Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications - WBMA '03 2003
DOI: 10.1145/982507.982516
|View full text |Cite
|
Sign up to set email alerts
|

Secure smartcardbased fingerprint authentication

Abstract: In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined, and a cryptosystem capable of using flngerprint data as its key is presented. For our application, we focus on situations where a private key stored on a smartcard is used for authentication in a networked environment, and we assume an attacker can launch ofi-line attacks against a stolen card.Juels and Sudan's fuzzy vault is used as a starting point for building and analyzing a se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
322
1
1

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 403 publications
(336 citation statements)
references
References 14 publications
3
322
1
1
Order By: Relevance
“…Thus more chaff points provides better security, but arguably worse vault unlocking performance. The application of fuzzy vault to fingerprint identification appeared in the work of Clancy et al [9]. That paper showed realistic expectations on the numbers of chaff points and associated attack complexity.…”
Section: Previous Workmentioning
confidence: 98%
“…Thus more chaff points provides better security, but arguably worse vault unlocking performance. The application of fuzzy vault to fingerprint identification appeared in the work of Clancy et al [9]. That paper showed realistic expectations on the numbers of chaff points and associated attack complexity.…”
Section: Previous Workmentioning
confidence: 98%
“…They give specific schemes that meet theoretical bounds for Hamming distance, set difference and edit distance respectively. Another distance measure, point-set difference, motivated from a popular representation for fingerprint features, is investigated in a number of studies [5,3,4]. A different approach [14,24,23] focuses on information leakage defined using Shannon entropy on continuous data with known distributions.…”
Section: Related Workmentioning
confidence: 99%
“…the number of sketches which non-zero probability of occurrences) is significantly smaller than 2 LP where L P is the length of the sketch and thus their sketches contain redundancy. One example is the chaff-based method [5] proposed to protect the biometric fingerprint. Here, a fingerprint is the secret x and can be represented as a set of 2D points.…”
Section: Redundancy In Sketchmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, we use the x and y coordinates of minutiae points for locking/unlocking the vault (similar to the algorithms of Clancy et al [3], and Yang and Verbauwhede [21]). The encoding operation secures S with fingerprint minutiae data: if a query minutiae (that is aligned with respect to the template using the helper data as explained in Section 3) set that is similar to the template minutiae set is presented during decoding S can be reconstructed accurately.…”
Section: Encodingmentioning
confidence: 99%