The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics

In recent years the security breaches and fraud transactions are increasing day by day. So there is a necessity for highly secure authentication technologies. The security of an authentication system can be strengthened by using Biometric system rather than the traditional method of authentication like Identity Cards (ID) and password which can be stolen easily. A biometric system works on biometric traits and fingerprint has the maximum share in market for providing biometric authentication as it is reliable, consistent and easy to capture. Although the biometric system is used to provide security to many applications but it is susceptible to different types of assaults too. Among all the modules of the biometric system which needs security, biometric template protection has received great consideration in the past years from the research community due to sensitivity of the biometric data stored in the form of template. A number of methods have been devised for providing template protection. Fuzzy vault is one of the cryptosystem based method of template security. The aim of fuzzy vault technique is to protect the precarious data with the biometric template in a way that only certified user can access the secret by providing valid biometric. In this paper, a modified version of fuzzy vault is presented to increase the level of security to the template and the secret key. The polynomial whose coefficients represent the key is transformed using an integral operator to hide the key where the key can no longer be derived if the polynomial is known to the attacker. The proposed fuzzy vault scheme also prevents the system from stolen key inversion attack. The results are achieved in terms of False Accept Rate (FAR), False Reject Rate (FRR), Genuine Acceptance Rate (GAR) by varying the degree of polynomial and number of biometric samples. It was calculated that for 40 users GAR was found to be 92%, 90%, 85% for degree of polynomial to be 3, 4 and 5 respectively. It was observed that increasing the degree of polynomial decreased the FAR rate, thus increasing the security.


[1] Amirthalingam G. and Radhamani G., “New Chaff Point Based Fuzzy Vault for Multimodal Biometric Cryptosystem using Particle Swarm Optimization,” Journal of King Saud University- Computer and Information Sciences, vol. 28, no. 4, pp. 381-394, 2016.

[2] Barman S., Das A., Chattopadhyay S., Samanta D., Rodrigues J., and Park Y., “Provably Secure Multi-Server Authentication Protocol using Fuzzy Commitment,” IEEE Access, vol. 6, pp. 38578-38594, 2018.

[3] Bansal D., Sofat S., and Kaur M., “Fingerprint Fuzzy Vault Using Hadamard Transformation,” in Proceedings of International Conference on Advances in Computing, Communications and Polynomial Based Fuzzy Vault Technique for Template Security in Fingerprint Biometrics 933 Informatics, Kochi, pp. 1830-1834, 2015.

[4] Bhatnagar G., Wu Q., and Raman B., “Biometric Template Security Based on Watermarking,” Procedia Computer Science, vol. 2, pp. 227-235, 2010.

[5] Brindha V., “Finger Knuckle Print As Unimodal Fuzzy Vault Implementation,” Procedia Computer Science, vol. 47, pp. 205-213, 2015.

[6] Cappelli R., Lumini A., Maio D., and Maltoni D., “Evaluating Minutiae Template Vulnerability,” in Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies, Alghero, pp. 174-179, 2007.

[7] Chin Y., Ong T., Teoh A., and Goh K., “Integrated Biometrics Template Protection Technique Based on Fingerprint and Palmprint Feature-Level Fusion,” Information Fusion, vol. 18, no. 1, pp. 161-174, 2014.

[8] Dang T., Nguyen M., and Truong Q., “Chaff Point Generation Mechanism for Improving Fuzzy Vault Security,” The Institution of Engineering and Technology Biometrics, vol. 5, pp. 147-153, 2015.

[9] Dang T., Huynh V., and Truong H., “A Hybrid Template Protection Approach using Secure Sketch and ANN for Strong Biometric Key Generation with Revocability Guarantee,” The International Arab Journal of Information Technology, vol. 15, no. 2, pp. 331-340, 2018.

[10] Feng Y., Lim M., and Yuen P., “Masquerade Attack on Transform-Based Binary-Template Protection Based on Perceptron Learning,” Pattern Recognition, vol. 47, no. 9, pp. 3019- 3033, 2014.

[11] Gomez-barrero M., Galbally J., Morales A., and Fierrez J., “Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection,” IEEE Access, vol. 5, pp. 8606-8619, 2017.

[12] Jain A., Ross A., and Uludag U., “Biometric Template Security : Challenges and Solutions,” Secure Watermarking Multimedia, vol. 4675, no. 4, pp. 629-640, 2002.

[13] Jain A., Ross A., and Nandakumar K., Introduction to Biometrics, Springer Lik, 2011.

[14] Jain A., Nandakumar K., and Nagar A., “Biometric Template Security,” EURASIP Journal on Advances in Signal Processing, pp. 1- 17, 2008.

[15] Jin Z., Teoh A., Ong T., and Tee C., “Fingerprint Template Protection with Minutiae-Based BitString for Security and Privacy Preserving,” Expert Systems with Applications, vol. 39, no. 6, pp. 6157-6167, 2012.

[16] Juels A. and Sudan M., “A Fuzzy Vault Scheme,” in Proceedings of IEEE International Symposium on Information Theory, Lausanne, pp. 408, 2002.

[17] Kaur M. and Sofat S., “Fuzzy Vault Template Protection For Multimodal Biometricsystem,” in Proceedings of International Conference on Computing, Communication and Automation, Greater Noida, pp. 1131-1135, 2017.

