2014
DOI: 10.1007/978-3-319-12778-1_16
|View full text |Cite
|
Sign up to set email alerts
|

Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The inverse of the projection matrix can be computed and the original template recovered from the transformed version. Similar limitations are found in approaches based on linear projection and fuzzy vault (Nguyen et al, 2016) as well as random orthonormal projection and fuzzy commitment scheme (Nguyen et al, 2015). Integrating periodic function transform and fuzzy vault provides improved security and user privacy.…”
Section: Open Issues and Challengesmentioning
confidence: 68%
“…The inverse of the projection matrix can be computed and the original template recovered from the transformed version. Similar limitations are found in approaches based on linear projection and fuzzy vault (Nguyen et al, 2016) as well as random orthonormal projection and fuzzy commitment scheme (Nguyen et al, 2015). Integrating periodic function transform and fuzzy vault provides improved security and user privacy.…”
Section: Open Issues and Challengesmentioning
confidence: 68%
“…According to Hooda and Gupta [63], fuzzy vault scheme suffers from the difficulty in revoking a compromised vault, which is liable to the cross matching of biometric templates over the databases; it is simple for an invader to stage attacks after statistically analysing points in the vault. ; It is also possible for an invader to exchange his biometric characters with that of the targeted biometric template, consequently thrashing vault validation; finally, if the new template of the genuine user is provisionally exposed, then the attacker can acquire the template during this exposure [64].…”
Section: Biometric Template Protection Techniquesmentioning
confidence: 99%
“…However, every component is matched differently, which allow multiple permutations to communicate. Nevertheless, the implementation was focused on regenerating a fixed message [64].…”
Section: Biometric Template Protection Techniquesmentioning
confidence: 99%
“…Moreover, the blend substitution attack via biometric systems is analyzed in (see Section 4 (iii) for the attack). Recently, Nguyen et al propose a new scheme based on nonrandom chaff point generator to prevent the blend substitution attack. Furthermore, performance and security problems of the fuzzy vault scheme are reported in (see also for security analysis on fingerprint fuzzy vaults).…”
Section: Framework and Previous Work In Key‐binding Approachmentioning
confidence: 99%
“…Furthermore, the system can compute neither the plain queried feature trueQ nor the original template trueT from any masked template trueH and any masked query trueH. Hence, any attacker can glance neither trueTnor trueQduring the authentication procedure of our scheme. Remark As introduced in Section 2.2.3, a new fuzzy vault scheme is proposed recently in to prevent the blend substitution attack. However, as well as the classical scheme of Juels and Sudan , the new scheme is still based on chaff points, and hence, it is difficult to provide several requirements such as (R‐1) and (R‐2) for template protection.…”
Section: Comparison With Fuzzy Vaultmentioning
confidence: 99%