Realization of correlation attack against the fuzzy vault scheme

作者: Alisher Kholmatov , Berrin Yanikoglu

DOI: 10.1117/12.766861

关键词:

摘要: User privacy and template security are major concerns in the use of biometric systems. These serious based on fact that once compromised, traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate problem. is binding with secret key scrambling it large amount redundant data, such computationally infeasible extract without possession trait. It was recently claimed susceptible correlation attacks which assume availability two fuzzy vaults created using same data (e.g. impressions fingerprint) suggests correlating them would reveal hidden inside. In this work, we implemented vault fingerprints performed against database 400 (200 matching pairs). Given vaults, could successfully unlock 59% within short time. Furthermore, possible link an unknown list containing its pair, for 41% all vaults. results prove claim additional measures indeed vulnerable attacks.

参考文章(17)
Berrin Yanıkoğlu, Alisher Anatolyevich Kholmatov, Combining multiple biometrics to protect privacy ,(2004)
Andrew Beng Jin Teoh, Kar-Ann Toh, Wai Kuan Yip, 2^N discretisation of biophasor in cancellable biometrics international conference on biometrics. pp. 435- 444 ,(2007) , 10.1007/978-3-540-74549-5_46
Umut Uludag, Sharath Pankanti, Anil K. Jain, Fuzzy vault for fingerprints Lecture Notes in Computer Science. pp. 310- 319 ,(2005) , 10.1007/11527923_32
Karthik Nandakumar, Abhishek Nagar, Anil K. Jain, Hardening fingerprint Fuzzy vault using password international conference on biometrics. pp. 927- 937 ,(2007) , 10.1007/978-3-540-74549-5_97
Jean-Paul Linnartz, Pim Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates Lecture Notes in Computer Science. pp. 393- 402 ,(2003) , 10.1007/3-540-44887-X_47
Malcolm Crompton, Biometrics and Privacy the End of the World as We Know it or the White Knight of Privacy Australian Journal of Forensic Sciences. ,vol. 36, pp. 49- 58 ,(2004) , 10.1080/00450610409410597
Walter J. Scheirer, Terrance E. Boult, Cracking Fuzzy Vaults and Biometric Encryption The Bulletin of the Center for Children's Books. pp. 1- 6 ,(2007) , 10.1109/BCC.2007.4430534
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, Bhagavatula Vijaya Kumar, BIOMETRIC ENCRYPTION USING IMAGE PROCESSING Proceedings of SPIE. ,vol. 3314, pp. 178- 188 ,(1998) , 10.1117/12.304705
N. K. Ratha, J. H. Connell, R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems Ibm Systems Journal. ,vol. 40, pp. 614- 634 ,(2001) , 10.1147/SJ.403.0614
Pim T. Tuyls, Evgeny Verbitskiy, Tanya Ignatenko, Daniel Schobben, Ton H. Akkermans, Privacy protected biometric templates: acoustic ear identification Biometric Technology for Human Identification. ,vol. 5404, pp. 176- 182 ,(2004) , 10.1117/12.541882