[18] Kaur M. and Sofat S., “Secure Fingerprint Fuzzy Vault using Hadamard Transformation to Defy Correlation Attack,” in Proceedings of 6th International Symposiumon Embedded Computing and System Design, Patna, pp. 122- 126, 2016.

[19] Lafkih M., Lacharme P., Rosenberger C., Mikram M., Ghouzali S., and Haziti M., “Vulnerabilities of Fuzzy Vault Schemes Using Biometric Data with Traces,” in Proceedings of IEEE International Wireless Communications and Mobile Computing Conference, Dubrovnik, pp. 822-827, 2015.

[20] Leng L. and Teoh A., “Alignment-Free Row-Co- Occurrence Cancelable Palmprint Fuzzy Vault,” Pattern Recognition, vol. 48, no. 7, pp. 2290- 2303, 2015.

[21] Li P., Yang X., Cao K., Tao X., Wang R., and Tian J., “An Alignment-Free Fingerprint Cryptosystem Based on Fuzzy Vault Scheme,” Journal of Network and Computer Applications, vol. 33, no. 3, pp. 207-220, 2010.

[22] Liu E., Zhao H., Liang J., Pang J., Xie M., Chen H., Li Y., Li P., and Tian J., “A Key Binding System Based on N-Nearest Minutiae Structure of Fingerprint,” Pattern Recognition Letters, vol. 32, no. 5, pp. 666-675, 2011.

[23] Mihailescu M., “New Enrollment Scheme for Biometric Template Using Hash Chaos-Based Cryptography,” Procedia Engineering, vol. 69, pp. 1459-1468, 2014.

[24] Moujahdi C., Bebis G., Ghouzali S., and Rziza M., “Fingerprint Shell: Secure Representation of Fingerprint Template,” Pattern Recognition Letters, vol. 45, no. 1, pp. 189-196, 2014.

[25] Moon K., Moon D., Yoo J., and Cho H., “Biometrics Information Protection using Fuzzy Vault Scheme,” in Proceedings of Eighth International Conference on Signal Image Technology and Internet Based Systems, Naples 2012.

[26] Maio D., Maltoni D., Cappelli R., Wayman J., and Jain A., “FVC2002: Second Fingerprint Verification Competition,” in Proceedings 16th International Conference on Pattern Recognition, Québec City, pp. 811-814, 2002.

[27] Nandakumar K. and Jain A., “Multibiometric Template Security Using Fuzzy Vault,” in Proceedings of IEEE 2nd International 934 The International Arab Journal of Information Technology, Vol. 17, No. 6, November 2020 Conference on Biometrics: Theory, Applications and Systems, Arlington, pp. 1-6, 2008.

[28] Nandakumar K., Nagar A., and Jain A., “Hardening Fingerprint Fuzzy Vault Using Password,” in Proceedings of International Conference on Biometrics, Seoul, pp. 927-937, 2007.

[29] Nandakumar K., Pankanti S., and Jain A., “Fingerprint-Based Fuzzy Vault : Implementation and Performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2008.

[30] Nguyen T., Wang Y., Nguyen T., and Li R., “A Fingerprint Fuzzy Vault Scheme Using A Fast Chaff Point Generation Algorithm,” in Proceedings of IEEE International Conference on Signal Processing, Communication and Computing, KunMing, pp. 1-6, 2013.

[31] Panchal G. and Samanta D., “A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage,” Computers and Electrical Engineering, vol. 69, pp. 461-478, 2018.

[32] Prasad M. and Kumar C., “Fingerprint Template Protection using Multiline Neighboring Relation,” Expert Systems with Applications, vol. 41, no. 14, pp. 6114-6122, 2014.

[33] Sarala S., Karki M., and Yadav S., “Blended Substitution Attack Independent Fuzzy Vault for Fingerprint Template Security,” in Proceedings of International Conference on Circuits, Controls, Communication and Computing, Bangalore, pp. 1-6, 2016.

[34] Selwal A., Gupta S., and Surender., “Low Overhead Octet Indexed Template Security Scheme for Multi-Modal Biometric System,” Journal of Intelligent and Fuzzy Systems, vol. 32, no. 5, pp. 3325-3337, 2017.

[35] Selwal A., Gupta S., and Surender., “Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs,” Procedia Computer Science, vol. 85, pp. 899-905, 2016.

[36] Uludag U., Pankanti S., and Jain A., “Fuzzy Vault for Fingerprints,” in Proceedings of International Conference on Audio and Video Based Biometric Person Authentication, Rye Brook, pp. 310-319, 2005.

[37] Uludag U. and Jain A., “Securing Fingerprint Template : Fuzzy Vault with Helper Data,” in Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop, New York, pp. 163-163, 2006. Reza Mehmood has completed her M. Tech in Computer Science and Technology from Central University of Jammu in 2019. Her area of interest includesBiometrics, MachineLearning, Pattern Recognition and Image Processing. Arvind Selwal is presently working as Sr.Assistant Professor in the Department of Computer Science and Information Technology at Central University of Jammu, J&K,India. He has more than 14 years experience of teaching of UG and PG classes. He has successfully guided 12 M.Tech and one M.Phil students. His research interests include Machine Learning, Biometric Security, Image Processing and Advanced Database Systems. He has contributed more than 20 research articles in the International/National Journals indexed in reputed databases like Scopus and SCI, DBLP etc. He has authored a book on Fundamentals of Automata Theory and Computation