Paper
31 May 2013 Security analysis for fingerprint fuzzy vaults
Jesse Hartloff, Maxwell Bileschi, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju
Author Affiliations +
Abstract
In this work we place some of the traditional biometrics work on fingerprint verification via the fuzzy vault scheme within a cryptographic framework. We show that the breaking of a fuzzy vault leads to decoding of Reed-Solomon codes from random errors, which has been proposed as a hard problem in the cryptography community. We provide a security parameter for the fuzzy vault in terms of the decoding problem, which gives context for the breaking of the fuzzy vault, whereas most of the existing literature measures the strength of the fuzzy vault in terms of its resistance to pre-defined attacks or by the entropy of the vault. We keep track of our security parameter, and provide it alongside ROC statistics. We also aim to be more aware of the nature of the fingerprints when placing them in the fuzzy vault, noting that the distribution of minutiae is far from uniformly random. The results we show provide additional support that the fuzzy vault can be a viable scheme for secure fingerprint verification.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jesse Hartloff, Maxwell Bileschi, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, and Venu Govindaraju "Security analysis for fingerprint fuzzy vaults", Proc. SPIE 8712, Biometric and Surveillance Technology for Human and Activity Identification X, 871204 (31 May 2013); https://doi.org/10.1117/12.2016635
Lens.org Logo
CITATIONS
Cited by 10 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Fuzzy logic

Computer security

Information security

Biometrics

Quantization

Databases

MATLAB

RELATED CONTENT

Multi-biometric templates using fingerprint and voice
Proceedings of SPIE (March 17 2008)
Cryptographic key generation using handwritten signature
Proceedings of SPIE (April 17 2006)
Robust minutiae hash for fingerprint template protection
Proceedings of SPIE (January 27 2010)
How to protect biometric templates
Proceedings of SPIE (February 27 2007)
A hybrid approach for face template protection
Proceedings of SPIE (March 17 2008)

Back to Top