Fingerprint Template Protection: From Theory to Practice

One of the potential vulnerabilities in a biometric system is the leakage of biometric template information, which may lead to serious security and privacy threats. Most of the available template protection techniques fail to meet all the desired requirements of a practical biometric system like revocability, security, privacy, and high matching accuracy. In particular, protecting the fingerprint templates has been a difficult problem due to large intra-user variations (e.g., rotation, translation, nonlinear deformation, and partial prints). There are two fundamental challenges in any fingerprint template protection scheme. First, we need to select an appropriate representation scheme that captures most of the discriminatory information, but is sufficiently invariant to changes in finger placement and can be secured using available template protection algorithms. Secondly, we need to automatically align or register the fingerprints obtained during enrollment and matching without using any information that could reveal the features, which uniquely characterize a fingerprint. This chapter analyzes how these two challenges are being addressed in practice and how the design choices affect the trade-off between the security and matching accuracy. Though much progress has been made over the last decade, we believe that fingerprint template protection algorithms are still not sufficiently robust to be incorporated into practical fingerprint recognition systems.

[1]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[2]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[3]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  A.K. Jain,et al.  A touch of money [biometric authentication systems] , 2006, IEEE Spectrum.

[5]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[6]  Anil K. Jain,et al.  FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.

[7]  Jianjiang Feng,et al.  Combining minutiae descriptors for fingerprint matching , 2008, Pattern Recognit..

[8]  Stark C. Draper,et al.  Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.

[9]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[10]  Craig I. Watson,et al.  Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .

[11]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[12]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[13]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[14]  Chun Chen,et al.  Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..

[15]  Phong Q. Nguyen,et al.  Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.

[16]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[17]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[18]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[19]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[20]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[21]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[22]  Natthawat Boonchaiseree,et al.  Focal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint , 2009, ICB.

[23]  Chun Chen,et al.  Binary Biometric Representation through Pairwise Polar Quantization , 2009, ICB.

[24]  H.V. Poor,et al.  Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[25]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[26]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[27]  Anthony Vetro,et al.  Privacy and security of features extracted from minutiae aggregates , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[28]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[30]  Raymond N. J. Veldhuis,et al.  Fingerprint Verification Using Spectral Minutiae Representations , 2009, IEEE Transactions on Information Forensics and Security.

[31]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[32]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[33]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition, Second Edition , 2009 .

[34]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[35]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[36]  B. Krauskopf,et al.  Proc of SPIE , 2003 .

[37]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[38]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[39]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[40]  Douglas L. T. Rohde,et al.  Methods for Binary Multidimensional Scaling , 2002, Neural Computation.

[41]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..

[42]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[43]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[44]  Anil K. Jain,et al.  Fingerprint Classification Using Orientation Field Flow Curves , 2004, ICVGIP.

[45]  Jukka Saarinen,et al.  Optimized singular point detection algorithm for fingerprint images , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[46]  T.E. Boult,et al.  Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.

[47]  Fuhui Long,et al.  Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[48]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[49]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[50]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[51]  Ee-Chien Chang,et al.  Robust Extraction of Secret Bits from Minutiae , 2007, ICB.

[52]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[53]  J. Jeffers,et al.  Fingerprint Alignment for A Minutiae-Based Fuzzy Vault , 2007, 2007 Biometrics Symposium.

[54]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[55]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[56]  Anthony Vetro,et al.  Alignment and bit extraction for secure fingerprint biometrics , 2010, Electronic Imaging.

[57]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[58]  Andrew Beng Jin Teoh,et al.  2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.

[59]  Josef Bigün,et al.  Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment , 2002, Biometric Authentication.

[60]  Alexandr Andoni,et al.  Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).