A key binding system based on n-nearest minutiae structure of fingerprint

  • Authors:
  • Eryun Liu;Heng Zhao;Jimin Liang;Liaojun Pang;Min Xie;Hongtao Chen;Yanhua Li;Peng Li;Jie Tian

  • Affiliations:
  • Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China and School of Electronic Engineering, Xidian University, Xian, Shaanxi 710071, ...;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China;Ministry of Education Key Lab. of Computer Network and Information Security, School of Telecommunication Engineering, Xidian University, Xian, Shaanxi 710071, China;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China and School of Electronic Engineering, Xidian University, Xian, Shaanxi 710071, ...;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China and School of Electronic Engineering, Xidian University, Xian, Shaanxi 710071, ...;Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China;Life Sciences Research Center, School of Life Sciences and Technology, Xidian University, Xian, Shaanxi 710071, China and Institute of Automation, Chinese Academy of Sciences, Beijing 100190, Chin ...

  • Venue:
  • Pattern Recognition Letters
  • Year:
  • 2011

Quantified Score

Hi-index 0.10

Visualization

Abstract

Biometric cryptosystem has gained increasing attention in recent years. One of the difficulties in this field is how to perform biometric matching under template protection. In this paper, we propose a key binding system based on n-nearest minutiae structures of fingerprint. Unlike the traditional fingerprint recognition method, the matching of nearest structures are totally performed in the encrypted domain, where the template minutiae are protected. Three levels of secure sketch are applied to deal with error correction and key binding: (1) The wrap-around construction is used to tolerate random errors that happens on paired minutiae; (2) the PinSketch construction is used to recover nearest structures which are disturbed by burst errors; and (3) Shamir's secret sharing scheme is used to bind and recover a key based on template minutia structures. The experimental results on FVC2002 DB1 and DB2 and security analysis show that our system is efficient and secure.