Computational and Mathematical Methods in Medicine

Computational and Mathematical Methods in Medicine / 2015 / Article
Special Issue

Biomedical Signal Processing and Modeling Complexity of Living Systems 2014

View this Special Issue

Research Article | Open Access

Volume 2015 |Article ID 673867 | https://doi.org/10.1155/2015/673867

Yijun Yang, Jianping Yu, Peng Zhang, Shulan Wang, "A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication", Computational and Mathematical Methods in Medicine, vol. 2015, Article ID 673867, 10 pages, 2015. https://doi.org/10.1155/2015/673867

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

Academic Editor: Shengyong Chen
Received27 Jun 2014
Accepted24 Aug 2014
Published22 Mar 2015

Abstract

A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

1. Introduction

Biometric feature recognition is the technology using different biometric features or personal behaviors from an individual to identify one person. Comparing to other biometric features, fingerprint recognition technology has many advantages. It is common, stable, and precise and cannot be easily faked. The probability of finding two selfsame fingerprints is merely one in five billion. Therefore, it becomes the most widely applied technology in the biometric feature recognition field, and it makes life more convenient and secure. However, since the fingerprint recognition has been applied in many fields, more and more attackers have emerged and the security has been fiercely threatened. Furthermore, fingerprint will stay the same in all lifetime, which means, in case the fingerprint information has been revealed, it is no longer safe permanently. To assure the security of fingerprint recognition, fingerprint encryption technology has been developed.

There are some significant achievements on Fuzzy Vault in the past several years. In 2002, the conception of Fuzzy Vault was proposed by Juels and Sudan [1], who provide an effective private key combining algorithm. Then, the biometric encryption becomes a hot issue in the world. Based on that, Clancy et al. [2] bring up the conception of “fingerprint vault” although the hypothesis of its noise distribution may not be practicable. Uludag and Jain give the definition of Fuzzy Vault for fingerprint [3] and point out that the fingerprint vault in Clancy’s authentication algorithm will be affected if the image has been moved or rotated. They firstly use the helper data to verify the fingerprint.

All of these researches have not considered the security of fingerprint template itself. Subsequently, Nandakumar et al. [4] propose a Fuzzy Vault encryption algorithm based on password where the transformed fingerprint vault stores the transformed minutiae, not the original ones. The system is under double protection and the private key will not be revealed until the attackers have breached this double protection at the same time. Caixia and Lin [5] encrypt the minutiae with password. Their encryption algorithm is just to do simple exclusive-or calculation to the coordinate of each minutia, and then joint the transformed minutiae in series. However, the property of irreversibility has not been proved in their paper. Zhang et al. [6] propose a cancelable fingerprint Fuzzy Vault scheme and build an irreversible function based on password. Then, they use the transformed minutiae to compose the fingerprint vault. The principal part of the irreversible function is SHA256 which cannot guarantee the irreversibility. In order to decrease the FRR (false reject rate) and FAR (false accept rate), the time complexity is increased in all above-mentioned Fuzzy Vault scheme based on password.

This paper is organized as follows. Firstly, the minutiae are extracted from the thinned fingerprint image. In order to weaken the influence from noises, a threshold is set to remove the fake minutiae. Secondly, an irreversible function is designed to protect the security of fingerprint. At last, the Chinese remainder theorem (CRT) is used for both the private key binding and the private key recovering. Then, the cancelable fingerprint vault is encrypted in order to guarantee the security of private key and fingerprint vault in storage.

2. Preliminary

2.1. Fuzzy Vault

The Fuzzy Vault algorithm can be divided into two steps. Figures 1 and 2 show the encryption processing and decryption processing of Fuzzy Vault, respectively.

Encryption. is the private key. It is encrypted by user 1 with vault (short for fingerprint vault ). Firstly, is divided into average parts; each part becomes a coefficient of the polynomial. Use that polynomial to calculate and obtain the pair set . Then, a large amount of random noises are created (the number of noises is 10 times larger than the real minutiae); the real minutiae and noises are mixed up to compose vault .

