1,171 Hits in 2.6 sec

Usable protection to healthcare application

Li Yang, Mina Sartipi, Matt McNeely
2011 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '11  
To achieve such security and privacy of health data, we design a fuzzy authentication framework based on a fuzzy vault scheme, fingerprint biometric technique, and zeroknowledge authentication.  ...  [12] suggests a number of attacks targeting on the fuzzy vault scheme such as record multiplicity and blended substitution attacks.  ...  The attacks via record multiplicity assume that an attacker intercepts multiple encodings which are created using the same biometric data (e.g. two fuzzy vaults created using templates of the same fingerprint  ... 
doi:10.1145/2179298.2179391 dblp:conf/csiirw/YangSM11 fatcat:4zq4cggre5gkbes4rdbk7tamwe

Retina and Iris Based Multimodal Biometric Fuzzy Vault

V.S. Meenakshi, Dr. G. Padmavathi
2010 International Journal of Computer Applications  
Fuzzy vault is a proven biometric crypto system that is used to protect biometric templates and secret data. Multi biometric systems are more secure compared to their single biometric counterparts.  ...  In this work, fuzzy vault framework is used to secure both retina and iris template.  ...  The work of Karthick Nandakumar [5] concluded that the performance of the fuzzy vault can be further improved by using multiple biometric sources (multiple fingerprint) or multiple modalities (fingerprint  ... 
doi:10.5120/594-669 fatcat:bhpgaxlomvgozonrpfww6np7ay

Privacy Protection in Distributed Fingerprint-based Authentication

Swe Geng, Georgia Giannopoulou, Maëlle Kabir-Querrec
2019 Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society - WPES'19  
Multiple devices can be connected and perform user enrollment or verification. To secure the privacy and integrity of sensitive data, we employ a cryptographic construct called fuzzy vault.  ...  We highlight challenges in implementing fuzzy vault-based authentication, for which we propose and compare alternative solutions.  ...  For example, a possible use case would be access control for multiple buildings.  ... 
doi:10.1145/3338498.3358648 dblp:conf/wpes/GengGK19 fatcat:er6in4ah6fhdhaufbghr6vqymy

Microcoded coprocessor for embedded secure biometric authentication systems

Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede
2005 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis - CODES+ISSS '05  
The secure properties of the biometric matching process are obtained by means of a fuzzy vault scheme. The algorithm is implemented in a reprogrammable, microcoded coprocessor called FV16.  ...  Our coprocessor can be attached to an ARM processor, and offers a 83-fold cycle count improvement when the fuzzy vault algorithm is migrated from embedded ARM software (13.8 million cycles) to the FV16  ...  The fuzzy vault construction and unlocking procedure can be fully described using 16-bit arithmetic. The coprocessor is microcoded, with a separate data path and controller.  ... 
doi:10.1145/1084834.1084871 dblp:conf/codes/YangSV05 fatcat:py32gp45qvfhbl76enixhbfopm

Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault

K. Xi, J. Hu
2009 2009 IEEE International Conference on Communications  
As one of the possible solutions, the Fuzzy Vault construct binds a secret key and biometric information to provide template protection.  ...  In this paper, we propose a Fingerprint Fuzzy Vault based on composite features which are reliable, distortion tolerant and registration-free.  ...  They combined multiple fingerprint impressions to extract a reference minutia during both vault encoding and decoding.  ... 
doi:10.1109/icc.2009.5198785 dblp:conf/icc/XiH09 fatcat:vhugo4aqszc2hh4mhyityo5wia

A multiple server scheme for fingerprint fuzzy vaults

Jesse Hartloff, Matthew Morse, Bingsheng Zhang, Thomas Effland, Jennifer Cordaro, Jim Schuler, Sergey Tulyakov, Atri Rudra, Venu Govindaraju
2015 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
In this work, we present a multiple server fingerprint verification scheme that provides enhanced template security by eliminating several known vulnerabilities of the fuzzy vault scheme.  ...  Even in this case, the templates are protected by the fuzzy vault scheme.  ...  It may be unrealistic for a user to memorize a lengthy encryption key, but we note that this can be achieved through smart cards, near-field communication (NFC), and other recently developed technologies  ... 
doi:10.1109/cvprw.2015.7301327 dblp:conf/cvpr/HartloffMZECSTR15 fatcat:cdwp33vzmnerxjyzndqvurex2m

Fingerprint-Based Fuzzy Vault: Implementation and Performance

Karthik Nandakumar, Anil K. Jain, Sharath Pankanti
2007 IEEE Transactions on Information Forensics and Security  
We present a fully automatic implementation of the fuzzy vault scheme based on fingerprint minutiae.  ...  Since the fuzzy vault stores only a transformed version of the template, aligning the query fingerprint with the template is a challenging task.  ...  The performance of the fuzzy vault can be further improved by using multiple biometric sources, such as multiple fingers or multiple modalities (e.g., fingerprint and iris).  ... 
doi:10.1109/tifs.2007.908165 fatcat:sjg4y2wwifbgvjmqypnupo2yxy

