Secure biometric template protection via randomized dynamic quantization transformation

Fuzzy Commitment Scheme is one of the biometric encryption approaches for biometric template protection. The idea is to bind an identifier with a biometric template in binary format called difference vector during enrollment. Ideally, a difference vector is infeasible to recover either the biometric template or the identifier without any knowledge of the user's biometric data. Yet, this is only valid if the biometric template is uniformly random, but this is not the case in reality. In this paper, we propose a method known as randomized dynamic quantization transformation (RDQT) to binarize biometric data but still highly distinctive among the users and highly random. We demonstrate the implementation in the context of fingerprint biometrics. The experiment results and the security analysis in DB1 (FVC 2002) dataset suggest that the technique is feasible in practical usage.

[1]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[2]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[3]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[4]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[7]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[8]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[9]  Michael Purser Introduction to error-correcting codes , 1994 .

[10]  Evgeny Verbitskiy,et al.  RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .

[11]  Ann Cavoukian,et al.  Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security AND Privacy , 2007 .

[12]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[13]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[14]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[15]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[16]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..