Decryption. In order to obtain the private key that user 1 hides in vault , user 2 has to guarantee that set used to unlock vault has enough superposition with vault . Otherwise, it is quite difficult to rebuild the polynomial . Finally, the RS code is used for decreasing the noise.

2.2. The Hash Function

The hash function has been deployed as an important component in information security and cryptography. It takes a message less than bits and produces a hash value with fixed length. It can be defined as follows:

A good hash function should be irreversible and anticollision.

If a hash function is anti-strong collision, it is also irreversible. Assume that is a hash function and is the oracle which can obtain when the input is given. In other words, this oracle can break the property of irreversibility and can obtain another to the same input where . Since the input of hash function is random, a strong collision of is found when .

There are some common hash functions, such as MD, RIPEMD, and SHA. The SHA1 algorithm has been designed by NIST in 1995. It has been applied widely. The following is the process of SHA1.

Step 1. The input message should be padded and then processed in 512-bit blocks. Each block is divided into 16 parts of 32-bit length, and finally obtain 80 message words .

Step 2. Initialize the five 32-bit registers , , , , and as the temporary memorizer of the 160-bit output.

Step 3. There are 80 iterations in 4 rounds where each round has 20 iterations. The iteration of the th step in the th round can be described as denotes a left bit rotation by places, is the expanded message word of round , and is the round constant of round . is a nonlinear function which is different in 4 rounds.

Step 4. The 160-bit output of the last block becomes the input of the next block. After processing the last block, the registers , , , , and add their original value, respectively. Then, the 160-bit chaining variable is the final outcome of SHA1.

2.3. The Small Integer Solution Problem

Let be the security parameter. Define an integer , a matrix , and a real number . The solution of this problem is to find a nonzero integral vector , which makes .

2.4. The Problem

Let be the security parameter. The input of is a -dimension lattice with the basis of . If , the output is “YES.” If , the output is “NO.”

To any random polynomial function , if and , the security of is equivalent to the difficulty of .

2.5. CRT

CRT is one of the famous theorems in mathematics. It can be described as follows. Let . These positive integers are relatively prime to each other. For any big integer , it can be calculated as , where .

3. The Proposed Irreversible Fingerprint Encryption Scheme

In order to resist the multiple templates attack, a cancelable Fuzzy Vault scheme based on irreversible function has been proposed in this section. Firstly, the real minutiae are extracted from the registered fingerprint image, and then an irreversible function using different parameters has been designed. An improved SHA1 function has been proposed to transform the original minutiae. In the following section, the positive integers which are relatively prime to each other are created, and the CRT is used to combine the private key with the transformed fingerprint vault and finally the cancelable fingerprint vault is obtained.

3.1. The Improved Fingerprint Minutiae Extraction Algorithm
3.1.1. The Traditional Minutiae Extraction Algorithm

The minutiae extraction algorithm can mainly be divided into two different categories: extracting minutiae from the thinned fingerprint image or extracting minutiae from the original fingerprint image directly. Besides, [7] also provides a new image extracting method. The disadvantage of the first category is that it will create lots of fake minutiae and consume a lot of time. The disadvantage of the second category is that it has a poor performance on low-quality fingerprint image.

Since the low-quality images are very common, this paper extracts minutiae from the thinned fingerprint image. As shown in Figure 3, let be the object pixel, and then there are surrounding it. These eight points are defined as the eight adjacent pixels of .

Define

For any random pixel , if or , is the termination minutia of the ridge line. If or , is the bifurcation minutia of the ridge line.

