Paper
29 May 2014 Secure fingerprint hashes using subsets of local structures
Tom Effland, Mariel Schneggenburger, Jim Schuler, Bingsheng Zhang, Jesse Hartloff, Jimmy Dobler, Sergey Tulyakov, Atri Rudra, Venu Govindaraju
Author Affiliations +
Abstract
In order to fulfill the potential of fingerprint templates as the basis for authentication schemes, one needs to design a hash function for fingerprints that achieves acceptable matching accuracy and simultaneously has provable security guarantees, especially for parameter regimes that are needed to match fingerprints in practice. While existing matching algorithms can achieve impressive matching accuracy, they have no security guarantees. On the other hand, provable secure hash functions have bad matching accuracy and/or do not guarantee security when parameters are set to practical values. In this work, we present a secure hash function that has the best known tradeoff between security guarantees and matching accuracy. At a high level, our hash function is simple: we apply an off-the shelf hash function on certain collections of minutia points (in particular, triplets of minutia triangles"). However, to realize the potential of this scheme, we have to overcome certain theoretical and practical hurdles. In addition to the novel idea of combining clustering ideas from matching algorithms with ideas from the provable security of hash functions, we also apply an intermediate translation-invariant but rotation-variant map to the minutia points before applying the hash function. This latter idea helps improve the tradeoff between matching accuracy and matching efficiency.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Tom Effland, Mariel Schneggenburger, Jim Schuler, Bingsheng Zhang, Jesse Hartloff, Jimmy Dobler, Sergey Tulyakov, Atri Rudra, and Venu Govindaraju "Secure fingerprint hashes using subsets of local structures", Proc. SPIE 9075, Biometric and Surveillance Technology for Human and Activity Identification XI, 90750D (29 May 2014); https://doi.org/10.1117/12.2050477
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Information security

Fuzzy logic

Quantization

Electroluminescent displays

Computer security

Neodymium

RELATED CONTENT

Security analysis for fingerprint fuzzy vaults
Proceedings of SPIE (May 31 2013)
Cryptographic key generation using handwritten signature
Proceedings of SPIE (April 17 2006)
How to protect biometric templates
Proceedings of SPIE (February 27 2007)
On information leakage in fuzzy commitment
Proceedings of SPIE (January 27 2010)

Back to Top