Desain Metode Polar Fuzzy Vault untuk Proteksi Data Sidik Jari

Yohanes I. Riskajaya, Tohari Ahmad


Authentication concept using password or token has been used widely but still has weaknesses, because password or token can be easily forgotten or shared with other users. The use of biometric data as an authentication tool can be a solution to the problem. It is because biometric data is relatively permanent and unique, thus, the risk of losing or forgetting the password is reduced. Consequently, a protection method to secure the biometric data is needed. A number of studies have been done to secure the biometric data, ranging from classic encryption method to data transformation.
In this paper, a method is developed to create a cancelable fingerprint templates by combining pair-polar on the selection and matching with modified fuzzy vault on data transformation. The selection procecss is carried out in two stages. The first stage selects the reference minutiae points and its respective neighbors which close to the reference. A feature vector set is adopted from pair-polar method with an addition of the ridge type of the neighbors for later use in the matching process. The second stage generates a template, which is developed by implementing extended fuzzy vault with combining four regular fuzzy vault sets into one vault. This method gains the most optimum accuracy up to 99% of GAR and 0.03% of FAR. The use of ridge type in the matching process can reduce FAR from 1.03% to 0.03%, and the use of extended fuzzy vault can reduce FAR from 0.28% to 0.03%.


Fuzzy vault; keamanan data; keamanan informasi; sidik jari; proteksi data

Full Text:



N. K. Ratha, S. Chikkerur, J. H. Connell and R. M. Bolle, "Generating Cancelable Fingerprint Templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, 2007.

Y.-J. Chang, W. Zhung and T. Chen, "Biometrics-based cryptographic key generation," IEEE ICME, vol. 3, pp. 2203-2206, 2004.

K. Xi, J. Hu dan F. Han, "An Alignment Free Fingerprint Fuzzy Extractor using Near-equivalent Dual Layer Structure Check (NeDLSC) Algorithm," Proc. 6th ICIEA, Beijing, 2011.

U. Uludag, S. Pankanti and A. K. Jain, "Fuzzy vault for fingerprints," Lecture Notes in Computer Science, vol. 3546, pp. 310-319, 2005.

U. Uludag and A. Jain, "Securing Fingerprint Template: Fuzzy Vault with Helper Data," Proc. 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’06), 2006.

T. Ahmad dan F. Han, "Cartesian and Polar Transformation-based Cancelable Fingerprint Template," Proc. IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, Melbourne, 2011.

T. C. Clancy, N. Kiyavash and D. J. Lin, "Secure Smartcard Based Fingerprint Authentication," Proc. 2003 ACM SIGMM WBMA, Berkley, California, 2003.

T. Ahmad and J. Hu, "Generating cancelable biometric templates using a projection line," Proc. 11th ICARCV, Singapore, 2010.

Y. Sutcu, H. T. Sencar and N. Memon, "A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates," SPIE, vol. 6539, pp. 65390E-1-8, 2007.

K. Nandakumar, A. K. Jain and S. Pankanti, "Fingerprint-Based Fuzzy Vault: Implementation and Performance," Information Forensics and Security, vol. 2, no. 4, p. 744–757, 2007.

K. Xi and J. Hu, "Biometric Mobile Template Protection: A Composite Feature based Fingerprint Fuzzy Vault," Proc. ICC, Dresden, 2009.

T. Ahmad, J. Hu and S. Wang, "Pair-polar coordinate-based cancelable fingerprint templates," Pattern Recognition, vol. 44, no. 10-11, pp. 2555-2564, 2011.

Z. Jin, A. B. J. Teoh, T. S. Ong and C. Tee, "Fingerprint Template Protection with Minutiae-based Bit-string for Security and Privacy Preserving," Expert Systems with Applications, vol. 39, pp. 6157-6167, 2012.

M. V. Prasad and C. S. Kumar, "Fingerprint template protection using multiline neighboring relation," Expert Systems with Applications, vol. 41, no. 14, p. 6114–6122, 2014.

J. Bringer, H. Chabanne and M. Favre, "Fuzzy Vault for Multiple Users," Progress in Cryptology - AFRICACRYPT 2012, A. Mitrokotsa and S. Vaudenay, Eds., Springer Berlin Heidelberg, 2012, pp. 67-81.

Y. I. Riskajaya and T. Ahmad, "Pengembangan Metode Seleksi Titik Minutiae pada Sidik Jari dengan Radius Ketetanggaan," Jurnal Ilmiah Teknologi Informasi, vol. 13, no. 1, 2015.

Preston L. Bannister. (2009) "Extending the Pearson Hash Function to Larger Value,” . [Online],, tanggal akses: 20 Desember 2014.

(2002) BioLab - University of Bologna, "FVC2002 Fingerprint verification competition,". [Online],, tanggal akses: 14 Oktober 2014.



  • There are currently no refbacks.

Copyright (c) 2017 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)

JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)

Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305