Unlinkable minutiae-based fuzzy vault for multiple fingerprints

The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irrever...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IET biometrics 2016-09, Vol.5 (3), p.170-180
1. Verfasser: Tams, Benjamin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 180
container_issue 3
container_start_page 170
container_title IET biometrics
container_volume 5
creator Tams, Benjamin
description The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.
doi_str_mv 10.1049/iet-bmt.2014.0093
format Article
fullrecord <record><control><sourceid>proquest_24P</sourceid><recordid>TN_cdi_proquest_miscellaneous_1819138494</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1819138494</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</originalsourceid><addsrcrecordid>eNqNkU1LAzEQhoMoWLQ_wNuCFz1szVeTjRexpdVCxUt7DtlsVlL3y82u0v56s64UEUVzmTk8T5iZF4AzBEcIUnFlTRPGeTPCENERhIIcgAGGlIdUUHa470l0DIbObaB_LKJjhAbgZl1ktnhWcWaC3BZtY5UJY-VMEqTtbrcNXlWbNUFa1kHuG1t5LrXFk6mr2haNOwVHqcqcGX7WE7Cez1bT-3D5eLeY3i5DTRlmIdY84gZzmEYacwoxM4RpTFGcRExrwXAyVlogRBGNNU4EEgkUMU-QtxXn5ARc9P9WdfnSGtfI3DptskwVpmydRBEZM4YJjP6BIoFI5G_j0fNv6KZs68IvIgkUGHN_OeYp1FO6Lp2rTSr97rmqtxJB2QUgfQDSByC7AGQXgHeue-fNZmb7tyAnDzM8mX9E4-XLXu6w_USL2cpTqy9OlaSeDX9gfx_sHSEqpnI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3092272046</pqid></control><display><type>article</type><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><source>Wiley Open Access</source><creator>Tams, Benjamin</creator><creatorcontrib>Tams, Benjamin</creatorcontrib><description>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</description><identifier>ISSN: 2047-4938</identifier><identifier>ISSN: 2047-4946</identifier><identifier>EISSN: 2047-4946</identifier><identifier>DOI: 10.1049/iet-bmt.2014.0093</identifier><language>eng</language><publisher>Stevenage: The Institution of Engineering and Technology</publisher><subject>Algorithms ; biometric information protection ; Biometrics ; C++ language ; Correlation ; correlation attack ; correlation attack‐based cross‐matching ; cryptographic primitive ; Cryptography ; fingerprint identification ; Fingerprints ; Fingers ; Fuzzy ; fuzzy set theory ; Guruswami‐Sudan algorithm‐based decoder ; irreversibility requirement ; MCYT‐fingerprint‐100 database ; offline attacks ; public C++ source code ; Security ; security issues ; security‐enhancing features ; slow‐down mechanism ; Source code ; source code (software) ; unlinkability requirement ; unlinkable minutiae‐based fuzzy vault scheme ; Vaults</subject><ispartof>IET biometrics, 2016-09, Vol.5 (3), p.170-180</ispartof><rights>The Institution of Engineering and Technology</rights><rights>2016 The Institution of Engineering and Technology</rights><rights>Copyright The Institution of Engineering &amp; Technology 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</citedby><cites>FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1049%2Fiet-bmt.2014.0093$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1049%2Fiet-bmt.2014.0093$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,777,781,1412,11543,27905,27906,45555,45556,46033,46457</link.rule.ids><linktorsrc>$$Uhttps://onlinelibrary.wiley.com/doi/abs/10.1049%2Fiet-bmt.2014.0093$$EView_record_in_Wiley-Blackwell$$FView_record_in_$$GWiley-Blackwell</linktorsrc></links><search><creatorcontrib>Tams, Benjamin</creatorcontrib><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><title>IET biometrics</title><description>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</description><subject>Algorithms</subject><subject>biometric information protection</subject><subject>Biometrics</subject><subject>C++ language</subject><subject>Correlation</subject><subject>correlation attack</subject><subject>correlation attack‐based cross‐matching</subject><subject>cryptographic primitive</subject><subject>Cryptography</subject><subject>fingerprint identification</subject><subject>Fingerprints</subject><subject>Fingers</subject><subject>Fuzzy</subject><subject>fuzzy set theory</subject><subject>Guruswami‐Sudan algorithm‐based decoder</subject><subject>irreversibility requirement</subject><subject>MCYT‐fingerprint‐100 database</subject><subject>offline attacks</subject><subject>public C++ source code</subject><subject>Security</subject><subject>security issues</subject><subject>security‐enhancing features</subject><subject>slow‐down mechanism</subject><subject>Source code</subject><subject>source code (software)</subject><subject>unlinkability requirement</subject><subject>unlinkable minutiae‐based fuzzy vault scheme</subject><subject>Vaults</subject><issn>2047-4938</issn><issn>2047-4946</issn><issn>2047-4946</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNqNkU1LAzEQhoMoWLQ_wNuCFz1szVeTjRexpdVCxUt7DtlsVlL3y82u0v56s64UEUVzmTk8T5iZF4AzBEcIUnFlTRPGeTPCENERhIIcgAGGlIdUUHa470l0DIbObaB_LKJjhAbgZl1ktnhWcWaC3BZtY5UJY-VMEqTtbrcNXlWbNUFa1kHuG1t5LrXFk6mr2haNOwVHqcqcGX7WE7Cez1bT-3D5eLeY3i5DTRlmIdY84gZzmEYacwoxM4RpTFGcRExrwXAyVlogRBGNNU4EEgkUMU-QtxXn5ARc9P9WdfnSGtfI3DptskwVpmydRBEZM4YJjP6BIoFI5G_j0fNv6KZs68IvIgkUGHN_OeYp1FO6Lp2rTSr97rmqtxJB2QUgfQDSByC7AGQXgHeue-fNZmb7tyAnDzM8mX9E4-XLXu6w_USL2cpTqy9OlaSeDX9gfx_sHSEqpnI</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Tams, Benjamin</creator><general>The