Chaff point generation mechanism for improving fuzzy vault security

A combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances the security level of current biometric cryptographic systems in terms of hiding secret key and protecting the template. Alth...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IET biometrics Ročník 5; číslo 2; s. 147 - 153
Hlavní autoři: Dang, Tran Khanh, Nguyen, Minh Tan, Truong, Quang Hai
Médium: Journal Article
Jazyk:angličtina
Vydáno: Stevenage The Institution of Engineering and Technology 01.06.2016
John Wiley & Sons, Inc
Témata:
ISSN:2047-4938, 2047-4946, 2047-4946
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:A combination of cryptographic and biometric systems, by performing specific binding technique on cryptographic key and biometric template, the fuzzy vault framework enhances the security level of current biometric cryptographic systems in terms of hiding secret key and protecting the template. Although the original scheme suggests the use of error-correction techniques (e.g. the Reed–Solomon code) to reconstruct the original polynomial, recent implementations do not share the same point of view. Instead, cyclic redundant code (CRC) is applied to identify the genuine polynomial from a set of candidates due to its simplicity. Within the scope of this study, the authors address a significant flaw of current CRC-based fuzzy vault schemes, which allows the potential of successful blend substitution attack. To overcome this problem, an integration of two novel modules into general fuzzy vault scheme, namely chaff point generator and verifier, is proposed. The new modules are designed to be integrated easily into the existing systems as well as simple to enhance. The proposed scheme can detect any modification in vault and, as a result, eliminate the blend substitution attack to improve general security. Moreover, the experimental results of this study with real-world datasets show an increase in genuine acceptance rates.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2047-4938
2047-4946
2047-4946
DOI:10.1049/iet-bmt.2015.0023