Information Technology Reference
In-Depth Information
To add to this, it applies to the top and bottom, right and left or the quadrant from a
point of reference. Second, we consider the center parts of scanned fingerprint. This
part is a circle that has arbitrary size in the center of scanned fingerprint. In generally,
when the fingerprint is scanned, the center parts of fingerprint should be taken the
high pressure. So this fingerprint will be scan correctly. A contrary concept, the edge
of fingerprint will be scanned the low pressure. And then, it may be extracted less
correctly than the former part. After all, the edge of fingerprint should be constructed
highly the component ratio of fallible minutiae. From information security point of
view, constructed minutiae from the center circle of fingerprint has more risk than the
circle that constructs extractive minutiae from scanned full fingerprint when the minu-
tiae is exposed by attacker. So, the center circle of fingerprint image will be protected
user's fingerprint using the more computational complexity than among add, minus,
multiplication, division.
4 Conclusion
We explained the fuzzy logic, fuzzy vault scheme, the fuzzy vault for fingerprint,
fingerprint and fingerprint fuzzy vault using password for secure structure. We indi-
cated that the scheme using password have a problem when the password is exposed
and solved the problem. Also we explain the possible attack in the scheme, and ana-
lyze security of attack for proposed scheme. To solve the problem of
K.Nandakumar's scheme, we use one-way hash function. Also, K.Nandakumar de-
scribes the equation that transformed minutiae using plus operation between the scan
image and password. We think that should just one operation. It is not only an addi-
tion but a minus, a multiplication, a division in the equation.The identification for
biometric information offers a convenience of user. But the problem still exists that
biometric information has an immutable character and is not abolished. It needs to
implement the transformation module that minimizes the threat of attack. Through it,
the more secure scheme will be designed.
References
1. Novák, V., Perfilieva, I., Močkoř, J.: Mathematical principles of fuzzy logic. Kluwer Aca-
demic, Dodrecht (1999)
2. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Sym-
posium on Information Theory, Lausanne, Switzerland, p. 408 (2002)
3. Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for fingerprints. In: Kanade, T., Jain, A.,
Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 310-319. Springer, Heidelberg
(2005)
4. Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Pass-
word. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 927-937. Springer,
Heidelberg (2007)
5. Mihăilescu, P.: The fuzzy vault for fingerprints is vulnerable to brute force attack,
http://arxiv.org/abs/0708.2974v1
6. Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proc. 14th ACM
Conf. on Computer and Communications Security (2002)
Search WWH ::




Custom Search