3.1.2. The Removal of Fake Minutiae

The minutiae after extraction may contain many fake minutiae. In this paper, the fake minutiae can be removed after the minutiae extraction from the thinned fingerprint image. Defining a threshold , when the distance of any two minutiae is less than , these two minutiae should be removed as follows.(1)If the two minutiae are both termination minutiae and have almost the same orientation, these two fake minutiae are formed from short lines or gap.(2)If the two minutiae are both bifurcation minutiae, these two fake minutiae are formed from holes or conjoint lines.(3)If one minutia is a termination minutia and the other is a bifurcation minutia, these two fake minutiae are formed from burr.

All the above-mentioned fake minutiae have been shown in Figure 4.

As it is shown in Table 1, although the fake minutiae removal processing will remove a few real minutiae, it can remove almost the entire fake minutiae and thereby effectively decrease the FAR.


Minutiae detectedFake minutiaeLost minutiaeFARFRR

Based on thinned fingerprint image496662114.6%4.7%
After removing the fake minutiae4114440.9%9.8%

The noise can also be characterized by data processing which aims to extract useful information from mass data and eliminate redundancy. Li [8, 9] proposes a class of negatively fractal dimensional Gaussian random functions to eliminate the useless data. The properties of the generalized Cauchy distribution have been analyzed in his earlier paper [10]. Cattani et al. have built a low-complexity separable mathematical model, and then they discuss the efficiency in their paper [11]. The noise in fingerprint can be suppressed once its character is extracted.

3.2. The Irreversible Function
3.2.1. The Improved Hash Function

Here is an essential on the collapse to SHA1. As long as step function (4) can be denoted by a formula containing message word , the differential can always be eliminated gradually by modular differential method. In 2005, Professor Wang et al. [12] successfully found a local collision and consequently obtained the collision to SHA1 with less time complexity than the birthday attack. The local collision in the second round iteration of SHA1 can be shown as follows.

The step function of SHA1 in the second round is

Suppose there is no differential from the beginning to the th step of the second round. Then, in the th step of the second round, a 1-bit differential is brought in. The first bit of the register changes from 0 to 1 (or 1 changes to 0). According to formulae (4)–(8), it is obvious that there is merely differential in register . In registers , , , and , there will only be the evaluation or circularly left-shift calculation, which cannot create any differential. Formula (4) contains the message word ; therefore, can be denoted by

In this formula, the differential in the right side can be inferred from the last chaining variables. The attacker can modify the message word to eliminate the differential step by step. According to Table 2, the differential of step can be eliminated gradually in step .


Step

1
16
11
3131
3131
3131

In Table 2,    indicates the bits which the attacker modifies in .

The security has been fiercely threatened by above-mentioned local collision and therefore the SHA1 algorithm should be improved to resist this modular differential attack. Consequently, an anticollision SHA1 algorithm has been proposed. In this paper, formula (4) has been changed into

Formulae (5)~(8) remain unchanged. In formula (10), since there are two message words in , it becomes very difficult to denote by a formula. 17 (the circularly left-shift bit in formula (10)) is relatively prime to 5, 30 (the circularly left-shift bit in formulae (4) and (6)), and 32 (the length of chaining variables). In this condition, it becomes more difficult to eliminate the modular differential by modular differential attack. The iteration of improved SHA1 has been shown in Figure 5.

3.2.2. The Construction of Minutiae Irreversible Transforming Function

Suppose the minutiae set is , . and are the coordinate and orientation of the th real minutia, respectively. The value of minutiae can be set into an appropriate range according to different requirements. In this paper, the value of is restricted from 0 to 255 (let ).

Let be a random number, and let be a matrix. In this paper, the size of has been defined as . Firstly, calculate , where the hash function is the improved SHA1 algorithm described in Section 3.2.1. The length of is 160 bits. Then, create a three-dimensional array . Define the lowest bit of as bit 1, and is a 24-bit variable created from the first 24 bits of . The variables and are created from bits 25–48 and bits 49–72 of , respectively.

