Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities

With the emergence of biometric authentication systems, template protection for biometrics captured attention in the recent years. The privacy concern arises due to storage and misuse of biometric data in various applications. This chapter systematically reviews the published literature on Biometric Template Protection (BTP) during 2005–2016 and covers the methods described in more than hundred articles. It aims to present the current status of BTP schemes by a methodical analysis and taxonomy of BTP approaches, modalities, the fusion of modalities (multi-modal), and hybrid methods. It also presents research implications and extraction outcomes of Systematic Literature Review conducted on BTP schemes. This research work helps researchers and practitioners to find relevant information on BTP methods thereby reducing time and complexity in searching the appropriate studies.

[1]  Masakatsu Nishigaki,et al.  A Signature Scheme with a Fuzzy Private Key , 2015, ACNS.

[2]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[3]  Miguel Angel Murillo-Escobar,et al.  A robust embedded biometric authentication system based on fingerprint and chaotic encryption , 2015, Expert Syst. Appl..

[4]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[5]  Christoph Busch,et al.  Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..

[6]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[7]  Munaga V. N. K. Prasad,et al.  A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme , 2015, SIRS.

[8]  Juan J. Igarza,et al.  MCYT baseline corpus: a bimodal biometric database , 2003 .

[9]  Wang Yao,et al.  A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[10]  Julian Fiérrez,et al.  Variable-length template protection based on homomorphic encryption with application to signature biometrics , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).

[11]  Xiaoli Ma,et al.  Eigenvector-based initial ranging process for OFDMA uplink systems , 2015, EURASIP Journal on Advances in Signal Processing.

[12]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[13]  Andrew Beng Jin Teoh,et al.  Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault , 2015, Pattern Recognit..

[14]  Kannan Karthik,et al.  A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..

[15]  Christoph Busch,et al.  Preventing the cross-matching attack in Bloom filter-based cancelable biometrics , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).

[16]  Kar-Ann Toh,et al.  A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[17]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[18]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[19]  Jiankun Hu,et al.  A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Loris Nanni,et al.  Combining local, regional and global matchers for a template protected on-line signature verification system , 2010, Expert Syst. Appl..

[21]  Anoop M. Namboodiri,et al.  Secure hamming distance based biometric authentication , 2013, 2013 International Conference on Biometrics (ICB).

[22]  Andrew Beng Jin Teoh,et al.  Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion , 2014, Inf. Fusion.

[23]  Munaga V. N. K. Prasad,et al.  Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators , 2018, Pattern Analysis and Applications.

[24]  Raymond N. J. Veldhuis,et al.  Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources , 2012, IEEE Transactions on Information Forensics and Security.

[25]  Andrew Beng Jin Teoh,et al.  Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.

[26]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[27]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[28]  Jiankun Hu,et al.  A blind system identification approach to cancelable fingerprint templates , 2016, Pattern Recognit..

[29]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[30]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[31]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[32]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[33]  Andrew Beng Jin Teoh,et al.  Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.

[34]  Munaga V. N. K. Prasad,et al.  Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme , 2017, Int. J. Pattern Recognit. Artif. Intell..

[35]  Mou Ling Dennis Wong,et al.  Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics , 2013 .

[36]  Axel Munk,et al.  Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.

[37]  Andrew Beng Jin Teoh,et al.  Enhanced multi-line code for minutiae-based fingerprint template protection , 2013, Pattern Recognit. Lett..

[38]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[39]  Kenta Takahashi,et al.  Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[40]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[41]  Davide Maltoni,et al.  A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).

[42]  Rama Chellappa,et al.  Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.

[43]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[44]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[45]  Barbara Kitchenham,et al.  Procedures for Performing Systematic Reviews , 2004 .

[46]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[47]  Xuehu Yan,et al.  A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system , 2015, Signal Image Video Process..

[48]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[49]  Munaga V. N. K. Prasad,et al.  Cancelable Fingerprint Cryptosystem Based on Convolution Coding , 2015, SIRS.

[50]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[51]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[52]  Jan Camenisch,et al.  Efficient group signature schemes for large groups , 1997 .

[53]  Tao Li,et al.  Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.

[54]  Norimichi Tsumura,et al.  Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.

[55]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[56]  Chulhan Lee,et al.  Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..

[57]  Ming Li,et al.  A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.

[58]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[59]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[60]  N.K. Ratha,et al.  Generating Registration-free Cancelable Fingerprint Templates , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[61]  Yong Xiang,et al.  Protection of Privacy in Biometric Data , 2016, IEEE Access.

[62]  A. Uhl,et al.  An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[63]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[64]  KyungHee Lee,et al.  Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.

[65]  Kenta Takahashi,et al.  Optimal sequential fusion for multibiometric cryptosystems , 2016, Inf. Fusion.

[66]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[67]  Li Yuan Multimodal Cryptosystem Based on Fuzzy Commitment , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[68]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[69]  C. Raghavendra Rao,et al.  Minimum Spanning Tree (MST) Based Techniques for Generation of Cancelable Fingerprint Templates , 2014, Int. J. Pattern Recognit. Artif. Intell..

[70]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.

[71]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[72]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[73]  S. K. Singh,et al.  Improved and innovative key generation algorithms for biometric cryptosystems , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[74]  Munaga V. N. K. Prasad,et al.  k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection , 2015, 2015 International Conference on Biometrics (ICB).

[75]  Anthony Vetro,et al.  Secure distortion computation among untrusting parties using homomorphic encryption , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[76]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[77]  Andreas Uhl,et al.  Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.

[78]  Zhe Jin,et al.  A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template , 2014, Pattern Recognit. Lett..

