Privacy Enhancing Technologies in Biometrics

In the recent past we have witnessed the rapid spreading of biometric technologies for automatic people authentication, due to the several inherent advantages they offer over classic methods. Biometrics can be defined as the analysis of physiological or behavioral people characteristics for automatic recognition purposes. Biometric authentication relies on who a person is or what a person does, in contrast with traditional authentication approaches, based on what a person knows (password) or what a person has (e.g. ID card, token) (Jain, 2004), (Bolle, Connell, Pankanti, Ratha, & Senior, 2004). Being based on AbsTRACT

[1]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[2]  Stefan Katzenbeisser,et al.  Signal Processing in the Encrypted Domain , 2007 .

[3]  Andy Adler,et al.  Biometric System Security , 2008 .

[4]  Emilio Mordini,et al.  Biometrics, Human Body, and Medicine: A Controversial History , 2008 .

[5]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[6]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[7]  Mauro Barni,et al.  Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .

[8]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[9]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[11]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[12]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[13]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[14]  Chong Lee Ying,et al.  Probabilistic random projections and speaker verification , 2007 .

[15]  John D. Woodward The Law and the Use of Biometrics , 2008 .

[16]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[17]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Julian Fiérrez,et al.  Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures , 2007, ICB.

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[21]  Julian Fierrez,et al.  On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction , 2007 .

[22]  Jongsun Kim,et al.  Changeable Face Representations Suitable for Human Recognition , 2007, ICB.

[23]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[24]  Berk Gökberk,et al.  "3D Face": Biometric Template Protection for 3D Face Recognition , 2007, ICB.

[25]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[26]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[27]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[28]  Marcos Faundez-Zanuy Privacy Issues on Biometric Systems , 2005 .

[29]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[30]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[31]  Ralf Steinmetz,et al.  Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..

[32]  Pong C. Yuen,et al.  Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[33]  KyungHee Lee,et al.  Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.

[34]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[35]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[36]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[37]  J. Fierrez-Aguilar,et al.  Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.

[38]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[39]  Dimitrios Hatzinakos,et al.  Data hiding for multimodal biometric recognition , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[40]  Andrew Beng Jin Teoh,et al.  Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[41]  B. V. K. Vijaya Kumar,et al.  Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers , 2005, IS&T/SPIE Electronic Imaging.

[42]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[43]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[44]  Daniel Willem Elisabeth Schobben,et al.  Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.

[45]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[46]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[47]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[48]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[49]  Alessandro Neri,et al.  Adaptive and distributed cryptography for signature biometrics protection , 2007, Electronic Imaging.

[50]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[51]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[52]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[53]  Richa Singh,et al.  Digital watermarking based secure multimodal biometric system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[54]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[55]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[56]  Anil K. Jain,et al.  Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.

[57]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[58]  Alessandro Neri,et al.  Multi-level signature based biometric authentication using watermarking , 2007, SPIE Defense + Commercial Sensing.

[59]  Marcos Faundez-Zanuy Technological evaluation of two AFIS systems , 2005, IEEE Aerospace and Electronic Systems Magazine.

[60]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[61]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[62]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[63]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[64]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[65]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[66]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[67]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[68]  P. Campisi,et al.  Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques , 2007, 2007 Biometrics Symposium.