Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1128817.1128845
DC Field | Value | |
---|---|---|
dc.title | Finding the original point set hidden among chaff | |
dc.contributor.author | Chang, E.-C. | |
dc.contributor.author | Shen, R. | |
dc.contributor.author | Teo, F.W. | |
dc.date.accessioned | 2013-07-04T07:57:25Z | |
dc.date.available | 2013-07-04T07:57:25Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Chang, E.-C., Shen, R., Teo, F.W. (2006). Finding the original point set hidden among chaff. Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 2006 : 182-188. ScholarBank@NUS Repository. https://doi.org/10.1145/1128817.1128845 | |
dc.identifier.isbn | 1595932720 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40134 | |
dc.description.abstract | In biometric identification, a fingerprint is typically represented as a sot- of minutiae which are 2D points. A niot-hod [4] to protect the fingerprint template hides the minutiae by adding random points (known as chaff) into the original point set. The chaff points are added one-by-one, constrained by the requirement that no two points are close to each other, until it is impossible to add more points or sufficient number of points have been added. Therefore, if the original template consists of s points, and the total number of chaff points and the original points is m, then a bruteforco attacker is oxpoct-ed to examine half of m chooses a possibilities to find the original. The chaff generated seem to be "random", especially if the; minutiae an; also randomly generated in the same manner. Indeed, the number of searches required by the brute-force attacker has been used to measure the security of the method. In this paper, we give an observation which leads to a way to distinguish the minutiae from the chaff. Extensive simulations show that our attacker can find the original better than brute-force search. For e.g. when s = 1 and the number of chaff points is expected to be about 31.3, our attacker on average takes about 100 searches. Our results highlight the need to adopt a mon; rigorous notion of security for template protection. We also give an empirical lower bound of the entropy loss due to the sketch. Copyright 2006 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1128817.1128845 | |
dc.source | Scopus | |
dc.subject | Biometrie privacy protection | |
dc.subject | Fingerprint template | |
dc.subject | Online parking | |
dc.subject | Secure sketch | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTATIONAL SCIENCE | |
dc.description.doi | 10.1145/1128817.1128845 | |
dc.description.sourcetitle | Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 | |
dc.description.volume | 2006 | |
dc.description.page | 182-188 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.