skip to main content
10.1145/2093698.2093722acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisabelConference Proceedingsconference-collections
research-article

On fuzzy syndrome hashing with LDPC coding

Published: 26 October 2011 Publication History

Abstract

The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key. This paper analyzes such a model, showing that it offers a suitable protection against information leakage and several advantages with respect to similar solutions, like the fuzzy commitment scheme. The design and characterization of LDPC codes to be used for this purpose is also addressed.

References

[1]
U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain. Biometric cryptosystems: Issues and challenges. In Proceedings of the IEEE, vol. 92, no. 6, pp. 948--960, Jun. 2004.
[2]
D. Schipani and J. Rosenthal. Coding solutions for the secure biometric storage problem. In Proc. of IEEE ITW 2010, Dublin, Ireland, Aug. 2010.
[3]
P. Tuyls, B. Skoric and T. Kevenaar (Eds.). Security with noisy data. Springer, London, 2007.
[4]
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In Proc. 6th ACM Conference on Computer and Communications Security, pp. 28--36, Singapore, Nov. 1999.
[5]
A. Juels and M. Sudan. A fuzzy vault scheme. Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237--257, Feb. 2006.
[6]
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comp., vol. 38, no. 1, pp. 97--139, Mar. 2008.
[7]
I. Buhan, J. Doumen and P. Hartel. Controlling leakage of biometric information using dithering. In Proc. EUSIPCO 2008, Lausanne, Switzerland, Aug. 2008.
[8]
Y. Dodis and A. Smith. Correcting errors without leaking partial information. In Proc. ACM STOC 2005, pp. 654--663, Baltimore, MD, May 2005.
[9]
Y. Sutcu, S. Rane, J. S. Yedidia, S. C. Draper and A. Vetro. Feature extraction for a Slepian-Wolf biometric system using LDPC codes. In Proc. IEEE ISIT 2008, pp. 2297--2301, Toronto, ON, Jul. 2008.
[10]
D. Schipani, M. Elia and J. Rosenthal. On the decoding complexity of cyclic codes up to the BCH bound. In Proc. IEEE ISIT 2011, Saint-Petersburg, Russia, Jul. 2011.
[11]
T. J. Richardson and R. L. Urbanke. The capacity of low-density parity-check codes under message-passing decoding. IEEE Trans. Inform. Theory, vol. 47, pp. 599--618, Feb. 2001.
[12]
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor. Optimal iris fuzzy sketches. In Proc. IEEE BTAS 2007, Washington, DC, Sep. 2007.
[13]
R. G. Gallager. Low-density parity-check codes. M. I. T. Press, 1963.
[14]
L. Bazzi, T. J. Richardson and R. L. Urbanke. Exact thresholds and optimal codes for the binary-symmetric channel and Gallager's decoding algorithm A. IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 2010--2021, Sep. 2004.
[15]
N. Miladinovic and M. P. C. Fossorier. Improved bit-flipping decoding of low-density parity-check codes. IEEE Trans. Inform. Theory, vol. 51, no. 4, pp. 1594--1606, Apr. 2005.
[16]
J. Hagenauer, E. Offer, and L. Papke. Iterative decoding of binary block and convolutional codes. IEEE Trans. Inform. Theory, vol. 42, no. 2, pp. 429--445, Mar. 1996.
[17]
X. Y. Hu and E. Eleftheriou. Progressive edge-growth Tanner graphs. In Proc. IEEE GLOBECOM'01, pp. 995--1001, San Antonio, TX, Nov. 2001.
[18]
L. Masek. Recognition of human iris patterns for biometric identification. The School of Computer and Software Engineering, The University of Western Australia, 2003.
[19]
L. Masek and P. Kovesi. Matlab source code for a biometric identification system based on iris patterns. The School of Computer Science and Software Engineering, The University of Western Australia, 2003. {Online}. Available: http://www.csse.uwa.edu.au/~pk/studentprojects/libor/sourcecode.html
[20]
Center for Biometrics and Security Research, Institute of Automation, Chinese Academy of Sciences. CASIA V.1 Iris Database, 2011. {Online}. Available: http://www.cbsr.ia.ac.cn/english/IrisDatabase.asp
[21]
J. Daugmann. How iris recognition works. IEEE Trans. Circuits Syst. Video Technol., vol. 14, n. 1, pp. 21--30, Jan. 2004.
[22]
T. Cover and J. Thomas. Elements of information theory. Wiley, New York, 1991.

