Information Technology Reference

In-Depth Information

To add to this, it applies to the top and bottom, right and left or the quadrant from a

point of reference. Second, we consider the center parts of scanned fingerprint. This

part is a circle that has arbitrary size in the center of scanned fingerprint. In generally,

when the fingerprint is scanned, the center parts of fingerprint should be taken the

high pressure. So this fingerprint will be scan correctly. A contrary concept, the edge

of fingerprint will be scanned the low pressure. And then, it may be extracted less

correctly than the former part. After all, the edge of fingerprint should be constructed

highly the component ratio of fallible minutiae. From information security point of

view, constructed minutiae from the center circle of fingerprint has more risk than the

circle that constructs extractive minutiae from scanned full fingerprint when the minu-

tiae is exposed by attacker. So, the center circle of fingerprint image will be protected

user's fingerprint using the more computational complexity than among add, minus,

multiplication, division.

4 Conclusion

We explained the fuzzy logic, fuzzy vault scheme, the fuzzy vault for fingerprint,

fingerprint and fingerprint fuzzy vault using password for secure structure. We indi-

cated that the scheme using password have a problem when the password is exposed

and solved the problem. Also we explain the possible attack in the scheme, and ana-

lyze security of attack for proposed scheme. To solve the problem of

K.Nandakumar's scheme, we use one-way hash function. Also, K.Nandakumar de-

scribes the equation that transformed minutiae using plus operation between the scan

image and password. We think that should just one operation. It is not only an addi-

tion but a minus, a multiplication, a division in the equation.The identification for

biometric information offers a convenience of user. But the problem still exists that

biometric information has an immutable character and is not abolished. It needs to

implement the transformation module that minimizes the threat of attack. Through it,

the more secure scheme will be designed.

References

1.
Novák, V., Perfilieva, I., Močkoř, J.: Mathematical principles of fuzzy logic. Kluwer Aca-

demic, Dodrecht (1999)

2.
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Sym-

posium on Information Theory, Lausanne, Switzerland, p. 408 (2002)

3.
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for fingerprints. In: Kanade, T., Jain, A.,

Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310-319. Springer, Heidelberg

(2005)

4.
Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Pass-

word. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927-937. Springer,

Heidelberg (2007)

5.
Mihăilescu, P.: The fuzzy vault for fingerprints is vulnerable to brute force attack,

http://arxiv.org/abs/0708.2974v1

6.
Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proc. 14th ACM

Conf. on Computer and Communications Security (2002)

Search WWH ::

Custom Search