Review of key-binding-based biometric data protection schemes

With the advent of modern technology, the use of biometric authentication systems has been on the rise. The core of any biometric system consists of a database which contains the biometric traits of the successfully enrolled users. As such, maintenance of the security of the database is paramount, i.e. it must be made sure that the contents of the database should not be compromised to foreign threats or adversaries. Biometric encryption (BE) is by far the most successfully studied and analysed technique used for providing this required level of security in biometric systems. In this survey, we discuss the intuition behind this idea and study in deep the key-binding-based mechanisms of BE which will provide a basic foundation for future novel researches in this area. In addition to the latest available survey, our paper investigates in details the core ideas behind the development of the fuzzy frameworks and includes the most recent works in the available literature. This study is concluded by inspecting the merging of multimodal biometrics with the fuzzy systems and discussing some open challenges in this domain.

[1]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[2]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[3]  M. Sabrigiriraj,et al.  Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem , 2015 .

[4]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Helen C. Shen,et al.  Personal authentication using hand images , 2006, Pattern Recognit. Lett..

[6]  Ann Cavoukian,et al.  Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy , 2008 .

[7]  Dwijendra K. Ray-Chaudhuri,et al.  Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.

[8]  Kenneth Stephenson,et al.  A circle packing algorithm , 2003, Comput. Geom..

[9]  Axel Munk,et al.  Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.

[10]  John Daugman How iris recognition works , 2004 .

[11]  Jianjiang Feng,et al.  Combining minutiae descriptors for fingerprint matching , 2008, Pattern Recognit..

[12]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[14]  Kang Ryoung Park,et al.  A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Yajun Ha,et al.  Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints , 2015, IET Biom..

[16]  Lifang Wu,et al.  A Fuzzy Vault Scheme for Ordered Biometrics , 2011, J. Commun..

[17]  Farid Benhammadi,et al.  Password hardened fuzzy vault for fingerprint authentication system , 2014, Image Vis. Comput..

[18]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[19]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[20]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[21]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[22]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[23]  Venkatesan Guruswami,et al.  Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.

[24]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[25]  Anil K. Jain,et al.  Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[27]  Robert Sabourin,et al.  A bio-cryptographic system based on offline signature images , 2014, Inf. Sci..

[28]  Anil K. Jain,et al.  Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[29]  Yajun Ha,et al.  Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..

[30]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[31]  Muhammad N. Marsono,et al.  Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..

[32]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[33]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.