scispace - formally typeset
Open AccessBook ChapterDOI

Fuzzy vault for fingerprints

TLDR
This paper explores the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data, which aims to secure critical data with the fingerprints in a way that only the authorized user can access the secret by providing the valid fingerprint.
Abstract
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications, such as secure cellular phone access. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. In this paper, we explore the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data. This construct aims to secure critical data (e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. The results show that 128-bit AES keys can be secured with fingerprint minutiae data using the proposed system.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

Biometrics: a tool for information security

TL;DR: An overview of biometrics is provided and some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security are discussed.
Journal ArticleDOI

Generating Cancelable Fingerprint Templates

TL;DR: This paper demonstrates several methods to generate multiple cancelable identifiers from fingerprint images to overcome privacy concerns and concludes that feature-level cancelable biometric construction is practicable in large biometric deployments.
Journal ArticleDOI

Fingerprint-Based Fuzzy Vault: Implementation and Performance

TL;DR: This work presents a fully automatic implementation of the fuzzy vault scheme based on fingerprint minutiae, a biometric cryptosystem that secures both the secret key and the biometric template by binding them within a cryptographic framework.
Journal ArticleDOI

PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks

TL;DR: This paper presents physiological-signal-based key agreement (PSKA), a scheme for enabling secure intersensor communication within a BAN in a usable (plug-n-play, transparent) manner, and shows that PSKA is a viable inters sensor key agreement protocol for BANs.
References
More filters

Numerical recipes in C

TL;DR: The Diskette v 2.06, 3.5''[1.44M] for IBM PC, PS/2 and compatibles [DOS] Reference Record created on 2004-09-07, modified on 2016-08-08.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book

Biometrics: Personal Identification in Networked Society

TL;DR: This book covers the general principles and ideas of designing biometric-based systems and their underlying tradeoffs, and the exploration of some of the numerous privacy and security implications of biometrics.