Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification

As a consequence of the wide deployment of biometrics-based recognition systems, there are increasing concerns about the security of the sensitive information managed. Various techniques have been proposed in the literature for the biometric templates protection (BTP), having gained great popularity the crypto-biometric systems. In the present paper we propose the implementation of a Fuzzy Vault (FV) scheme based on fixed-length templates with application to dynamic signature verification (DSV), where only 15 global features of the signature are considered to form the templates. The performance of the proposed system is evaluated using three databases: a proprietary collection of signatures, and the publicly available databases MCYT and BioSecure. The experimental results show very similar verification performance compared to an equivalent unprotected system.

[1]  Julian Fiérrez,et al.  Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification , 2015, IEEE Access.

[2]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[3]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[4]  Julian Fiérrez,et al.  Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[5]  Somnath Dey,et al.  A fingerprint based crypto-biometric system for secure communication , 2018, J. Ambient Intell. Humaniz. Comput..

[6]  Raul Sanchez-Reillo,et al.  Forensic Validation of Biometrics Using Dynamic Handwritten Signatures , 2018, IEEE Access.

[7]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[8]  Julian Fiérrez,et al.  Variable-length template protection based on homomorphic encryption with application to signature biometrics , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).

[9]  Réjean Plamondon,et al.  Automatic Signature Verification: The State of the Art - 1989-1993 , 1994, Int. J. Pattern Recognit. Artif. Intell..

[10]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[11]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[12]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[13]  Berrin A. Yanikoglu,et al.  Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.

[14]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[15]  Ana Fred,et al.  A Behavioural Biometric System Based on Human Computer Interaction , 2004 .

[16]  Julien Bringer,et al.  Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.

[17]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[18]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[19]  Julian Fiérrez,et al.  Dynamic signature verification with template protection using helper data , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[20]  Enrique Argones-Rúa,et al.  Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Samiran Chattopadhyay,et al.  A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme , 2019, IEEE Access.

[22]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[23]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[24]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[25]  Samiran Chattopadhyay,et al.  Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment , 2018, IEEE Access.

[26]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[27]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[28]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption , 2013 .

[29]  Sargur N. Srihari,et al.  On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[30]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[31]  Anil K. Jain,et al.  Fingerprint Template Protection: From Theory to Practice , 2013, Security and Privacy in Biometrics.

[32]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[33]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[34]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[35]  Alejandro F. Frangi,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. , 2022 .

[36]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[37]  J. Fierrez-Aguilar,et al.  Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.

[38]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[39]  MARTA GOMEZ-BARRERO,et al.  Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection , 2017, IEEE Access.

[40]  Emilio Mordini,et al.  Second Generation Biometrics: The Ethical, Legal and Social Context , 2012 .

[41]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[42]  Juan J. Igarza,et al.  MCYT baseline corpus: a bimodal biometric database , 2003 .

[43]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[44]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[45]  Tero Kivinen,et al.  More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.

[46]  Judith Liu-Jimenez,et al.  Performance evaluation of handwritten signature recognition in mobile environments , 2014, IET Biom..