Secret Distribution for Secure Fingerprint Verification

被引:2
|
作者
Choi, Hanna [1 ]
Lee, Sungju [1 ]
Moon, Daesung [2 ]
Chung, Yongwha [1 ]
Pan, Sungbum [3 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
[2] ETRI, Biometr Technol Res Team, Daejeon, South Korea
[3] Chosun Univ, Div Informat & Control Measurement Engn, Gwangju, South Korea
关键词
D O I
10.1109/ICHIT.2008.177
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a smart-card and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the smart-card and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the smart-card and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a smart-card and a server without significant degradation of the verification accuracy.
引用
收藏
页码:535 / 540
页数:6
相关论文
共 50 条
  • [41] Advanced Fingerprint Verification Software
    Baradarani, A.
    Taylor, J. R. B.
    Severin, F.
    Maev, R. Gr.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT APPLICATIONS XV, 2016, 9825
  • [42] Threshold changeable secret sharing with secure secret reconstruction
    Meng, Keju
    Miao, Fuyou
    Huang, Wenchao
    Xiong, Yan
    INFORMATION PROCESSING LETTERS, 2020, 157
  • [43] MULTICOLORING OF GRAPHS TO SECURE A SECRET
    Vojkovic, Tanja
    Vukicevic, Damir
    Zlatic, Vinko
    RAD HRVATSKE AKADEMIJE ZNANOSTI I UMJETNOSTI-MATEMATICKE ZNANOSTI, 2018, 22 (534): : 1 - 22
  • [44] Secure Secret Sharing in the Cloud
    Chang, Ching-Chun
    Li, Chang-Tsun
    2017 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2017, : 358 - 361
  • [45] Fingerprint multicast in secure video streaming
    Zhao, HV
    Liu, KJR
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (01) : 12 - 29
  • [46] Fingerprint recognition keeps PCs secure
    Himowitz, MJ
    FORTUNE, 1999, 139 (10) : 278 - 278
  • [47] Secure Track Verification
    Schaefer, Matthias
    Lenders, Vincent
    Schmitt, Jens
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 199 - 213
  • [48] Secure Path Verification
    Cabodi, G.
    Camurati, P.
    Finocchiaro, S. F.
    Loiacono, C.
    Savarese, F.
    Vendraminetto, D.
    2016 1ST IEEE INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2016, : 58 - 63
  • [49] Secure iris verification
    Yang, Shenglin
    Verbauwhede, Ingrid
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 133 - +
  • [50] Secure fingerprint matching with external registration
    Reisman, J
    Uludag, U
    Ross, A
    AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 720 - 729