An overview of protection of privacy in multibiometrics

Biometric authentication systems (BASs) have various advantages over traditional authentication systems such as password based systems. In BASs, information related to individuals’ physical and psychological characteristics is employed for authentication. The leakage of such information will breach individuals’ privacy severely. To simultaneously protect privacy and achieve higher authentication accuracy, privacy preserving multibiometric authentication systems (PPMASs) have been developed. This paper provides a comprehensive review of PPMASs. Specifically, we outline the requirements of PPMASs and discuss the state-of-the-art PPMASs. We also discuss PPMASs in the context of mobile and cloud based applications. Furthermore, we show the drawbacks of the existing PPMASs and point out the future research directions of PPMASs.

[1]  Adam Krzyżak,et al.  Methods of combining multiple classifiers and their applications to handwriting recognition , 1992, IEEE Trans. Syst. Man Cybern..

[2]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[3]  Ching Y. Suen,et al.  Application of majority voting to pattern recognition: an analysis of its behavior and performance , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[4]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[5]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[6]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[8]  Song Guo,et al.  Robust Histogram Shape-Based Method for Image Watermarking , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Riad I. Hammoud,et al.  Multi-Sensory Face Biometric Fusion (for Personal Identification) , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[10]  Hitoshi Kiya,et al.  Secure and robust identification based on fuzzy commitment scheme for JPEG images , 2016, 2016 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB).

[11]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[13]  Yajun Ha,et al.  Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..

[14]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[15]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[16]  Sharath Pankanti,et al.  Multi-modal biometrics for mobile authentication , 2014, IEEE International Joint Conference on Biometrics.

[17]  Sudeep D. Thepade,et al.  Novel multimodal identification technique using Iris & Palmprint traits with various matching score level proportions using BTC of bit plane slices , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[18]  Athman Bouguettaya,et al.  Implementation and Performance , 2011 .

[19]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[20]  Christoph Busch,et al.  Fusion of gait and fingerprint for user authentication on mobile devices , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).

[21]  Nasir D. Memon,et al.  Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[22]  Heikki Ailisto,et al.  Increasing Security of Mobile Devices by Decreasing User Effort in Verification , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[23]  Dimitrios Hatzinakos,et al.  BioHashing for Human Acoustic Signature Based on Random Projection , 2015, Canadian Journal of Electrical and Computer Engineering.

[24]  Pritee Khanna,et al.  Biometric template protection using cancelable biometrics and visual cryptography techniques , 2016, Multimedia Tools and Applications.

[25]  Dezhong Peng,et al.  Robust patchwork-based watermarking method for stereo audio signals , 2014, Multimedia Tools and Applications.

[26]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[27]  Anil K. Jain,et al.  A Principled Approach to Score Level Fusion in Multimodal Biometric Systems , 2005, AVBPA.

[28]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[29]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[30]  John J. Soraghan,et al.  Pulse Active Transform (PAT): A non-invertible transformation with application to ECG biometric authentication , 2014, 2014 IEEE REGION 10 SYMPOSIUM.

[31]  Song Guo,et al.  Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking , 2012, IEEE Transactions on Audio, Speech, and Language Processing.

[32]  Marina Blanton,et al.  Analysis of Reusability of Secure Sketches and Fuzzy Extractors , 2013, IEEE Transactions on Information Forensics and Security.

[33]  Luís Ducla Soares,et al.  Hand-based multimodal identification system with secure biometric template storage , 2012 .

[34]  Helen C. Shen,et al.  Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.

[35]  Andrew Beng Jin Teoh,et al.  Multi-instance finger vein recognition using minutiae matching , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[36]  Ching Y. Suen,et al.  Optimal combinations of pattern classifiers , 1995, Pattern Recognit. Lett..

[37]  Anil K. Jain,et al.  Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[38]  Jiankun Hu,et al.  A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.

[39]  Tae-Sun Choi,et al.  Rician noise removal from MR images using novel adapted selective non-local means filter , 2012, Multimedia Tools and Applications.

[40]  Richa Singh,et al.  Digital watermarking based secure multimodal biometric system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[41]  Gokhan Memik,et al.  Authentication Scheme of DRM System for Remote Users Based on Multimodal Biometrics, Watermarking and Smart Cards , 2009, 2009 WRI Global Congress on Intelligent Systems.

[42]  Xingzhao Liu,et al.  Nonlinear Frequency Scaling Algorithm for High Squint Spotlight SAR Data Processing , 2008, EURASIP J. Adv. Signal Process..

[43]  Panchami G. Rudrakshi,et al.  A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).

[44]  Benjamin Tams,et al.  Unlinkable minutiae-based fuzzy vault for multiple fingerprints , 2016, IET Biom..

[45]  Tran Khanh Dang,et al.  Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol , 2015, 2015 International Conference on Advanced Computing and Applications (ACOMP).

[46]  Ee-Chien Chang,et al.  Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[47]  Thirimachos Bourlai,et al.  Securing multimodal biometric data through watermarking and steganography , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[48]  Anil K. Jain,et al.  Hiding Fingerprint Minutiae in Images , 2002 .

[49]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[50]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[51]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[52]  Ujwalla Gawande,et al.  Novel cryptographic algorithm based fusion of multimodal biometrics authentication system , 2014, International Conference on Computing and Communication Technologies.

[53]  Qiang Li,et al.  A Secure Multimodal Biometric Verification Scheme , 2005, IWBRS.

[54]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[55]  Sandeep Kumar,et al.  Continuous Verification Using Multimodal Biometrics , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[56]  Sajeeda R. Inamdar,et al.  Fusion based Multimodal Biometric cryptosystem , 2015, 2015 International Conference on Industrial Instrumentation and Control (ICIC).