Unlinkable minutiae-based fuzzy vault for multiple fingerprints
The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irrever...
Gespeichert in:
Veröffentlicht in: | IET biometrics 2016-09, Vol.5 (3), p.170-180 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 180 |
---|---|
container_issue | 3 |
container_start_page | 170 |
container_title | IET biometrics |
container_volume | 5 |
creator | Tams, Benjamin |
description | The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism. |
doi_str_mv | 10.1049/iet-bmt.2014.0093 |
format | Article |
fullrecord | <record><control><sourceid>proquest_24P</sourceid><recordid>TN_cdi_proquest_miscellaneous_1819138494</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1819138494</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</originalsourceid><addsrcrecordid>eNqNkU1LAzEQhoMoWLQ_wNuCFz1szVeTjRexpdVCxUt7DtlsVlL3y82u0v56s64UEUVzmTk8T5iZF4AzBEcIUnFlTRPGeTPCENERhIIcgAGGlIdUUHa470l0DIbObaB_LKJjhAbgZl1ktnhWcWaC3BZtY5UJY-VMEqTtbrcNXlWbNUFa1kHuG1t5LrXFk6mr2haNOwVHqcqcGX7WE7Cez1bT-3D5eLeY3i5DTRlmIdY84gZzmEYacwoxM4RpTFGcRExrwXAyVlogRBGNNU4EEgkUMU-QtxXn5ARc9P9WdfnSGtfI3DptskwVpmydRBEZM4YJjP6BIoFI5G_j0fNv6KZs68IvIgkUGHN_OeYp1FO6Lp2rTSr97rmqtxJB2QUgfQDSByC7AGQXgHeue-fNZmb7tyAnDzM8mX9E4-XLXu6w_USL2cpTqy9OlaSeDX9gfx_sHSEqpnI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3092272046</pqid></control><display><type>article</type><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><source>Wiley Open Access</source><creator>Tams, Benjamin</creator><creatorcontrib>Tams, Benjamin</creatorcontrib><description>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</description><identifier>ISSN: 2047-4938</identifier><identifier>ISSN: 2047-4946</identifier><identifier>EISSN: 2047-4946</identifier><identifier>DOI: 10.1049/iet-bmt.2014.0093</identifier><language>eng</language><publisher>Stevenage: The Institution of Engineering and Technology</publisher><subject>Algorithms ; biometric information protection ; Biometrics ; C++ language ; Correlation ; correlation attack ; correlation attack‐based cross‐matching ; cryptographic primitive ; Cryptography ; fingerprint identification ; Fingerprints ; Fingers ; Fuzzy ; fuzzy set theory ; Guruswami‐Sudan algorithm‐based decoder ; irreversibility requirement ; MCYT‐fingerprint‐100 database ; offline attacks ; public C++ source code ; Security ; security issues ; security‐enhancing features ; slow‐down mechanism ; Source code ; source code (software) ; unlinkability requirement ; unlinkable minutiae‐based fuzzy vault scheme ; Vaults</subject><ispartof>IET biometrics, 2016-09, Vol.5 (3), p.170-180</ispartof><rights>The Institution of Engineering and Technology</rights><rights>2016 The Institution of Engineering and Technology</rights><rights>Copyright The Institution of Engineering & Technology 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</citedby><cites>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1049%2Fiet-bmt.2014.0093$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1049%2Fiet-bmt.2014.0093$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,777,781,1412,11543,27905,27906,45555,45556,46033,46457</link.rule.ids><linktorsrc>$$Uhttps://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-bmt.2014.0093$$EView_record_in_Wiley-Blackwell$$FView_record_in_$$GWiley-Blackwell</linktorsrc></links><search><creatorcontrib>Tams, Benjamin</creatorcontrib><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><title>IET biometrics</title><description>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</description><subject>Algorithms</subject><subject>biometric information protection</subject><subject>Biometrics</subject><subject>C++ language</subject><subject>Correlation</subject><subject>correlation attack</subject><subject>correlation attack‐based cross‐matching</subject><subject>cryptographic primitive</subject><subject>Cryptography</subject><subject>fingerprint identification</subject><subject>Fingerprints</subject><subject>Fingers</subject><subject>Fuzzy</subject><subject>fuzzy set theory</subject><subject>Guruswami‐Sudan algorithm‐based decoder</subject><subject>irreversibility requirement</subject><subject>MCYT‐fingerprint‐100 database</subject><subject>offline attacks</subject><subject>public C++ source code</subject><subject>Security</subject><subject>security issues</subject><subject>security‐enhancing features</subject><subject>slow‐down mechanism</subject><subject>Source code</subject><subject>source