21]
A. Nagar, K. Nandakumar, and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.
[22]
K. Nandakumar, A. K. Jain, and S. Pankanti. 2007. Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2, 4 (Dec 2007), 744--757.
[23]
NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com.
[24]
Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. 2001. An analysis of minutiae matching strength. In Audio- and Video-Based Biometric Person Authentication. LNCS, Vol. 2091. 223--228.
[25]
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle. 2007. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis Machine Intelligence 29, 4 (2007), 561--572.
[26]
Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https://www.cs.bu.edu/reyzin/code/fuzzy.html.
[27]
M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.
[28]
Victor Shoup. 2015. NTL: A Library for doing Number Theory. Retrieved from http://www.shoup.net/ntl.
[29]
K. Simoens, P. Tuyls, and B. Preneel. 2009. Privacy weaknesses in biometric sketches. In 2009 30th IEEE Symposium on Security and Privacy. 188--203.
[30]
Andrew B. J. Teoh, Alwyn Goh, and David C. L. Ngo. 2006. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE TPAMI 28 (2006), 1892--1901.
[31]
B. Topcu, H. Erdogan, C. Karabat, and B. Yanikoglu. 2013. Biohashing with fingerprint spectral minutiae. In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12.
[32]
E. A. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric. 2010. Key extraction from general nondiscrete signals. IEEE Transactions on Information Forensics and Security 5, 2 (June 2010), 269--279.
[33]
Song Wang and Jiankun Hu. 2012. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach. Pattern Recognition 45, 12 (Dec. 2012), 4129--4137.
[34]
Kai Xi, Tohari Ahmad, Fengling Han, and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Security Comm. Networks (dec. 2010).
[35]
Kai Xi and Jiankun Hu. 2009. Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In IEEE Conference on Industrial Electronics and Applications.
[36]
Kai Xi, Jiankun Hu, and Fengling Han. 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm. In ICIEA.
[37]
Kai Xi, Jiankun Hu, and Fengling Han. 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system. In IEEE ICIEA.
[38]
Wencheng Yang, Jiankun Hu, Song Wang, and Milos Stojmenovic. 2014a. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recognition 47, 3 (2014), 1309--1320.
[39]
Wencheng Yang, Jiankun Hu, and Song Wang. 2012. A delaunay triangle-based fuzzy extractor for fingerprint authentication. In IEEE TrustCom, 2012. 66--70.
[40]
Wencheng Yang, Jiankun Hu, and Song Wang. 2014b. A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Transactions on Information Forensics and Security 9, 7 (July 2014), 1179--1192.
[41]
Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR.

Cited By

View all
  • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
  • (2021)Secure Chaff-less Fuzzy Vault for Face Identification SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/344219817:3(1-22)Online publication date: 22-Jul-2021
  • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Embedded Computing Systems
ACM Transactions on Embedded Computing Systems  Volume 15, Issue 4
Special Issue on ESWEEK2015 and Regular Papers
August 2016
411 pages
ISSN:1539-9087
EISSN:1558-3465
DOI:10.1145/2982215
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 02 August 2016
Accepted: 01 April 2016
Revised: 01 March 2016
Received: 01 July 2015
Published in TECS Volume 15, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fuzzy extractor
  2. biometric template protection
  3. fingerprint security
  4. key generation

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • ARC Linkage

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)New Advancements in Cybersecurity: A Comprehensive SurveyBig Data Analytics and Computational Intelligence for Cybersecurity10.1007/978-3-031-05752-6_1(3-17)Online publication date: 2-Sep-2022
  • (2021)Secure Chaff-less Fuzzy Vault for Face Identification SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/344219817:3(1-22)Online publication date: 22-Jul-2021
  • (2020)Computational Intelligence for Information Security: A SurveyIEEE Transactions on Emerging Topics in Computational Intelligence10.1109/TETCI.2019.29234264:5(616-629)Online publication date: Oct-2020
  • (2016)Embedded Device Forensics and SecurityACM Transactions on Embedded Computing Systems10.1145/301566216:2(1-5)Online publication date: 12-Dec-2016

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media