Fuzzy vault for fingerprints
TLDR
This paper explores the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data, which aims to secure critical data with the fingerprints in a way that only the authorized user can access the secret by providing the valid fingerprint.Abstract:
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications, such as secure cellular phone access. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. In this paper, we explore the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data. This construct aims to secure critical data (e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. The results show that 128-bit AES keys can be secured with fingerprint minutiae data using the proposed system.read more
Citations
More filters
Journal ArticleDOI
Biometric template security
TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI
Biometrics: a tool for information security
TL;DR: An overview of biometrics is provided and some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security are discussed.
Journal ArticleDOI
Generating Cancelable Fingerprint Templates
TL;DR: This paper demonstrates several methods to generate multiple cancelable identifiers from fingerprint images to overcome privacy concerns and concludes that feature-level cancelable biometric construction is practicable in large biometric deployments.
Journal ArticleDOI
Fingerprint-Based Fuzzy Vault: Implementation and Performance
TL;DR: This work presents a fully automatic implementation of the fuzzy vault scheme based on fingerprint minutiae, a biometric cryptosystem that secures both the secret key and the biometric template by binding them within a cryptographic framework.
Journal ArticleDOI
PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks
TL;DR: This paper presents physiological-signal-based key agreement (PSKA), a scheme for enabling secure intersensor communication within a BAN in a usable (plug-n-play, transparent) manner, and shows that PSKA is a viable inters sensor key agreement protocol for BANs.
References
More filters
Numerical recipes in C
TL;DR: The Diskette v 2.06, 3.5''[1.44M] for IBM PC, PS/2 and compatibles [DOS] Reference Record created on 2004-09-07, modified on 2016-08-08.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Book
Biometrics: Personal Identification in Networked Society
TL;DR: This book covers the general principles and ideas of designing biometric-based systems and their underlying tradeoffs, and the exploration of some of the numerous privacy and security implications of biometrics.