A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template

Abstract Biometric technology is likely to provide a new level of security to various applications. Yet if the stored biometric template is compromised, invasion of user privacy is inevitable. Since biometric is irreplaceable and irrevocable, such an invasion implies a permanent loss of identity. In this paper, a fingerprint template protection technique is proposed to secure the fingerprint minutiae. Remarkably, by incorporating Randomized Graph-based Hamming Embedding (RGHE), the generated binary template can be strongly protected against inversion. The proposed method adopts a minutiae descriptor, dubbed as minutiae vicinity decomposition (MVD) to derive a set of randomized geometrical invariant features together with random projection. The discrimination of randomized MVD is then enhanced by User-specific Minutia Vicinities Collection scheme and embedded into a Hamming space by means of Graph-based Hamming Embedding. The resultant binary template enjoys four merits: (1) strong concealment of the minutia vicinity, thus effectively protects the location and orientation of minutiae. (2) Well preservation of the discriminability of MVD in the Hamming space with respect to the Euclidean space without accuracy performance degradation. (3) Template is revocable due to user-specific random projection. (4) Speedy matching attributed to bit-wise operations. Promising experimental results on FVC2002 database vindicate the feasibility of the proposed technique.

[1]  Venu Govindaraju,et al.  K-plet and Coupled BFS: A Graph Based Fingerprint Representation and Matching Algorithm , 2006, ICB.

[2]  Yong Wang,et al.  ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..

[3]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[4]  Davide Maltoni,et al.  Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Su Fei,et al.  Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.

[6]  Zhe Jin,et al.  A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.

[7]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[8]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[9]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[10]  Zhe Jin,et al.  A Revocable Fingerprint Template for Security and Privacy Preserving , 2010, KSII Trans. Internet Inf. Syst..

[11]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[12]  Julien Bringer,et al.  Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[13]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[14]  Svetlana Lazebnik,et al.  Locality-sensitive binary codes from shift-invariant kernels , 2009, NIPS.

[15]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[16]  Daesung Moon,et al.  Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .

[17]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[18]  Bian Yang,et al.  Parameterized geometric alignment for minutiae-based fingerprint template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[19]  Jiankun Hu,et al.  Attacks via record multiplicity on cancelable biometrics templates , 2014, Concurr. Comput. Pract. Exp..

[20]  Anil K. Jain,et al.  Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[21]  Anthony Vetro,et al.  Privacy and security of features extracted from minutiae aggregates , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[22]  Loris Nanni,et al.  Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .

[23]  Bart Preneel,et al.  Reversing protected minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[24]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[26]  Antonio Torralba,et al.  Spectral Hashing , 2008, NIPS.

[27]  Mikhail Belkin,et al.  Laplacian Eigenmaps for Dimensionality Reduction and Data Representation , 2003, Neural Computation.

[28]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[29]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[30]  Jiankun Hu,et al.  Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..

[31]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[32]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[33]  Davide Maltoni,et al.  Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Jiankun Hu,et al.  Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..

[35]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[36]  Zhe Jin,et al.  Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..

[37]  Chulhan Lee,et al.  Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..

[38]  Salil P. Vadhan,et al.  The Round Complexity of Two-Party Random Selection , 2008, SIAM J. Comput..

[39]  Pauli Kuosmanen,et al.  Fingerprint Matching Using an Orientation-Based Minutia Descriptor , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[40]  Zhe Jin,et al.  Fingerprint template protection with Minutia Vicinity Decomposition , 2011, 2011 International Joint Conference on Biometrics (IJCB).