Home | Issues | Profile | History | Submission | Review
Vol: 60(74) No: 1 / March 2015      

Using Error-correcting Codes to Speed Up the Fuzzy Vault Bio-cryptographic Scheme Biometric Decryption Process
Marius-Alexandru Velciu
Department of Computer Science, Military Technical Academy, Bucharest, Bucharest, Romania, e-mail: alexandruvelciu@gmail.com
Alecsandru Pătraşcu
Department of Computer Science, Military Technical Academy, Bucharest, Bucharest, Romania, e-mail: alecsandru.patrascu@gmail.com
Victor Valeriu Patriciu
Department of Computer Science, Military Technical Academy, Bucharest, Bucharest, Romania, e-mail: victorpatriciu@yahoo.com


Keywords: Biometric encryption; Fuzzy Vault scheme; Lagrange interpolation; exhaustive polynomial reconstruction; Reed-Solomon error-correcting codes; Berlekamp-Massey algorithm

Abstract
Bio-cryptography represents a promising alternative for the usage of biometrics, as it does not require the storage of used biometric templates within the system. Despite the advantages conferred by this approach, there are some important drawbacks, too, when implementing bio-cryptographic algorithms, such as the high computational resources needed and the large amount of data generated and used during the biometric encryption process. This paper proposes the usage of Reed-Solomon error-correcting codes during the polynomial reconstruction stage of the Fuzzy Vault bio-cryptographic scheme biometric decryption process, aiming to evaluate the potential benefits conferred by this approach.

References
[1] K. Nandakumar, Anil K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance”, IEEE Transactions on Information Forensics and Security, vol. 2, pp. 744–757, Dec. 2007.
[2] F. Hao, R. Anderson and J. Daughman, “Combining cryptography with biometrics effectively”, Technical Report Number 640 UCAM-CL-TR-640.
[3] S. H. Moi, P. Saad, and N. A. Rahim, “Error correction on iris biometric template using Reed Solomon codes”, Proceedings of 2010 Fourth Asia Inernational Conference on Mathematical Modelling and Computer Simulation, May 2010.
[4] M.-A. Velciu and V.-V. Patriciu, “Methods of reducing bio-cryptographic algorithms computational complexity”, Proceedings of 15th International Symposium on Computational Intelligence and Informatics (CINTI 2014), Budapest, Hungary, 2014, 6 pp.
[5] M.-A. Velciu, A. Patrascu, and V.-V. Patriciu, “An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms”, Proceedings of 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatic (SACI), Timisoara, Romania, 2015, 6 pp.
[6] A. Stoianov and A. Cavoukian, “Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy”, Research Report, Toronto, Canada, 2007.
[7] P. Sood and M. Kaur, “Methods of automatic alignment of fingerprint in fuzzy vault”, Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1-4, Chandigarh, India, March 2014.
[8] H. A. E. A. Elsaid “Design and implementation of reed-solomon decoder using decomposed inversion less Berlekamp-Massey algorithm”, Research Report, Faculty of Engineering, Cairo University, Giza, Egypt, May 2010.
[9] G. H. Norton, “The Berlekamp-Massey algorithm via minimal polynomials”, Research report, Department of Mathematics, University of Queensland, 2010.
[10] G. Eskander, R. Sabourin, and E. Granger, “A bio-cryptographic system based on offline signature images”, Information Sciences, vol. 259, pp. 170–191, 2014.
[11] M.-A. Velciu, A. Patrascu, and V.-V. Patriciu, “Bio-cryptographic authentication in cloud storage sharing”, Proceedings of 2014 IEEE 9th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 2014, pp. 165–170.