Afterwards, execute the following transforming to every minutia , , as follows:

The transformed set , , is treated as the new real minutiae set. Randomly choose , (different parameters can be chosen in other applications), and can be obtained using the improved SHA1. Then, , . Figures 6(b) and 6(d) are the contrary between the original minutiae and transformed minutiae from the same fingerprint image in Figure 6(a).

3.3. The Fingerprint Encryption Algorithm

positive integers which are relatively prime to each other are chosen in the encryption processing. During the decryption processing, CRT is used to obtain the private key from the pair set . Assuming that the transformed minutiae of Section 3.2 are , the combination of in series is defined as , whose length is 24 bits.

3.3.1. The Private Key Combining

Assume that the private key is . Let be positive integers which are relatively prime to each other. One has .

Define . is called a recovering pair. Take as coefficients to obtain the polynomial and use the pair to form the real minutiae set . is the number of real minutiae.

Choose the noise pair and make sure . Then, obtain the fake minutiae set . is the sum of fake minutiae and real minutiae. Then, define the vault set as .

3.3.2. Private Key Recovering

Compare the fingerprint minutiae after being transformed in Section 3.2 with minutiae in vault . If there are coincident minutiae between these two sets, then these minutiae should be put into the unlocking set . If there are over minutiae in , the legal user can rebuild the polynomial and then use CRT to recover through the recovering pair .

4. Experimental Analyses

This chapter has discussed the efficiency and the security of irreversible transforming and the security of fingerprint encryption algorithm.

4.1. The Efficiency Analysis of Improved SHA1

In the improved SHA1, the complexity has been slightly increased because of the extra circularly left-shift and additional calculation. In a computer with Intel (R) Pentium (R) D CPU 3.0 GHz and RAM 512 M, the hash value is calculated for the same character string “iscbupt” with two different hash functions. The running time of improved SHA1 and original SHA1 has been shown in Figure 7(a).

The running time is different when we use different inputs. According to Figure 7(b), the running time of SHA1 increases linearly when the file size is increased. Comparing to the original SHA1, the running time of improved SHA1 has been increased by nearly 8%.

4.2. Security Analysis of Irreversible Transforming

Reference [13] indicates that properties of irreversible transforming are required as follows.

Irreversibility: if the attacker has no idea of the transforming function and the parameters, he cannot recover the original fingerprint vault from the transformed fingerprint vault. The differential in the original SHA1 can be transferred to the highest bit and then be eliminated in some certain steps. Therefore, a collision is found. Relatively, step function (9) in improved SHA1 has two message words . According to Table 4, there are two different circularly left-shift calculations which makes it difficult to move the differential to the highest bit and therefore eliminate the differential. Even if the attacker can eliminate 1-bit differential, it will create a 2-bit new differential. If the differential has not been eliminated in time, the formula containing will become more complex and make the attacker even harder to find a collision (Table 3).


(160 bits)

16073724948252421

(24 bits) (24 bits) (24 bits)


StepA B C D E

28
Blank1
Blank2

In this paper, , .

In addition, since the irreversible function contains module calculation, the data has been transformed from the domain to a smaller domain . This reflection from a domain to a smaller domain can increase the uncertainty. It seems that the irreversible function proposed by this paper has great irreversibility. The security proof has been shown as follows.

According to Section 2.2, the most important property of a hash function is anti-strong collision. In other words, if the hash function possesses the property of anti-strong collision, it also possesses the property of irreversibility.

Let , , and ; is a random matrix with the size of , and . If there is an algorithm which can find two different vectors , which make , then there must be an algorithm which can solve all cases in .

These two different vectors make . Then, . The definition of matrix can be described as

Let . Since is random and the coordinate of is between , is a solution to . According to Section 2.4, this solution can solve all cases in . However, there is no such algorithm at present and the irreversible function proposed by this paper is antistrong collision.

