Please use this identifier to cite or link to this item: https://doi.org/10.1145/1128817.1128845
DC FieldValue
dc.titleFinding the original point set hidden among chaff
dc.contributor.authorChang, E.-C.
dc.contributor.authorShen, R.
dc.contributor.authorTeo, F.W.
dc.date.accessioned2013-07-04T07:57:25Z
dc.date.available2013-07-04T07:57:25Z
dc.date.issued2006
dc.identifier.citationChang, E.-C., Shen, R., Teo, F.W. (2006). Finding the original point set hidden among chaff. Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 2006 : 182-188. ScholarBank@NUS Repository. https://doi.org/10.1145/1128817.1128845
dc.identifier.isbn1595932720
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/40134
dc.description.abstractIn biometric identification, a fingerprint is typically represented as a sot- of minutiae which are 2D points. A niot-hod [4] to protect the fingerprint template hides the minutiae by adding random points (known as chaff) into the original point set. The chaff points are added one-by-one, constrained by the requirement that no two points are close to each other, until it is impossible to add more points or sufficient number of points have been added. Therefore, if the original template consists of s points, and the total number of chaff points and the original points is m, then a bruteforco attacker is oxpoct-ed to examine half of m chooses a possibilities to find the original. The chaff generated seem to be "random", especially if the; minutiae an; also randomly generated in the same manner. Indeed, the number of searches required by the brute-force attacker has been used to measure the security of the method. In this paper, we give an observation which leads to a way to distinguish the minutiae from the chaff. Extensive simulations show that our attacker can find the original better than brute-force search. For e.g. when s = 1 and the number of chaff points is expected to be about 31.3, our attacker on average takes about 100 searches. Our results highlight the need to adopt a mon; rigorous notion of security for template protection. We also give an empirical lower bound of the entropy loss due to the sketch. Copyright 2006 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1128817.1128845
dc.sourceScopus
dc.subjectBiometrie privacy protection
dc.subjectFingerprint template
dc.subjectOnline parking
dc.subjectSecure sketch
dc.typeConference Paper
dc.contributor.departmentCOMPUTATIONAL SCIENCE
dc.description.doi10.1145/1128817.1128845
dc.description.sourcetitleProceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
dc.description.volume2006
dc.description.page182-188
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.