Auflistung nach Autor:in "Munk, Axel"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragThe fuzzy vault for fingerprints is vulnerable to brute force attack(BIOSIG 2009: biometrics and electronic signatures, 2009) Mihǎilescu, Preda; Munk, Axel; Tams, BenjaminThe fuzzy vault approach is one of the best studied and well accepted ideas for binding cryptographic security into biometric authentication. We present in this paper a brute force attack which improves on the one described by T. Charles Clancy et. al. in 2003 in an implementation of the vault for fingerprints. Based on this attack, we show that three implementations of the fingerprint vault are vulnerable and show that the vulnerability cannot be avoided by mere parameter selection in the actual frame of the protocol. We will report about our experiences with an implementation of such an attack. We also give several suggestions which can improve the fingerprint vault to become a cryptographically secure algorithm. In particular, we introduce the idea of fuzzy vault with quiz which draws upon information resources unused by the current version of the vault. This may bring important security improvements and can be adapted to the other biometric applications of the vault.
- KonferenzbeitragStatistical analyses of fingerprint growth(BIOSIG 2011 – Proceedings of the Biometrics Special Interest Group, 2011) Hotz, Thomas; Gottschlich, Carsten; Lorenz, Robert; Bernhardt, Stefanie; Hantschel, Michael; Munk, AxelWe study the effect of growth on the fingerprints of adolescents, based on which we suggest a simple method to adjust for growth when trying to retrieve an adolescent's fingerprint in a database years later. Here, we focus on the statistical analyses used to determine how fingerprints grow: Procrustes analysis allows us to establish that fingerprints grow isotropically, an appropriate mixed effects model shows that fingerprints essentially grow proportionally to body height. The resulting growth model is validated by showing that it brings points of interest as close as if both fingerprints were taken from an adult. Further details on this study, in particular results when applying our growth model in verification and identification tests, can be found in C. Gottschlich, T. Hotz, R. Lorenz, S. Bernhardt, M. Hantschel and A. Munk: Modeling the Growth of Fingerprints Improves Matching for Adolescents, IEEE Transations on Information Forensics and Security, 2011 (to appear).