Local smoothness: in order to decrease the FRR, the transformation should guarantee that a small change in the original fingerprint image will also cause a small change in the transformed fingerprint image. Fingerprint recognition is a fuzzy technique. Due to the influence from moving, sweat, different finger pressure, orientation difference and noise, and so forth, there are different for the extracting results in every two different experiments from the same fingerprint. However, as cryptology is an accurate technique, a tiny error can lead to the failure of decryption. How to combine the accuracy of cryptology with the fuzzy property of fingerprint recognition becomes more and more important. A relatively small threshold is required. The two minutiae can be matched if the difference between the registered minutiae and the authentication minutiae is smaller than this threshold. This matching method is called the tolerance box matching algorithm.

The value of is fatal to the local smoothness property. Let the maximum element of be . Figures 8(a) and 8(b) show the comparison among the four fingerprint templates from three different authentication experiments (there will be difference among the authentication processing) and the registered fingerprint template when their have different values. Figures 8(b) and 8(d) show the distance between minutiae and the orientation difference from transformed and original templates. According to Figure 8, if , the three fingerprint templates transformed from the same fingerprint in three different experiments are almost coincident with each other. The distance between minutiae of these three templates and the registered template is less than 8 pixels, and the orientation difference is less than 5°. If , the distance between minutiae of these three templates and the registered template is less than 14 pixels, and the orientation difference is less than 9°. According to Table 5, with the increasing of , the distance between minutiae and the orientation difference will be increased linearly. Let ; then, the average distance of minutiae between two templates is no more than 5.4 pixels, which is less than the box matcher threshold (8 pixels). This can ensure that the legal user can pass the authentication processing using the tolerance box matching algorithm.



The average distance between minutiae (pixel)3.55.47.69.511.9
The average orientation difference between minutiae (degree)1.62.55.34.75.8

Transformation: the transformed minutiae must be outside the matcher tolerance box and cannot be matched with the original minutiae. According to Figures 6(d) and 9, the transformed minutiae are totally different from the original ones. The distance is far farther than 8 pixels. And it is hard to find the relativity of these two templates. Therefore, the irreversible function proposed by this paper can satisfy this principle.

Distinctiveness: it cannot be matched to each other for the different transformed templates from the same original fingerprint template applied in different systems. Otherwise, the system will suffer from multiple templates attack. According to Figures 10 and 11, if the same matrix and yet different random number have been used in the transformation, the coordinate of fingerprint minutiae transformed fingerprint templates has great distinctiveness characteristic. However, the orientation still has certain relativity. When different matrix and different random number have been used, not only the coordinate but also the orientation information will have great distinctiveness property.

To sum up, even if the attackers have obtained the right “minutiae” from the transformed fingerprint template, they cannot use the transformed minutiae to recover the original fingerprint template since the system has the distinctiveness and irreversibility properties. After transformation, the fingerprint minutiae are no longer related to the original minutiae, and the system can resist the multiple templates attack. In addition, the fingerprint templates are cancelable when the system is under attack. A new template can be rebuilt through creating new parameters (random number and matrix ).

4.3. Security Analysis of Encryption Algorithm

The international standard fingerprint database FVC2002 has been chosen to verify the efficiency of the scheme proposed in this paper. The fingerprint images have been put in the same orientation before the experiment in order to decrease the influence from the image moving and other noises. This section mainly focuses on discussing the performance of the transformed function.

Choose the parameter , . The maximum power in polynomial is decided by the length of the private key if the length of is fixed and the matching number of minutiae is determined too. Users have to use the recovering pair to obtain . An illegal user does not know . In order to obtain , he has to use the exhaustive method. On the other hand, it is impossible to find the real minutiae in the fingerprint vault through the exhaustive method. The number of noise points is ten times than the real minutiae (200 : 20) in this experiment. The probability that the private key can be recovered from the exhaustive method is . In order to obtain the private , the user has to unlock the fingerprint vault through providing the legal fingerprint.

The comparison between [6] and this paper is listed in Table 6. The database of both [6] and this paper is the fingerprints in FVC2002 DB2.


