Fingerprint-based Fuzzy Vault: Implementation and Performance
#1

Abstract -
Since the introduction of new cryptographic construct named
fuzzy vault back in 2002, there has been several successful implementations and
evaluations of it. Implementation presented in this report builds upon strengths
and weaknesses of past solutions and adds an important improvement to the im-
plementation - automatic alignment of template and query ngerprint minutiae.
To facilitate this alignment, authors have used high curvature points, derived
from ngerprint orientation eld, as helper data. This data doesn't leak any
information about template minutiae, as high curvature points are global fea-
tures of a ngerprint. Authors have also evaluated the performance of proposed
fuzzy vault. They showed considerable improvements in comparison to other ap-
proaches. On the other hand, discussion about security of this implementation
of ngerprint fuzzy vault is questionable, since it is known fact today that fuzzy
vault is vulnerable to brute force attack.
1 Introduction
Traditional cryptography, which is nowadays widely used to provide secrecy and
authenticity of information, uses one or more keys to convert a plain text to a
cipher text [1]. In other words, encryption key transforms a plain text to, more
or less, sequence of random bits that can be transformed back to a plain text
only using appropriate decryption key. Algorithms using this scheme, such as
AES and RSA, have proven to be highly secure. Security rests upon the assump-
tion that the cryptographic keys are known only to legitimate users [2]. This is
the source of the main challenge of the traditional cryptography - maintaining
the secrecy of the keys. As algorithms mentioned above need long keys (e.g. 128
bits for AES), remembering the key is not an option. One of the solutions for
this problem is to impose password authentication to control the access to the
keys. In this case legitimate user doesn't have to remember the actual key, but
the password which he can use to access the key. On the other hand, password
introduce a new problem. If a password is too short it will be easily remembered,
but also easily broken. Long passwords are, on the other hand, hard to brake,
but also hard to remember and expensive to maintain [3]. Further, passwords
are easily lost, stolen or even guessed using aspects of social engineering [2]. All
2 Marko Pascan(299450)
this creates a space for an alternative, stronger authentication schemes. In bio-
metric authentication identity is established based on anatomical and behavioral
traits like face, ngerprint, speech, eye iris, hand, etc. This kind of authentica-
tion is more reliable then password-based authentication in the sense that traits
cannot be lost or forgotten [2]. Forging traits is possible, but dicult and un-
reliable. Fuzzy vault is combination of biometrics and traditional cryptography,
combining ideas and principles from both approaches. These hybrid systems
are called biometric cryptosystems. Fuzzy vaults operate in key-binding mode,
which means that the key and the template are monolithically bound withing
the framework and authentication and key release are done in a single step [2].
Organization The rest of this report is organized as follows. Next section gives
some background and de nitions that will be used in the rest of this report.
Section 3 gives an introduction to fuzzy vault in general and ngerprint-based
fuzzy vault as a specialization of general fuzzy vault. Section 4 gives an overview
on implementation proposed in [2]. Next section introduces helper data used
in [2] and ngerprint alignment that uses this helper data. Brief overview of
experimental results is given in Section 6. Vulnerability of fuzzy vault is brie
y discussed in section 7. Concluding remarks are given in the last section.
2 Background and De nitions
This section gives a brief overview on several topics of importance for fuzzy
vaults, both from aspects of biometry and cryptography (mathematics).
Fingerprint Fingerprints are believed to be unique and immutable for each
individual. In other words it is highly unlikely that two di erent individuals will
have the same ngerprints. This lead to a wide usage of ngerprints for identi-
fying individuals. Fingerprints are taken from people on various occasions, most
commonly when issuing personal identity card, passport or a visa.
Fingerprints are made of series of ridges and furrows on the surface of the nger.
Uniqueness can be determined by the pattern of ridges and furrows, as well as
the minutiae points [4]. Minutiae points represent local ridge characteristics that
occur at either a ridge bifurcation or a ridge ending. Figure 1 shows ngerprint
with minutiae points marked with white squares. Tails on these squares represent
the orientation of minutiae points. Figure 2 shows matching between two nger-
prints and their intra-class variability which occurs because two ngerprints are
not aligned.
Mathematical Background In implementation of fuzzy vault few mathemat-
ical concepts are extensively used. These concepts are brie
y introduced here.
Firstly, all arithmetics are done in a nite eld. As its name suggests, nite eld
is a mathematical eld that consist of nite number of elements.

Download full report
http://cosec.bit.uni-bonn.de/fileadmin/u...report.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is alison brie dating, fuzzy vault algorithm ppt, vault top 10 place to, design and i fingerprint and rfid based multi usage card system design and implementation, fuzzy vault for fingerprints ppt, vault and pursual engine, fuzzy vault for fingerprints matlab code,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,078 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention 1 793 15-02-2017, 03:24 PM
Last Post: jaseela123d
  Analyzing the performance of turbo Code mechanical wiki 1 1,236 24-08-2016, 11:38 AM
Last Post: seminar report asees
  ATM access control using fingerprint scanning smart paper boy 8 5,736 01-07-2016, 11:42 AM
Last Post: jaseela123d
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,589 10-01-2015, 11:13 PM
Last Post: Guest
  Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-B Projects9 3 3,043 15-04-2013, 11:14 AM
Last Post: computer topic
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,835 04-02-2013, 04:49 PM
Last Post: seminar details
  Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation seminar class 2 3,334 02-02-2013, 02:08 PM
Last Post: seminar details
Wink Implementation of a simple device mediation application of a Network Management Syste computer science crazy 2 2,187 06-12-2012, 01:57 PM
Last Post: seminar details
  Fuzzy Impulse Noise Detection and Reduction project topics 1 1,857 05-12-2012, 03:58 PM
Last Post: seminar details

Forum Jump: