Secure and Privacy Preserving Management of Biometric Templates

Privacyand security are one of the most important challenges in biometrics. We propose in this paper an architecture for the secure storage and verification of the biometric template. We propose to use at the same time a trusted architecture based on Global Platform and an algorithmic solution for providing a cancelable biometric template. We illustrate this new technique on fingerprints. In the experimental results, we put into obviousness the benefit of the proposed architecture.

[1]  Kevin Gillick The GlobalPlatform value proposition for biometric Match-on-Card verification , 2009 .

[2]  Christophe Rosenberger,et al.  Palm Vein Verification System Based on SIFT Matching , 2009, ICB.

[3]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[4]  Ramaswamy Palaniappan,et al.  Electroencephalogram Signals from Imagined Activities: A Novel Biometric Identifier for a Small Population , 2006, IDEAL.

[5]  Tran Huy Dat,et al.  Heart sound as a biometric , 2008, Pattern Recognit..

[6]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[7]  Keith Mayes,et al.  An overview of the GlobalPlatform smart card specification , 2003, Inf. Secur. Tech. Rep..

[8]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[9]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[10]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[11]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[12]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[13]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..