[79]  Andreas Uhl,et al.  Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[80]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[81]  Jiankun Hu,et al.  An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures , 2014, Pattern Recognit..

[82]  Jiankun Hu,et al.  A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.

[83]  Yajun Ha,et al.  Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..

[84]  Ajay Kumar,et al.  A Cell-Array-Based Multibiometric Cryptosystem , 2016, IEEE Access.

[85]  Peng Li,et al.  An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..

[86]  Carlisle M. Adams,et al.  You are the key: Generating cryptographic keys from voice biometrics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[87]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[88]  Jiankun Hu,et al.  A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.

[89]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[90]  Munaga V. N. K. Prasad,et al.  Fingerprint template protection using multiline neighboring relation , 2014, Expert Syst. Appl..

[91]  Andrew Beng Jin Teoh,et al.  Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..

[92]  Andreas Uhl,et al.  Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.

[93]  Andreas Uhl,et al.  Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation , 2012, ICISP.

[94]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[95]  Norimichi Tsumura,et al.  BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..

[96]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[97]  Ke Xiong,et al.  A Hybrid Approach to Protect Palmprint Templates , 2014, TheScientificWorldJournal.

[98]  Andreas Uhl,et al.  Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[99]  Santanu Chaudhury,et al.  A Robust Online Signature Based Cryptosystem , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.

[100]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[101]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[102]  Vincenzo Piuri,et al.  Privacy-preserving fingercode authentication , 2010, MM&Sec '10.

[103]  Zhe Jin,et al.  Fingerprint template protection with Minutia Vicinity Decomposition , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[104]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[105]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[106]  Jian Zhao,et al.  Anonymous Biometric Access Control , 2009, EURASIP J. Inf. Secur..

[107]  Stan Z. Li,et al.  Near Infrared Face Based Biometric Key Binding , 2009, ICB.

[108]  Jiankun Hu,et al.  Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..

[109]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[110]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[111]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[112]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[113]  Sanaa Ghouzali,et al.  Fingerprint shell: Secure representation of fingerprint template , 2014, Pattern Recognit. Lett..

[114]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[115]  Rama Chellappa,et al.  Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[116]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[117]  Zhe Jin,et al.  Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation , 2016, Pattern Recognit..

[118]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[119]  Ke Xiong,et al.  Palmprint Based Multidimensional Fuzzy Vault Scheme , 2014, TheScientificWorldJournal.

[120]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[121]  Davide Maltoni,et al.  Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.

[122]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[123]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[124]  Sanaa Ghouzali,et al.  Spiral Cube for Biometric Template Protection , 2012, ICISP.

[125]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[126]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[127]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[128]  Eryun Liu,et al.  Minutiae and modified Biocode fusion for fingerprint-based key generation , 2010, J. Netw. Comput. Appl..

[129]  Anil K. Jain,et al.  On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[130]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[131]  Kang Ryoung Park,et al.  A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[132]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[133]  Yajun Ha,et al.  Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints , 2015, IET Biom..

[134]  Munaga V. N. K. Prasad,et al.  Fingerprint Template Protection Using Multiple Spiral Curves , 2016 .

[135]  C. Rathgeb,et al.  Statistical attack against fuzzy commitment scheme , 2012, IET Biom..

[136]  Andrew Beng Jin Teoh,et al.  Biometric cryptosystem based on discretized fingerprint texture descriptors , 2013, Expert Syst. Appl..

[137]  Andrew Beng Jin Teoh,et al.  Secure speech template protection in speaker verification system , 2010, Speech Commun..

[138]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[139]  Julien Bringer,et al.  Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).

[140]  Sanjeev Sofat,et al.  Fingerprint fuzzy vault using hadamard transformation , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[141]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[142]  Xudong Jiang,et al.  Generating secure cancelable fingerprint templates using local and global features , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[143]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[144]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[145]  Andrew Beng Jin Teoh,et al.  Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template , 2016, Pattern Recognit..

[146]  Norimichi Tsumura,et al.  On the Security of BioEncoding Based Cancelable Biometrics , 2011, IEICE Trans. Inf. Syst..

[147]  Arjan Kuijper,et al.  Retrieving secrets from iris fuzzy commitment , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[148]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[149]  Robert Sabourin,et al.  Improving Signature-Based Biometric Cryptosystems Using Cascaded Signature Verification-Fuzzy Vault (SV-FV) Approach , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.

[150]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[151]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[152]  Munaga V. N. K. Prasad,et al.  Generating cancellable fingerprint templates based on Delaunay triangle feature set construction , 2016, IET Biom..

[153]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[154]  W. Gareth J. Howells,et al.  Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.

[155]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[156]  Driss Aboutajdine,et al.  Vulnerabilities of fuzzy vault schemes using biometric data with traces , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[157]  Christoph Busch,et al.  Enhanced template protection with passwords for fingerprint recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[158]  Lifang Wu,et al.  A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.

[159]  Arjan Kuijper,et al.  Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[160]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[161]  Zhe Jin,et al.  A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.

[162]  Christoph Busch,et al.  Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features , 2015, 2015 International Conference of the Biometrics Special Interest Group (BIOSIG).

[163]  Andreas Uhl,et al.  Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.

[164]  Christoph Busch,et al.  Measuring privacy and security of iris fuzzy commitment , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).

[165]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[166]  Stark C. Draper,et al.  Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.

[167]  Robert Sabourin,et al.  Offline signature-based fuzzy vault: A review and new results , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[168]  Jiankun Hu,et al.  Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..

[169]  Jiankun Hu,et al.  Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures , 2013, CSS.

[170]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[171]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[172]  C. Busch,et al.  Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[173]  Cagatay Karabat,et al.  THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system , 2014, EURASIP Journal on Advances in Signal Processing.

[174]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).