DocumentCode :
594030
Title :
Biometric cryptosystems based Fuzzy Vault approach: Security analysis
Author :
Lafkih, M. ; Mikram, M. ; Ghouzali, Sanaa ; Haziti, M.E. ; Aboutajdine, Driss
Author_Institution :
LRIT, Mohammed V Univ., Rabat, Morocco
fYear :
2012
fDate :
18-20 Sept. 2012
Firstpage :
27
Lastpage :
32
Abstract :
Unlike traditional authentication based on passwords, biometric authentication is seen as an alternative solution because it offers facility, comfort and more security to users. However, biometric systems based on the storage of user model in a database are vulnerable to attacks because the stored model can be stolen or illegitimately used by an attacker to impersonate the user. To protect the users templates from attacks, two broad categories of methods are proposed in the literature: Transformation Biometric Characteristics, and Biometric Cryptosystems. Although biometric cryptosystems are used in several applications (e.g. smart cards), their major challenge is the lack of a security analysis and the limitation of the work on attacks against this type of methods. Hence the aim of this paper is to present criteria for security analysis and to demonstrate the vulnerability of Fuzzy Vault method; a famous approach in biometric cryptosystems.
Keywords :
authorisation; biometrics (access control); cryptography; fuzzy set theory; attack protection; biometric authentication; biometric cryptosystems; fuzzy vault method vulnerability; security analysis; transformation biometric characteristics; user model storage; user template protection; Authentication; Biometrics (access control); Correlation; Databases; Encryption; Biometric cryptosystems; Feature Transformation; Fuzzy Vault; Security Analysis; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovative Computing Technology (INTECH), 2012 Second International Conference on
Conference_Location :
Casablanca
Print_ISBN :
978-1-4673-2678-0
Type :
conf
DOI :
10.1109/INTECH.2012.6457803
Filename :
6457803
Link To Document :
بازگشت