Secure fuzzy fingerprint vault against correlation attack
نویسندگان
چکیده
منابع مشابه
Realization of correlation attack against the fuzzy vault scheme
User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem. The scheme is based on binding the biometric template with a secret key and scrambling it w...
متن کاملFuzzy Fingerprint Vault
Biometrics-based authentication has the potential to eliminate illegal key exchange problem associated with traditional cryptosystems. In this paper, we explore the utilization of a fingerprint minutiae line based representation scheme in a new cryptographic construct called fuzzy vault. Minutiae variability is quantified for a fingerprint database marked by a human expert.
متن کاملFingerprint Fuzzy Vault: A Review
--This paper is a brief review of fuzzy vault which is a biometric template security technique. The advent of technology over the last decade has established biometric identification as an electronic equivalent to physical verification. Biometric traits offer a reliable solution to the problem of user authentication in identity management systems. Biometric based authentication has more advanta...
متن کاملSecurity Capacity of the Fuzzy Fingerprint Vault
We investigate the security of a privacy enhancing technique for fingerprint authentication known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and Sudan, a scheme that allows error tolerant authentication, while preserving the privacy of the reference data. We explore if and under what circumstances a secure fuzzy fingerprint vault can be implemented. We deriv...
متن کاملImproved Fuzzy Vault Scheme for Fingerprint Verification
Fuzzy vault is a well-known technique to address the privacy concerns in biometric identification applications. We revisit the fuzzy vault scheme to address implementation, efficiency, and security issues encountered in its realization. We use the fingerprint data as a case study. We compare the performances of two different methods used in the implementation of fuzzy vault, namely brute force ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Electronics Express
سال: 2009
ISSN: 1349-2543
DOI: 10.1587/elex.6.1368