Home | Issues | Profile | History | Submission | Review
Vol: 61(75) No: 1 / March 2016      

Using Error-correcting Codes to Speed Up the Fuzzy Vault Bio-cryptographic Scheme Biometric Decryption Process
Marius-Alexandru Velciu
Department of Computer Science, Military Technical Academy, Bucharest, Romania, e-mail: alexandruvelciu@gmail.com
Alecsandru Patrascu
Department of Computer Science, Military Technical Academy, Bucharest, Romania, e-mail: alecsandru.patrascu@gmail.com
Victor Valeriu Patriciu
Department of Computer Science, Military Technical Academy, Bucharest, Romania, e-mail: victorpatriciu@yahoo.com


Keywords: biometric encryption; fuzzy vault scheme; Lagrange interpolation; exhaustive polynomial reconstruction; Reed-Solomon error-correcting codes; Berlekamp-Massey algorithm

Abstract
Bio-cryptography represents a promising alternative for the usage of biometrics, as it does not require the storage of used biometric templates within the system. Despite the advantages conferred by this approach, there are some important drawbacks, too, when implementing bio-cryptographic algorithms, such as the high computational resources needed and the large amount of data generated and used during the biometric encryption process. This paper proposes the usage of Reed-Solomon error-correcting codes during the polynomial reconstruction stage of the Fuzzy Vault bio-cryptographic scheme biometric decryption process, aiming to evaluate the potential benefits conferred by this approach.

References
[1] K. Nandakumar, Anil K. Jain, and S. Pankanti, “Fingerprint-Based Fuzzy Vault: Implementation and Performance”, IEEE Transactions on Information Forensics and Secutiry, vol. 2, pp.744–757, December 2007.
[2] F. Hao, R. Anderson and J. Daughman, “Combining cryptography with biometrics effectively”, Technical Report Number 640 UCAM-CL-TR-640.
[3] Sim Hiew Moi, P. Saad and N. Abd Rahim, “Error correction on iris biometric template using Reed Solomon codes”, 2010 Fourth Asia Inernational Conference on Mathematical Modelling and Computer Simulation, May 2010.
[4] Marius-Alexandru Velciu and Victor-Valeriu Patriciu, “Methods of reducing bio-cryptographic algorithms computational complexity”, The 15th International Symposium on Computational Intelligence and Informatics (CINTI 2014), Budapest, 2014.
[5] Marius-Alexandru Velciu, Alecsandru Patrascu, and Victor-Valeriu Patriciu, “An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms”, 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatic (SACI), May 2015, Timisoara, Romania.
[6] A. Stoianov and A. Cavoukian, “Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy”, Toronto, 2007.
[7] Sood P., Kaur M., “Methods of automatic alignment of fingerprint in fuzzy vault”, Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1-4, Chandigarh, India, March 2014.
[8] Hazem Abd Elall Ahmed Elsaid, “Design and Implementation of Reed-Solomon Decoder using Decomposed Inversion less Berlekamp-Massey Algorithm”, Faculty of Engineering, Cairo University, Giza, Egypt, May 2010.
[9] G. H. Norton, “The Berlekamp-Massey Algorithm via Minimal Polynomials”, Department of Mathematics, University of Queensland, Australia, 2010.
[10] G. Eskander, R. Sabourin and E. Granger, “A bio-cryptographic system based on offline signature images”, Information Sciences, vol. 259, pp.170–191, 2014.
[11] Marius-Alexandru Velciu, Alecsandru Patrascu, and Victor-Valeriu Patriciu, “Bio-cryptographic authentication in cloud storage sharing”, 2014 IEEE 9th International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 165–170, May 2014, Timisoara, Romania.
[12] R.-E. Precup, R.-C. David, E. M. Petriu, S. Preitl, and M.-B. Radac, “Fuzzy logic-based adaptive gravitational search algorithm for optimal tuning of fuzzy controlled servo systems”, IET Control Theory Appl., vol. 7, no. 1, pp. 99–107, Jan. 2013.