CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Impact of Singular Point Detection on Fingerprint Matching Performance
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Finding the original point set hidden among chaff
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Hiding secret points amidst chaff
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
EURASIP Journal on Advances in Signal Processing
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
Multi-algorithm fusion with template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A performance driven methodology for cancelable face templates generation
Pattern Recognition
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Raster image representation of fingerprint minutiae
Proceedings of the 2011 ACM Symposium on Applied Computing
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications. In order to correct inevitable noise during scanning and processing, a known approach extracts and publishes an additional information, known as secure sketch from the minutiae. During subsequent scanning, the sketch aids in correcting the noise to give the consistent bits. However, for minutiae (represented as 2D point set), known constructions produce sketches that are large, and are difficult to adapt to slight variations of the 2D point representation. Furthermore, even with simplified model on the noise and distribution of the minutiae, it is not clear what is the entropy of the bits extracted. To overcome the problems, we suggest using a locality preserving hash in sketch construction. We give a method that produces a small sketch and thus suitable for applications involving mobile devices. Since the sketch size is small, with a reasonable assumption, we can estimate the entropy of the secret bits extracted. In addition, we can incorporate statistical properties of the noise, and distribution of the minutiae in fine-tuning the method. Our method also includes registration of fingerprints. Experiments conducted on 4000 fingerprint images from the NIST 4 database show promising results. Assuming that an intermediate representation is uniformly distributed, with FNMR = 0.09% we are able to extract about 8 secret bits (by a conservative estimate) or 10 bits (with certain assumption on the underlying codebook).