Cited By

View all
  • (2023)A Blockchain Consensus Protocol Based on Fuzzy SignaturesGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437855(886-891)Online publication date: 4-Dec-2023
  • (2021)BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template2021 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB52358.2021.9484391(1-8)Online publication date: 4-Aug-2021
  • (2021)A Dynamically Reconfigurable QC-LDPC Implementation for Iris Recognition2021 IEEE 10th Global Conference on Consumer Electronics (GCCE)10.1109/GCCE53005.2021.9622068(808-812)Online publication date: 12-Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ISABEL '11: Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
October 2011
949 pages
ISBN:9781450309134
DOI:10.1145/2093698
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Universitat Pompeu Fabra
  • IEEE
  • Technical University of Catalonia Spain: Technical University of Catalonia (UPC), Spain
  • River Publishers: River Publishers
  • CTTC: Technological Center for Telecommunications of Catalonia
  • CTIF: Kyranova Ltd, Center for TeleInFrastruktur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 October 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

ISABEL '11
Sponsor:
  • Technical University of Catalonia Spain
  • River Publishers
  • CTTC
  • CTIF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Blockchain Consensus Protocol Based on Fuzzy SignaturesGLOBECOM 2023 - 2023 IEEE Global Communications Conference10.1109/GLOBECOM54140.2023.10437855(886-891)Online publication date: 4-Dec-2023
  • (2021)BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template2021 IEEE International Joint Conference on Biometrics (IJCB)10.1109/IJCB52358.2021.9484391(1-8)Online publication date: 4-Aug-2021
  • (2021)A Dynamically Reconfigurable QC-LDPC Implementation for Iris Recognition2021 IEEE 10th Global Conference on Consumer Electronics (GCCE)10.1109/GCCE53005.2021.9622068(808-812)Online publication date: 12-Oct-2021
  • (2021)An Effective Multi-Mode Iris Authentication System on a Microprocessor-FPGA Heterogeneous Platform With QC-LDPC CodesIEEE Access10.1109/ACCESS.2021.31339089(163665-163674)Online publication date: 2021
  • (2020)Iris Recognition System Implementation Improved by QC-LDPC codes2020 IEEE 2nd Global Conference on Life Sciences and Technologies (LifeTech)10.1109/LifeTech48969.2020.1570619090(88-99)Online publication date: Mar-2020
  • (2019)SoC-FPGA-Based Implementation of Iris Recognition Enhanced by QC-LDPC Codes2019 International Conference on Field-Programmable Technology (ICFPT)10.1109/ICFPT47387.2019.00075(391-394)Online publication date: Dec-2019
  • (2018)An approach to matching fingerprints using cryptographic one-way hashesInternational Journal of Biometrics10.1504/IJBM.2017.0866459:3(205-224)Online publication date: 15-Dec-2018
  • (2018)The Spammed Code Offset MethodIEEE Transactions on Information Forensics and Security10.1109/TIFS.2014.23128519:5(875-884)Online publication date: 25-Dec-2018
  • (2017)Fuzzy Authentication Using Rank DistanceProceedings of the 2nd Workshop on Communication Security10.1007/978-3-319-59265-7_7(97-108)Online publication date: 14-Jul-2017
  • (2015)Subspace Fuzzy VaultPhysical and Data-Link Security Techniques for Future Communication Systems10.1007/978-3-319-23609-4_10(163-172)Online publication date: 25-Sep-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media