( Making templates compatible for template protection ) Biometric Feature-Type Transformation

IEEE SIGNAL PROCESSING MAGAZINE [77] SEPTEMBER 2015 B iometrics refers to physiological (i.e., face, fingerprint, hand geometry, etc.) and behavioral (i.e., speech, signature, keystroke, etc.) traits of a human identity. As these traits are unique to individuals, biometrics can be used to identify users reliably in many authentication applications, such as access control and e-commerce. Most biometric authentication systems offer great convenience without requiring the users to possess or remember any secret credentials. For applications that demand greater security, biometrics can be used in complement with passwords and security tokens to offer a multifactor authentication. Biometric measurement extracted from a user is subject to variations due to inconsistent environmental conditions or restrictiveness of the biometric representation used. The authentication decision of a biometric system is typically made upon how similar a sample is with reference to a template that is enrolled to the system at an earlier time. However, biometric templates used for similarity evaluation cannot be stored unprotected in the system because the consequences of biometric compromise is highly devastating. First, the stolen templates can be used to impersonate the corresponding users in the other applications. Second, biometrics is irrevocable and irreplaceable if it is compromised. A possible solution is to protect the biometric templates with a conventional encryption scheme such as the Rivest–Shamir–Adleman Digital Object Identifier 10.1109/MSP.2015.2423693

[1]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[2]  Chun Chen,et al.  Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..

[3]  Andrew Beng Jin Teoh,et al.  A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  Stark C. Draper,et al.  Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.

[5]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[6]  Raymond N. J. Veldhuis,et al.  Spectral minutiae: A fixed-length representation of a minutiae set , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[7]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[8]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[9]  Andrew Beng Jin Teoh,et al.  An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..

[10]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[11]  Alexandr Andoni,et al.  Beyond Locality-Sensitive Hashing , 2013, SODA.

[12]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[13]  Andrew Beng Jin Teoh,et al.  Dynamic Detection-Rate-Based Bit Allocation With Genuine Interval Concealment for Binary Biometric Representation , 2013, IEEE Transactions on Cybernetics.

[14]  Lu Tian,et al.  OSRI: A Rotationally Invariant Binary Descriptor , 2014, IEEE Transactions on Image Processing.

[15]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[16]  Andrew Beng Jin Teoh,et al.  Non-user-Specific Multivariate Biometric Discretization with Medoid-Based Segmentation , 2011, CCBR.

[17]  Julien Bringer,et al.  Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[18]  Vincent Lepetit,et al.  BRIEF: Computing a Local Binary Descriptor Very Fast , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Gary R. Bradski,et al.  ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.

[20]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[21]  Anthony Vetro,et al.  Privacy and security of features extracted from minutiae aggregates , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  David Zhang,et al.  Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.

[23]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[24]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[25]  Jiankun Hu,et al.  Generating cancelable biometrie templates using a projection line , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.

[26]  Chun Chen,et al.  Binary Biometric Representation through Pairwise Adaptive Phase Quantization , 2011, EURASIP J. Inf. Secur..

[27]  Julien Bringer,et al.  Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.

[28]  Pong C. Yuen,et al.  Fingerprint Geometric Hashing Based on Binary Minutiae Cylinder Codes , 2014, 2014 22nd International Conference on Pattern Recognition.

[29]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[30]  Kang Ryoung Park,et al.  A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[31]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[32]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[33]  Andrew Beng Jin Teoh,et al.  A secure biometric discretization scheme for face template protection , 2012, Future Gener. Comput. Syst..