Cracking Fuzzy Vaults and Biometric Encryption

Walter J. Scheirer, Terrance E. Boult
2007 2007 Biometrics Symposium  
This paper is a security analysis of leading privacy enhanced technologies (PETs) for biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE).  ...  We introduce three disturbing classes of attacks against PET techniques including attack via record multiplicity, surreptitious key-inversion attack, and novel blended substitution attacks.  ...  BIOMETRIC FUZZY VAULTS In order to solve the problem of hiding a key and unlocking it with biometric or other approximately matching data, Juels and Sudan [5] introduce a construct called a fuzzy vault  ... 
doi:10.1109/bcc.2007.4430534 fatcat:o266lfqkyvdl3j4zqmwnhpjt2i

Unlinkable improved multi-biometric iris fuzzy vault

Christian Rathgeb, Benjamin Tams, Johannes Wagner, Christoph Busch
2016 EURASIP Journal on Information Security  
The proposed system locks biometric feature sets extracted from binary iris biometric reference data, i.e. iris-codes, of the left and right irises in a single fuzzy vault.  ...  In this work, we propose an unlinkable multi-instance iris biometric cryptosystem based on the improved fuzzy vault scheme.  ...  The number of errors that one can tolerate depends on an additional parameter controlling input to a Guruswami-Sudan algorithm called multiplicity.  ... 
doi:10.1186/s13635-016-0049-9 fatcat:hezywyeezrfahmhpmfe636ok2e

Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems [article]

Benjamin Tams
2013 arXiv   pre-print
We propose an implementation of a minutiae fuzzy vault that is inherently resistant against cross-matching and the correlation attack.  ...  We investigate implementations of biometric cryptosystems protecting fingerprint templates (which are mostly based on the fuzzy vault scheme by Juels and Sudan in 2002) with respect to the security they  ...  Furthermore, our single-finger fuzzy vault construction that is resistant against the correlation attack may be generalized to a construction that protects multiple fingers.  ... 
arXiv:1304.7386v1 fatcat:ms6gkd2qjfas7oicksxkcgtqkm

Biometric Key Capsulation Technique Based on Fingerprint Vault: Anatomy and attack

M.S. AlTarawneh, W.L. Woo, S.S. Dlay
2008 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications  
Keys entropy depends on level of shielding, secret key depend on degree of polynomial, while encryption key depend on constructed vault entropy, and it is slightly more efficient in terms of encryption  ...  We propose a practical key capsulation mechanism with a simple and intuitive design concept to overcome the management and security issues.  ...  [9] proposed a fuzzy vault scheme based on the location of minutiae points in a fingerprint.  ... 
doi:10.1109/ictta.2008.4530122 fatcat:xxcdqx7rcbaolemqtd6ufuv6ja

Security analysis for fingerprint fuzzy vaults

Jesse Hartloff, Maxwell Bileschi, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju, Ioannis Kakadiaris, Walter J. Scheirer, Laurence G. Hassebrook
2013 Biometric and Surveillance Technology for Human and Activity Identification X  
We provide a security parameter for the fuzzy vault in terms of the decoding problem, which gives context for the breaking of the fuzzy vault, whereas most of the existing literature measures the strength  ...  We show that the breaking of a fuzzy vault leads to decoding of Reed-Solomon codes from random errors, which has been proposed as a hard problem in the cryptography community.  ...  This makes it difficult to control the security of a fuzzy vault system in general and prompts the need to control the number of minutia used to lock the vault.  ... 
doi:10.1117/12.2016635 fatcat:caowlgotlvggziywtd4t5jlzau

A collusion attack on the fuzzy vault scheme

Hoi Ting Poon, Ali Miri
2009 Isecure  
This paper describes an attack on the Fuzzy Vault scheme where the attacker is assumed to have access to multiple vaults locked by the same key and where a non-maximal vault size is used.  ...  A B S T R A C T The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys.  ...  This paper describes an attack on the Fuzzy Vault scheme where the attacker is assumed to have access to multiple vaults locked by the same key and where a non-maximal vault size is used.  ... 
doi:10.22042/isecure.2015.1.1.4 dblp:journals/isecure/PoonM09 fatcat:zuskzp7f6zbyvio4vnvhfaaeym

Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications

V.S. Meenakshi, Dr.G. Padmavathi
2010 Procedia Computer Science  
Fuzzy vault suffers from certain limitations like non-revocability, cross matching and lack of diversity. The fuzzy vault is hardened with a password to overcome these limitations.  ...  The password-hardened revocable templates are then secured in a multimodal biometric fuzzy vault. Passwords act as an additional layer of security apart from providing revocability.  ...  Acknowledgement A public version of the FVC2002 fingerprint database is available from A public version of the DRIVE: Digital Retinal Images for Vessel Extraction is available  ... 
doi:10.1016/j.procs.2010.11.025 fatcat:xejjgitptrds7ake45zh67shym

Face Recognition and Template Protection with Shielding Function

Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah
2015 International Journal of Security and Its Applications  
The fuzzy vault scheme [19] uses a secret key to lock data in a vault.  ...  A user specific password is used to transform the face template before using the key to lock the transformed template in a fuzzy vault. The  ...  MoC-based fuzzy eigenface vault [23] is a two-factor authentication mechanism used to secure Eigen faces in a fuzzy vault.  ... 
doi:10.14257/ijsia.2015.9.12.15 fatcat:6na4rjjg4nbd7pz23lzpaciveq
« Previous Showing results 1 — 15 out of 1,171 results