Improved fuzzy vault scheme for fingerprint verification

C. Örencik*, T. B. Pedersen, E. Savaş, M. Keskinoz

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

Fuzzy vault is a well-known technique to address the privacy concerns in biometric identification applications. We revisit the fuzzy vault scheme to address implementation, efficiency, and security issues encountered in its realization. We use the fingerprint data as a case study. We compare the performances of two different methods used in the implementation of fuzzy vault, namely brute force and Reed Solomon decoding. We show that the locations of fake (chaff) points in the vault leak information on the genuine points and propose a new chaff point placement technique that makes distinguishing genuine points impossible. We also propose a novel method for creation of chaff points that decreases the success rate of the brute force attack from 100% to less than 3.5%. While this paper lays out a complete guideline as to how the fuzzy vault is implemented in an efficient and secure way, it also points out that more research is needed to thwart the proposed attacks by presenting ideas for future research.

Original languageEnglish
Title of host publicationSECRYPT 2008 - International Conference on Security and Cryptography, Proceedings
Pages37-43
Number of pages7
Publication statusPublished - 2008
Externally publishedYes
EventInternational Conference on Security and Cryptography, SECRYPT 2008 - Porto, Portugal
Duration: 26 Jul 200829 Jul 2008

Publication series

NameSECRYPT 2008 - International Conference on Security and Cryptography, Proceedings

Conference

ConferenceInternational Conference on Security and Cryptography, SECRYPT 2008
Country/TerritoryPortugal
CityPorto
Period26/07/0829/07/08

Keywords

  • Biometrics
  • Fingerprint
  • Fuzzy vault
  • Privacy
  • Template protection

Fingerprint

Dive into the research topics of 'Improved fuzzy vault scheme for fingerprint verification'. Together they form a unique fingerprint.

Cite this