The security of biometric data is a critical challenge in modern information security due to their uniqueness and non-revocability. Compromise of biometric characteristics leads to irreversible consequences; therefore, storing or transmitting them in plaintext is unacceptable. This paper addresses the confidentiality and integrity of fingerprint data using cryptographic protection methods. Considering the specific nature of biometrics, fingerprint features are used only to generate a cryptographic secret rather than being stored directly. To protect the derived secret, a modified threshold secret-sharing scheme based on non-positional polynomial notation and the Chinese Remainder Theorem is proposed. The method generates a cryptographic secret from fingerprint minutiae described by spatial coordinates and ridge orientation. Concatenating minutiae coordinates and converting them into binary form produces a unique value deterministically linked to a specific user. Compared to the classical Shamir scheme, the modified scheme reduces the computational complexity of secret reconstruction from O(n log2n) to O(k log k), decreases data storage requirements by 30–40% through compact polynomial remainders, and increases successful secret reconstruction by 12–15% in the presence of noise in biometric samples. The results show that the proposed algorithm can be effectively applied in biometric authentication systems to protect personal data in distributed environments. Security analysis confirms resistance to major attack classes and demonstrates practical applicability in real-world systems.
Building similarity graph...
Analyzing shared references across papers
Loading...
Saule Nyssanbayeva
Nursulu Kapalova
Saltanat Beisenova
Computers
Al-Farabi Kazakh National University
Institute of Information and Computational Technologies
Building similarity graph...
Analyzing shared references across papers
Loading...
Nyssanbayeva et al. (Tue,) studied this question.
www.synapsesocial.com/papers/69d8946e6c1944d70ce0566c — DOI: https://doi.org/10.3390/computers15040228
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: