Font Size: a A A

Research And Implementation Of The Biometric Cryptosystem Based On Fingerprint

Posted on:2013-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:G R ChenFull Text:PDF
GTID:2248330395975115Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the development of computer, biometric cryptosystem which combines biometric data with keys appeared. It combines the advantages of biometric and cryptographic, protecting the authenticated biometric as well as the security of the keys and reducing the risk of privacy. However, biometric data is fuzzy but the key with accuracy. How to resolve this contradiction is the core issue of biometric cryptosystem.Fuzzy vault is the classic one of the options to resolve that contradiction, its basic idea is to hide the biometric data and the secret into the chaff points, the system would reveal the secret and successfully certified only when the owner show the real biometric. The security of fuzzy vault is based on two aspects. First, it is difficult to distinguish the real points in a large number of chaff points, thereby protecting the biometric template. Second, it is hard to reconstruct the secret form so many points, thereby protecting the key. But recent studies have pointed out that the fuzzy vault is vulnerable to certain types of attacks, such as some of intelligent brute force attack and correlation attack. In the paper, two aspects to strengthen the security of the fuzzy vault. Firstly, in order to store the transformed template information rather than the original template, a special irreversible hash function is used to transform the real minutiae and then the fuzzy vault is used to encrypt the transformed minutiae. This prevents correlation attack to protect the fingerprint minutiae to strengthening the security of the fuzzy vault. Secondly, fuzzy commitment with minutiae descriptor which contains the information of ridge orientation and ridge frequency is used to protect the value of the polynomial. That makes the attacker difficult to reconstruct the secret polynomial even if he get the real minutiae from the vault, thereby strengthening the security of the fuzzy vault.In this paper, a fingerprint database FVC2002DB2is used to do the the experiment of this algorithm. The results showed that compared to fuzzy vault, thought the implement of cryptosystem have declined in the recognition, considering the safety performance and the complexity, it can be drawn that the proposed method is a effective cryptosystem.
Keywords/Search Tags:cryptosystem, fuzzy vault, minutiae descriptor, fingerprint
PDF Full Text Request
Related items