• DocumentCode
    2015078
  • Title

    Analysis of Tradeoffs among Verification Accuracy, Memory Consumption, and Execution Time in the GH-Based Fuzzy Fingerprint Vault

  • Author

    Lee, Sungju ; Moon, Daesung ; Choi, Woo Yong ; Chung, Yongwha

  • Author_Institution
    Dept. of Comput. & Inf. Sci., Korea Univ., South Korea
  • fYear
    2008
  • fDate
    13-15 Dec. 2008
  • Firstpage
    75
  • Lastpage
    78
  • Abstract
    The fuzzy fingerprint vault solution has been proposed as a way to protect the registered fingerprint template, and the geometric hashing solution has been applied to implement it. Although this Geometric Hashing-based fuzzy fingerprint vault solution can solve the auto-alignment problem and provide higher security, it requires more memory space due to the large size of the hash table. To solve this problem, we make the GH-based fuzzy fingerprint vault to be configurable, and study the tradeoffs among the verification accuracy, the memory consumption, and the execution time of it. The experimental results show that the configurable approach can either maximize the verification accuracy or minimize the memory consumption and/or the execution time by setting a performance parameter properly.
  • Keywords
    computational geometry; fingerprint identification; fuzzy set theory; image registration; security of data; storage management; autoalignment problem; execution time; geometric hashing-based fuzzy fingerprint vault verification; memory consumption; registered fingerprint template protection; security system; Authentication; Biometrics; Computer security; Equations; Fingerprint recognition; Information analysis; Information science; Information security; Polynomials; Protection; Crypto-Biometric; Fuzzy Fingerprint Vault; Geometric Hashing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 2008. SECTECH '08. International Conference on
  • Conference_Location
    Hainan Island
  • Print_ISBN
    978-0-7695-3486-2
  • Type

    conf

  • DOI
    10.1109/SecTech.2008.25
  • Filename
    4725348