Private chaotic biometric template protection algorithm

Biometric authentication systems have proven a priority over traditional systems like passwords. But while biometrics ensure uniqueness, they do not provide secrecy and security of the users data. Many attacks can be launched against biometric systems resulting in the reduction of these systems credibility. Specially, the attack on the biometric templates stored in the system database consists an attack on the integrity of these templates. In this paper we present the design and development of a new approach for biometric template protection based on the chaotic behavior of logistic map. The proposed biometric template protection algorithm satisfies the requirements of revocability, diversity and privacy. Moreover, experimental results conducted on several face databases show the ability of the proposed scheme to preserve the performance of the protected system.

[1]  Dietmar Saupe,et al.  Chaos and fractals - new frontiers of science , 1992 .

[2]  Lei Tian,et al.  Chaotic secure content-based hidden transmission of biometric templates , 2007 .

[3]  Tanveer J. Siddiqui,et al.  A Security Enhanced Robust Steganography Algorithm for Data Hiding , 2012 .

[4]  H. Schuster Deterministic chaos: An introduction , 1984 .

[5]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[6]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[7]  Andrew Beng Jin Teoh,et al.  2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.

[8]  Ying Tan,et al.  Laplacian smoothing transform for face recognition , 2010, Science China Information Sciences.

[9]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[10]  Ying Tan,et al.  Discriminant analysis via support vectors , 2010, Neurocomputing.

[11]  Shaogang Gong,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[12]  Thomas Beth,et al.  Timely Authentication in Distributed Systems , 1992, ESORICS.

[13]  Sanaa Ghouzali,et al.  Inter-communication classification for multi-view face recognition , 2014, Int. Arab J. Inf. Technol..

[14]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[15]  Jiashu Zhang,et al.  Investigation on Pseudorandom Properties of Chaotic Stream Ciphers , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[16]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[17]  Wang Xiaomin,et al.  Chaos-based biometrics template protection and secure authentication , 2011 .

[18]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[19]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.