Institution of Engineering and Technology</general><general>John Wiley &amp; Sons, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><scope>7QO</scope><scope>8FD</scope><scope>FR3</scope><scope>P64</scope><scope>7SC</scope><scope>7SP</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201609</creationdate><title>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</title><author>Tams, Benjamin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4626-2c787e270f8c274026e36c241bd86cc962d5ac911414bc2d919d09b7d1626a773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>biometric information protection</topic><topic>Biometrics</topic><topic>C++ language</topic><topic>Correlation</topic><topic>correlation attack</topic><topic>correlation attack‐based cross‐matching</topic><topic>cryptographic primitive</topic><topic>Cryptography</topic><topic>fingerprint identification</topic><topic>Fingerprints</topic><topic>Fingers</topic><topic>Fuzzy</topic><topic>fuzzy set theory</topic><topic>Guruswami‐Sudan algorithm‐based decoder</topic><topic>irreversibility requirement</topic><topic>MCYT‐fingerprint‐100 database</topic><topic>offline attacks</topic><topic>public C++ source code</topic><topic>Security</topic><topic>security issues</topic><topic>security‐enhancing features</topic><topic>slow‐down mechanism</topic><topic>Source code</topic><topic>source code (software)</topic><topic>unlinkability requirement</topic><topic>unlinkable minutiae‐based fuzzy vault scheme</topic><topic>Vaults</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Tams, Benjamin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><collection>Biotechnology Research Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IET biometrics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Tams, Benjamin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Unlinkable minutiae-based fuzzy vault for multiple fingerprints</atitle><jtitle>IET biometrics</jtitle><date>2016-09</date><risdate>2016</risdate><volume>5</volume><issue>3</issue><spage>170</spage><epage>180</epage><pages>170-180</pages><issn>2047-4938</issn><issn>2047-4946</issn><eissn>2047-4946</eissn><abstract>The ‘fuzzy vault scheme’ is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack-based cross-matching thereby conflicting with the ‘unlinkability requirement’ and ‘irreversibility requirement’ of effective biometric information protection. Yet, it has been demonstrated that in principle a minutiae-based fuzzy vault can be secured against the correlation attack by passing the to-be-protected minutiae through a quantisation scheme. Unfortunately, single fingerprints seem not to be capable of providing an acceptable security level against offline attacks. To overcome the aforementioned security issues, this study shows how an implementation for multiple fingerprints can be derived on basis of the implementation for single finger thereby making use of a Guruswami–Sudan algorithm-based decoder for verification. The implementation, for which public C++ source code can be downloaded, is evaluated for single and various multi-finger settings using the MCYT-Fingerprint-100 database and provides security-enhancing features such as the possibility of combination with password and a slow-down mechanism.</abstract><cop>Stevenage</cop><pub>The Institution of Engineering and Technology</pub><doi>10.1049/iet-bmt.2014.0093</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2047-4938
ispartof IET biometrics, 2016-09, Vol.5 (3), p.170-180
issn 2047-4938
2047-4946
2047-4946
language eng
recordid cdi_proquest_miscellaneous_1819138494
source Wiley Open Access
subjects Algorithms
biometric information protection
Biometrics
C++ language
Correlation
correlation attack
correlation attack‐based cross‐matching
cryptographic primitive
Cryptography
fingerprint identification
Fingerprints
Fingers
Fuzzy
fuzzy set theory
Guruswami‐Sudan algorithm‐based decoder
irreversibility requirement
MCYT‐fingerprint‐100 database
offline attacks
public C++ source code
Security
security issues
security‐enhancing features
slow‐down mechanism
Source code
source code (software)
unlinkability requirement
unlinkable minutiae‐based fuzzy vault scheme
Vaults
title Unlinkable minutiae-based fuzzy vault for multiple fingerprints
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T16%3A21%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_24P&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Unlinkable%20minutiae-based%20fuzzy%20vault%20for%20multiple%20fingerprints&rft.jtitle=IET%20biometrics&rft.au=Tams,%20Benjamin&rft.date=2016-09&rft.volume=5&rft.issue=3&rft.spage=170&rft.epage=180&rft.pages=170-180&rft.issn=2047-4938&rft.eissn=2047-4946&rft_id=info:doi/10.1049/iet-bmt.2014.0093&rft_dat=%3Cproquest_24P%3E1819138494%3C/proquest_24P%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3092272046&rft_id=info:pmid/&rfr_iscdi=true