stays almost stable with 0.0035%. In fact, more than
20% of impostor comparisons already lead to a suc-
cessful decoding with five min-sum iterations, but the
codeword found was not the right one (it is the hash
comparison h(c) = h(c
′
) that lead to a reject). Increas-
ing the amount of iterations seems to have a poor im-
pact on the true decoding capacity. We thus expect
the possible gain for an attacker to test more min-sum
iterations to be small.
5 CONCLUSION
In this paper, we apply a fuzzy commitment scheme
with finger vein biometrics. An adaptation of vein
encoding is proposed making vein template privacy
protection techniques efficient and more secured. The
idea is to get a binary template with an equal number
of black and white pixels. This reduces efficiently the
risk of successful attacks. Moreover,it is very general
and can be applied to any continuous vein extraction
function. We also manage to pass over the alignment
problem by performing this step outside of the pro-
tection scheme. Doing so, we limit information leaks
by analyzing their potential and adapting the coding
area. We show how to increase accuracy and code di-
mension using two reference templates. Although the
fuzzy commitment scheme is inherently sensitive to
false acceptance attacks as any template-level protec-
tion technique, our biometric performances are pretty
competitivewith FAR close to 10
−5
and thus ensuring
a first layer of security through a template protection
scheme. Finally, but not least, the comparison times
we obtain are compatible with realistic use cases.
ACKNOWLEDGEMENTS
This work has been partially funded by the European
FP7 BEAT project (SEC-284989).
Authors would like to thank Raymond Veldhuis
for making the UTFVP database available for their
research work.
REFERENCES
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and
Z´emor, G. (2007). Optimal iris fuzzy sketches. In
Biometrics: Theory, Applications, and Systems, 2007.
BTAS 2007. First IEEE International Conference on,
pages 1–6. IEEE.
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and
Z´emor, G. (2008). Theoretical and practical bound-
aries of binary secure sketches. Information Forensics
and Security, IEEE Transactions on, 3(4):673–683.
Frangi, A. F., Niessen, W. J., Vincken, K. L., and Viergever,
M. A. (1998). Multiscale vessel enhancement filter-
ing. In Medical Image Computing and Computer-
Assisted Interventation-MICCAI’98, pages 130–137.
Springer.
Fuksis, R., Kadikis, A., and Greitans, M. (2011). Biohash-
ing and fusion of palmprint and palm vein biometric
data. In Hand-Based Biometrics (ICHB), 2011 Inter-
national Conference on, pages 1–6. IEEE.
Hartung, D., Aastrup Olsen, M., Xu, H., Thanh Nguyen,
H., and Busch, C. (2012). Comprehensive analysis of
spectral minutiae for vein pattern recognition. Biomet-
rics, IET, 1(1):25–36.
Hartung, D. and Busch, C. (2009). Why vein recogni-
tion needs privacy protection. In Intelligent Informa-
tion Hiding and Multimedia Signal Processing, 2009.
IIH-MSP’09. Fifth International Conference on, pages
1090–1095. IEEE.
Hartung, D., Olsen, M. A., Xu, H., and Busch, C. (2011).
Spectral minutiae for vein pattern recognition. In Bio-
metrics (IJCB), 2011 International Joint Conference
on, pages 1–7. IEEE.
Hirata, S. and Takahashi, K. (2009). Cancelable biometrics
with perfect secrecy for correlation-based matching.
In Advances in Biometrics, pages 868–878. Springer.
Ignatenko, T. and Willems, F. M. (2010). Information
leakage in fuzzy commitment schemes. Informa-
tion Forensics and Security, IEEE Transactions on,
5(2):337–348.
ISO (2011). Standard iso/iec 24745:2011. information tech-
nology – security techniques – biometric information
protection.
Juels, A. and Sudan, M. (2006). A fuzzy vault scheme. Des.
Codes Cryptography, 38(2):237–257.
Juels, A. and Wattenberg, M. (1999). A fuzzy commitment
scheme. In Motiwalla, J. and Tsudik, G., editors, ACM
Conference on Computer and Communications Secu-
rity, pages 28–36. ACM.
Kelkboom, E. J., Breebaart, J., Kevenaar, T. A., Buhan, I.,
and Veldhuis, R. N. (2011). Preventing the decod-
ability attack based cross-matching in a fuzzy com-
mitment scheme. Information Forensics and Security,
IEEE Transactions on, 6(1):107–121.
Korte, U. and Plaga, R. (2007). Cryptographic protection
of biometric templates: Chance, challenges and appli-
cations. In Br¨omme, A., Busch, C., and H¨uhnlein, D.,
editors, BIOSIG, volume 108 of LNI, pages 33–46. GI.
Kumar, A. and Zhou, Y. (2012). Human identification using
finger images. Image Processing, IEEE Transactions
on, 21(4):2228–2244.
Ladoux, P.-O., Rosenberger, C., and Dorizzi, B. (2009).
Palm vein verification system based on sift match-
ing. In Advances in Biometrics, pages 1290–1298.
Springer.
Lee, H. C., Kang, B. J., Lee, E. C., and Park, K. R. (2010).
Finger vein recognition using weighted local binary
pattern code based on a support vector machine. Jour-
ICISSP2015-1stInternationalConferenceonInformationSystemsSecurityandPrivacy
310