Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20]


Journal of Information Science and Engineering, Vol. 25 No. 4, pp. 1177-1190 (July 2009)

Inserting Chaff Minutiae for the Geometric Hashing-based Fuzzy Fingerprint Vault*

Department of Computer and Information Science
Korea University
Chungnam 339-700, Korea
+Biometrics Technology Research Team Electronics and Telecommunications Research Institute Daejeon 305-700, Korea

Recently, a cryptographic construct, called fuzzy vault, has been proposed for cryptobiometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint have been proposed. One of the solutions exploits the idea of the geometric hashing to solve the auto-alignment problem. In this paper, we analyze the feature distribution of the generated hash table as a stored fingerprint template and improve the security of the geometric hashingbased fuzzy vault by uniformly distributing the features in the stored fingerprint template. That is, after analyzing the geometric transform from the real and chaff minutiae in the fingerprint image to the generated hash table, we modify the way to add the chaff minutiae. The goals of this addition make the feature distribution of the hash table for the chaff minutiae similar to that of the real minutiae as well as the feature distribution of the fingerprint image for both types of minutiae uniform. Based on the experimental results, we confirm that the proposed approach can perform the fingerprint verification more securely without a significant degradation of the verification accuracy.

Keywords: crypto-biometric, fingerprint verification, fuzzy vault, geometric hashing, information security

Full Text () Retrieve PDF document (200907_14.pdf)

Received May 10, 2007; revised September 9, 2008; accepted January 8, 2009.
Communicated by Chung-Sheng Li.
* A preliminary version of this paper has been presented at KES 2007. This research was supported by the Ministry of Knowledge Economy, Korea, under the HNRC (Home Network Research Center) V ITRC (Information Technology Research Center) support program supervised by the Institute of Information Technology Assessment.
+ Corresponding author.