Cancelable Biometrics: A review

Recent years have seen an exponential growth in the use of various biometric technologies for trusted automatic recognition of humans. With the rapid adaptation of biometric systems, there is a growing concern that biometric technologies may compromise the privacy and anonymity of individuals. Unlike credit cards and passwords, which can be revoked and reissued when compromised, biometrics are permanently associated with a user and cannot be replaced. To prevent the theft of biometric patterns, it is desirable to modify them through revocable and noninvertible transformations to produce cancelable biometric templates. In this article, we provide an overview of various cancelable biometric schemes for biometric template protection. We discuss the merits and drawbacks of available cancelable biometric systems and identify promising avenues of research in this rapidly evolving field.

[1]  Kannan Karthik,et al.  A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..

[2]  Shaogang Gong,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[3]  Christoph Busch,et al.  Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).

[4]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[5]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[6]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[7]  Arun Ross,et al.  Privacy of Facial Soft Biometrics: Suppressing Gender But Retaining Identity , 2014, ECCV Workshops.

[8]  Xin Yang,et al.  Generating registration-free cancelable fingerprint templates based on Minutia Cylinder-Code representation , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[9]  Sanjoy Dasgupta,et al.  An elementary proof of a theorem of Johnson and Lindenstrauss , 2003, Random Struct. Algorithms.

[10]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[11]  Shantanu Rane,et al.  Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.

[12]  PROCEssIng magazInE IEEE Signal Processing Magazine , 2004 .

[13]  Brent Waters,et al.  Reconstructing a fragmented face from a cryptographic identification protocol , 2013, 2013 IEEE Workshop on Applications of Computer Vision (WACV).

[14]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[15]  Arun Ross,et al.  On Mixing Fingerprints , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[17]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[18]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[19]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[20]  Jiankun Hu,et al.  Design of alignment-free cancelable fingerprint templates via curtailed circular convolution , 2014, Pattern Recognit..

[21]  Jan Camenisch,et al.  Efficient group signature schemes for large groups , 1997 .

[22]  Tao Li,et al.  Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.

[23]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[24]  Dimitris Achlioptas,et al.  Database-friendly random projections: Johnson-Lindenstrauss with binary coins , 2003, J. Comput. Syst. Sci..

[25]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[26]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[27]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[28]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[29]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[30]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[31]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[32]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Kiyoung Moon,et al.  Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[34]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[35]  Christophe Rosenberger,et al.  Texture based fingerprint BioHashing: Attacks and robustness , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[36]  Christoph Busch,et al.  On application of bloom filters to iris biometrics , 2014, IET Biom..

[37]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[38]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[39]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[40]  Ton Kalker,et al.  On the security of biohashing , 2010, Electronic Imaging.

[41]  B. V. K. Vijaya Kumar,et al.  Correlation Pattern Recognition , 2002 .

[42]  Alex ChiChung Kot,et al.  Fingerprint Combination for Privacy Protection , 2013, IEEE Transactions on Information Forensics and Security.

[43]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[44]  Jan Camenisch,et al.  Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.

[45]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[46]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[47]  Andrew Beng Jin Teoh,et al.  Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.

[48]  N.K. Ratha,et al.  Generating Registration-free Cancelable Fingerprint Templates , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[49]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[50]  Rama Chellappa,et al.  Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[51]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[52]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[53]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[54]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[55]  Daesung Moon,et al.  Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .

[56]  Nalini K. Ratha,et al.  Privacy Protection in High Security Biometrics Applications , 2010, ICEB.

[57]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[58]  Rajesh Kumar,et al.  Context-Aware Active Authentication Using Smartphone Accelerometer Measurements , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[59]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[60]  Kenta Takahashi,et al.  Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[61]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[62]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[63]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[64]  Stark C. Draper,et al.  Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[65]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[66]  Rama Chellappa,et al.  Touch Gesture-Based Active User Authentication Using Dictionaries , 2015, 2015 IEEE Winter Conference on Applications of Computer Vision.