Information Technology Reference
In-Depth Information
that transformed minutiae using plus operation between the scan image and password.
We think that should just one operation. It is not only an addition but a minus, a multi-
plication, a division in the equation.
The remainder of this paper describes definition of fuzzy logic, fuzzy vault, finger-
print and fuzzy vault scheme for fingerprint in section 2. In section 3, we define ad-
versarial model and analyze vulnerabilities of K.Nandakumar's scheme. Then we
propose a new secure scheme. Conclusions are given in section 4.
2 Related work
2.1 Fuzzy Logic
Fuzzy is derived from fuzzy set theory to deal with reasoning that is approximate
rather than precise. In binary sets with binary logic, the variables may have only 0 or
1. In fuzzy logic, the truth can range between 0 and 1 and is not constrained to the two
truth values {true (1), false (0)} as in classic predicate logic[1]. Figure 1 represents
logic system.
2.2 Fuzzy Vault Scheme
Fuzzy vault scheme is proposed by Ari Juels[2]. Fuzzy vault scheme is the representa-
tive method of biometric key generation and management. Figure 2 and Figure 3
represents encryption/decryption process of fuzzy vault scheme.
Fig. 1. Logic System
Fig. 2. Encryption of fuzzy vault scheme
Search WWH ::




Custom Search