Biometric template protection using watermarking with hidden password encryption

For quite a few years the biometric recognition techniques have been developed. Here, we briefly review some of the known attacks that can be encountered by a biometric system and some corresponding protection techniques. We explicitly focus on threats designed to extract information about the original biometric data of an individual from the stored data as well as the entire authentication system. In order to address security and privacy concerns, we present a biometric authentication scheme that uses two separate biometric features combined by watermark embedding with hidden password encryption to obtain a non-unique identifier of the personage. Furthermore, to present the performance of the authentication system we provide experimental results. The transformed features and templates trek through insecure communication line like the Internet or intranet in the client-server environment. Our projected technique causes security against attacks and eavesdropping because the original biometric will not be exposed anywhere in the authentication system.

[1]  Colin Soutar Security Considerations for the Implementation of Biometric Systems , 2004 .

[2]  Chun-Shien Lu,et al.  Biometric Template Protection: A Key-Mixed Template Approach , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.

[3]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[4]  Minerva M. Yeung,et al.  Invisible watermarking for image verification , 1998, J. Electronic Imaging.

[5]  Anil K. Jain,et al.  FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.

[6]  David Zhang,et al.  Palmprint classification using principal lines , 2004, Pattern Recognit..

[7]  Colin Soutar Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..

[8]  Hans Georg Schaathun,et al.  On Watermarking/fingerprinting for Copyright Protection , 2022 .

[9]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[10]  Danilo Gligoroski,et al.  Generating highly nonlinear Boolean functions using a genetic algorithm , 2003, 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003..

[11]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[12]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[13]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.