code (software)</subject><subject>unlinkability requirement</subject><subject>unlinkable minutiae‐based fuzzy vault scheme</subject><subject>Vaults</subject><issn>2047-4938</issn><issn>2047-4946</issn><issn>2047-4946</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNqNkU1LAzEQhoMoWLQ_wNuCFz1szVeTjRexpdVCxUt7DtlsVlL3y82u0v56s64UEUVzmTk8T5iZF4AzBEcIUnFlTRPGeTPCENERhIIcgAGGlIdUUHa470l0DIbObaB_LKJjhAbgZl1ktnhWcWaC3BZtY5UJY-VMEqTtbrcNXlWbNUFa1kHuG1t5LrXFk6mr2haNOwVHqcqcGX7WE7Cez1bT-3D5eLeY3i5DTRlmIdY84gZzmEYacwoxM4RpTFGcRExrwXAyVlogRBGNNU4EEgkUMU-QtxXn5ARc9P9WdfnSGtfI3DptskwVpmydRBEZM4YJjP6BIoFI5G_j0fNv6KZs68IvIgkUGHN_OeYp1FO6Lp2rTSr97rmqtxJB2QUgfQDSByC7AGQXgHeue-fNZmb7tyAnDzM8mX9E4-XLXu6w_USL2cpTqy9OlaSeDX9gfx_sHSEqpnI</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Tams, Benjamin</creator><general>The Institution of Engineering and Technology</general><general>John Wiley & Sons, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><scope>7QO</scope><scope>8FD</scope><scope>FR3</scope><scope>P64</scope><scope>7SC</scope><scope>7SP</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201609</creationdate><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><author>Tams, Benjamin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>biometric information protection</topic><topic>Biometrics</topic><topic>C++ language</topic><topic>Correlation</topic><topic>correlation attack</topic><topic>correlation attack‐based cross‐matching</topic><topic>cryptographic primitive</topic><topic>Cryptography</topic><topic>fingerprint identification</topic><topic>Fingerprints</topic><topic>Fingers</topic><topic>Fuzzy</topic><topic>fuzzy set theory</topic><topic>Guruswami‐Sudan algorithm‐based decoder</topic><topic>irreversibility requirement</topic><topic>MCYT‐fingerprint‐100 database</topic><topic>offline attacks</topic><topic>public C++ source code</topic><topic>Security</topic><topic>security issues</topic><topic>security‐enhancing features</topic><topic>slow‐down mechanism</topic><topic>Source code</topic><topic>source code (software)</topic><topic>unlinkability requirement</topic><topic>unlinkable minutiae‐based fuzzy vault scheme</topic><topic>Vaults</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tams, Benjamin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><collection>Biotechnology Research Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IET biometrics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tams, Benjamin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</atitle><jtitle>IET biometrics</jtitle><date>2016-09</date><risdate>2016</risdate><volume>5</volume><issue>3</issue><spage>170</spage><epage>180</epage><pages>170-180</pages><issn>2047-4938</issn><issn>2047-4946</issn><eissn>2047-4946</eissn><abstract>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</abstract><cop>Stevenage</cop><pub>The Institution of Engineering and Technology</pub><doi>10.1049/iet-bmt.2014.0093</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2047-4938 |
ispartof | IET biometrics, 2016-09, Vol.5 (3), p.170-180 |
issn | 2047-4938 2047-4946 2047-4946 |
language | eng |
recordid | cdi_proquest_miscellaneous_1819138494 |
source | Wiley Open Access |
subjects | Algorithms biometric information protection Biometrics C++ language Correlation correlation attack correlation attack‐based cross‐matching cryptographic primitive Cryptography fingerprint identification Fingerprints Fingers Fuzzy fuzzy set theory Guruswami‐Sudan algorithm‐based decoder irreversibility requirement MCYT‐fingerprint‐100 database offline attacks public C++ source code Security security issues security‐enhancing features slow‐down mechanism Source code source code (software) unlinkability requirement unlinkable minutiae‐based fuzzy vault scheme Vaults |
title | Unlinkable minutiae-based fuzzy vault for multiple fingerprints |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T16%3A21%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_24P&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Unlinkable%20minutiae-based%20fuzzy%20vault%20for%20multiple%20fingerprints&rft.jtitle=IET%20biometrics&rft.au=Tams,%20Benjamin&rft.date=2016-09&rft.volume=5&rft.issue=3&rft.spage=170&rft.epage=180&rft.pages=170-180&rft.issn=2047-4938&rft.eissn=2047-4946&rft_id=info:doi/10.1049/iet-bmt.2014.0093&rft_dat=%3Cproquest_24P%3E1819138494%3C/proquest_24P%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3092272046&rft_id=info:pmid/&rfr_iscdi=true |