2009
DOI: 10.1587/elex.6.1368
|View full text |Cite
|
Sign up to set email alerts
|

Secure fuzzy fingerprint vault against correlation attack

Abstract: Abstract:The fuzzy vault scheme has emerged as a promising solution to the user privacy and the fingerprint template security problems. Recently, however, this scheme is shown to be susceptible to a correlation attack that finds the real minutiae using multiple vaults enrolled for different applications. To protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to add chaffs in a more structured way such that distinguishing the fingerprint minutiae and the chaff points obtained… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Most fingerprint fuzzy vault implementations adopt this representation of minutiae as stand-alone points, but they differ according to what attributes they use. Examples of implementations that employ: (i) only (x, y) coordinates of each minutia in Cartesian or polar format, include: [3,4,15,16,25,27,29,30]; (ii) {(x, y), θ} of each minutia, include: [5,13,[20][21][22]; (iii) {(x, y), θ, t} of each minutia, include: [2,11,12,17,18,23,26].…”
Section: Fingerprint Features Usedmentioning
confidence: 99%
See 3 more Smart Citations
“…Most fingerprint fuzzy vault implementations adopt this representation of minutiae as stand-alone points, but they differ according to what attributes they use. Examples of implementations that employ: (i) only (x, y) coordinates of each minutia in Cartesian or polar format, include: [3,4,15,16,25,27,29,30]; (ii) {(x, y), θ} of each minutia, include: [5,13,[20][21][22]; (iii) {(x, y), θ, t} of each minutia, include: [2,11,12,17,18,23,26].…”
Section: Fingerprint Features Usedmentioning
confidence: 99%
“…This approach was adopted by [5,20,22], and [2,17,18,26] incorporated the type attribute as well; however, most of these implementations still employed around 200 chaff points. Two similar and interesting propositions to enable the addition of a larger number of chaff points were outlined in [12] and [11]. In [12], the authors use {x, y, z, θ, t} for each minutia point and thus each chaff point, where z = θ/α (α was set to 18).…”
Section: Generating Chaff Points Cmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, the polynomial can be reconstructed only when the information stored in both the smartcard and the server is available. In order to enhance the security level of the fuzzy fingerprint vault against the correlation attack, we apply the structured chaff insertion approach [18] additionally. That is, by inserting chaff points into a fingerprint template structurally in order to make multiple systems look similar, an attacker cannot get any hint even from two vaults.…”
Section: Proposed Approachmentioning
confidence: 99%