Time of
verification
The security
hypothesis
GARFARGARFARGARFAR

[6]42 msSHA25696.500.3093.570.1090.050
This paper20 ms95.880.1493.350.0289.610

According to Table 6, this paper costs less time during verifying process. Its security is based on the well-known problem. At present, there is no effective algorithm to solve this problem. The GAR (genuine accept rate) of this paper is close to [6], and the FAR is much better than [6]. With the increasing of , it becomes harder to get successful authentication. In this case, both GAR and FAR will decrease simultaneously.

5. Conclusions

In this paper, an irreversible function has been proposed to protect the original fingerprint template, and the CRT is used for combining the private key with the transformed fingerprint vault. Even if the system is under attack, the irreversible function can also guarantee the security of the original fingerprint after the transformed fingerprint vault was filched. The security analysis shows that the fingerprint encryption system proposed by this paper has better efficiency and security, and the complexity is only slightly increased.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work was supported by the National Nature Science Foundation of China under Grants 61171072, 61170283, and 61001058, National High-Technology Research and Development Program (“863” Program) of China under Grant 2013AA01A212, Ministry of Education in the New Century Excellent Talents Support Program under Grant NCET-12-0649, and Shenzhen Technology Plan under Grants JCYJ20120613102750045 and JCYJ20120615100614529.

References

  1. A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proceedings of the IEEE International Symposium on Information Theory, p. 408, July 2002. View at: Google Scholar
  2. T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure smartcard-based fingerprint authentication,” in Proceedings of the ACM SIGMM Workshop on Biometrics Methods and Applications (WBMA '03), pp. 45–52, New York, NY, USA, 2003. View at: Google Scholar
  3. U. Uludag and A. Jain, “Securing fingerprint template: fuzzy vault with helper data,” in Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '06), pp. 163–169, Washington, DC, USA, June 2006. View at: Publisher Site | Google Scholar
  4. K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744–757, 2007. View at: Publisher Site | Google Scholar
  5. Q. Caixia and Y. Lin, “Encrypted fuzzy vault based on password,” Bulletin of Science and Technology, vol. 27, no. 2, pp. 282–287, 2011. View at: Google Scholar
  6. R. Zhang, E. Liu, H. Zhao, and L. Pang, “Improved cancelable fingerprint fuzzy vault system,” Journal of Xidian University, vol. 38, no. 4, pp. 173–180, 2011. View at: Publisher Site | Google Scholar
  7. C. Cattani and G. Pierro, “On the fractal geometry of DNA by the binary image analysis,” Bulletin of Mathematical Biology, vol. 75, no. 9, pp. 1544–1570, 2013. View at: Publisher Site | Google Scholar | MathSciNet
  8. M. Li, “A class of negatively fractal dimensional Gaussian random functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 291028, 18 pages, 2011. View at: Publisher Site | Google Scholar | MathSciNet
  9. M. Li, “Power spectrum of generalized fractional Gaussian noise,” Advances in Mathematical Physics, vol. 2013, Article ID 315979, 3 pages, 2013. View at: Publisher Site | Google Scholar | MathSciNet
  10. M. Li and S. C. Lim, “Power spectrum of generalized Cauchy process,” Telecommunication Systems, vol. 43, no. 3-4, pp. 219–222, 2010. View at: Publisher Site | Google Scholar
  11. C. Cattani, A. Ciancio, and B. Lods, “On a mathematical model of immune competition,” Applied Mathematics Letters, vol. 19, no. 7, pp. 678–683, 2006. View at: Publisher Site | Google Scholar | MathSciNet
  12. X. Wang, Y. L. Yin, and H. Yu, “Finding collisions in the full SHA-1,” in Advances in Cryptology—CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 17–36, Springer, Berlin, Germany, 2005. View at: Publisher Site | Google Scholar | MathSciNet
  13. N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007. View at: Publisher Site | Google Scholar

Copyright © 2015 Yijun Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views3216
Downloads547
Citations

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.