PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE

Daniel Socek, Dubravko Ćulibrk, Vladimir Božović

Abstract

A novel scheme for securing biometric templates of variable size and order is proposed. The proposed scheme is based on new similarity measure approach, namely the set intersection, which strongly resembles the methodology used in most current state-of-the-art biometrics matching systems. The applicability of the new scheme is compared with that of the existing principal schemes, and it is shown that the new scheme has clear advantages over the existing approaches.

References

  1. Amengual, J., Juan, A., Pérez, J., Prat, F., Sáez, S., and Vilar, J. (1997). Real-time minutiae extraction in fingerprint images. In International Conference on Image Processing and Its Applications (IPA97), volume 2, pages 871-875.
  2. Araque, J., Baena, M., Chalela, B., Navarro, D., and Vizcaya, P. (2002). Synthesis of fingerprint images. In 16th International Conference on Pattern Recognition, volume 2, pages 422-425.
  3. Boyen, X. (2004). Reusable cryptographic fuzzy extractors. In ACM Conference on Computer and Communications Security (CCS 2004), pages 82-91. New-York: ACM Press.
  4. Cappelli, R., Maio, D., and D.Maltoni (2002). Synthetic fingerprint-database generation. In 16th International Conference on Pattern Recognition, volume 3, pages 744-747.
  5. Clancy, T. C., Kiyavash, N., and Lin, D. J. (2003). Secure smartcard-based fingerprint authentication. In ACM SIGMM Workshop on Biometrics Methods and Applications (WBMA 7803), pages 45-52. ACM Press.
  6. Dass, S. C., Zhu, Y., and Jain, A. K. (2005). Statistical models for assessing the individuality of fingerprints. In IEEE Workshop on Automatic Identification Advanced Technologies (AUTOID 7805), pages 3-9. IEEE Computer Society.
  7. Dodis, Y., Reyzin, L., and Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, Interlaken, Switzerland, pages 523-540.
  8. Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A. (April 28, 2006). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Retrieved April 4, 2007, from http://www.citebase.org/ abstract?id=oai:arXiv.org:cs/0602007
  9. Elbirt, A. J. (Summer 2005). Who are you? how to protect against identity theft. IEEE Technology and Society Magazine.
  10. Hao, F., Anderson, R., and Daugman, J. (2006). Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088.
  11. Juels, A. and Sudan, M. (2002). A fuzzy vault scheme. In IEEE International Symposium on Information Theory (ISIT 2002), Lausanne, Switzerland.
  12. Juels, A. and Sudan, M. (2006). A fuzzy vault scheme. Designs, Codes and Cryptography, 38(2):237-257.
  13. Juels, A. and Wattenberg, M. (1999). A fuzzy commitment scheme. In ACM Conference on Computer and Communications Security, pages 28-36.
  14. Maltoni, D., Maio, D., Jain, A. K., and Prabhakar, S. (2003). Handbook of Fingerprint Recognition. SpringerVerlag.
  15. Rivest, R. L. (April 24, 1998). Chaffing and winnowing: Confidentiality without encryption. Retrieved April 4, 2007, from http://theory.lcs.mit.edu/ ˜rivest/chaffing.txt
  16. Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A. (2004). Biometric cryptosystems: Issues and challenges. IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92(6):948- 960.
Download


Paper Citation


in Harvard Style

Socek D., Ćulibrk D. and Božović V. (2007). PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 25-32. DOI: 10.5220/0002123900250032


in Bibtex Style

@conference{secrypt07,
author={Daniel Socek and Dubravko Ćulibrk and Vladimir Božović},
title={PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={25-32},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002123900250032},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - PRACTICAL SECURE BIOMETRICS USING SET INTERSECTION AS A SIMILARITY MEASURE
SN - 978-989-8111-12-8
AU - Socek D.
AU - Ćulibrk D.
AU - Božović V.
PY - 2007
SP - 25
EP - 32
DO - 10.5220/0002123900250032