Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

Authentication scheme using novel chaff generation method in fuzzy vault

, , ,

DOI: http://dx.doi.org/10.15439/2017R55

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 8992 ()

Full text

Abstract. Key Management is the critical issue of a cryptographic system and it requires a better security mechanism. Bio-cryptology provides a strong solution for the said critical issue. Fuzzy vault scheme is a popular scheme to design bio-cryptosystems. Key is secured with the biometric data mixed up with some noise points known as chaff points in a secure storage i.e. vault. Generation of chaff points is the important part of the fuzzy vault system. This work is mainly aims to present an authentication scheme (Key matching) with reducing the complexities of chaff generation. In chaff generation, circle packing, geometrical hashing etc. techniques are used to protect the real data from the noisy data, but these techniques are complex. Here a novel method of chaff generation is used where newly generated chaff point compared with genuine points (stored in a dataset) to assure that it is different, hence genuine points are protected. Experimental results shows that our method have less complexity and performs better than other existent methods.

References

  1. A. K. Jain, K. Nandakumar, and A. Ross., "50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities", Pattern Recognition Letters, 2016.
  2. R. Hooda1 and M. Kaur, "Novel Chaff Generation for Fingerprint Fuzzy Vault ", British Journal of Mathematics & Computer Science, 2015, vol. 10 (3), pp. 1-9,
  3. T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, “Improved chaff point generation for vault scheme in bio-cryptosystems,” IET Biometrics, 2013, vol. 2, no. 2, pp.48-55.
  4. Mohammad Khalil-Hani and Rabia Bakhteri, “Securing Cryptographic Key with Fuzzy Vault based on a new Chaff Generation Method” International Conference on High Performance Computing and Simulation (HPCS), 2010, pp. 259-265.
  5. S. Lee, D. Moon, Y. Chung, “Inserting chaff minutiae for the geometric hashing-based fuzzy fingerprint vault”, Journal of Information Science and Engineering, vol. 25, no. 4, pp. 1177-1190, 2009.
  6. Jason Jeffers and Arathi Arakala, “Minutiae Based Structures for a Fuzzy Vault,”in Biometric Symposium IEEE, RMIT University, Melbourne, 2006, pp. 1-6.
  7. K. Nandakumar, A. K.Jain, and S.Pankanti, "Fingerprint-based fuzzy vault: implementation and performance," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, December 2007, pp. 744-757.
  8. S. Prabhakar, S. Pankanti, and A. Jain, “Biometric recognition: Security and privacy concerns,” IEEE Security and Privacy, 2003, Vol. 1, pp. 33-42.
  9. A. Juels, M. Sudan, “A Fuzzy Vault Scheme”, in IEEE International Symposium on Information Theory, p. 408, 2002.