Biometric template security: an overview

Purpose The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.

[1]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[2]  Stan Z. Li,et al.  Near Infrared Face Based Biometric Key Binding , 2009, ICB.

[3]  Takeshi Fujino,et al.  A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications , 2013, 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE).

[4]  Carmen Sánchez Ávila,et al.  Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2005, Pattern Recognit..

[5]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[6]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[7]  Marina Blanton,et al.  On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.

[8]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[9]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[10]  Ajay Kumar,et al.  A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.

[11]  I. R. Babu,et al.  Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[12]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[13]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[14]  Andreas Uhl,et al.  Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.

[15]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[16]  Kevin Beaver Hacking for Dummies , 2004 .

[17]  Václav Matyás,et al.  Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..

[18]  Jiankun Hu,et al.  An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.

[19]  Robert Sabourin,et al.  An adaptive classification system for video-based face recognition , 2012, Inf. Sci..

[20]  Jiankun Hu,et al.  A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[21]  Hengjian Li,et al.  Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..

[22]  Andreas Uhl,et al.  Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[23]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[24]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[25]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[26]  Andrew Beng Jin Teoh,et al.  Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..

[27]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[28]  Ralf Steinmetz,et al.  Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[29]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[30]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[31]  Andrew Beng Jin Teoh,et al.  Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[32]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[33]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[34]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[35]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[36]  B. Jayaram,et al.  Retinal Biometrics based Authentication and Key Exchange System , 2011 .

[37]  Kuldip K. Paliwal,et al.  Information fusion for robust speaker verification , 2001, INTERSPEECH.

[38]  Andrew Beng Jin Teoh,et al.  Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.

[39]  Yohei Hori,et al.  Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.

[40]  Tran Khanh Dang,et al.  Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol , 2015, 2015 International Conference on Advanced Computing and Applications (ACOMP).

[41]  Lucas Ballard,et al.  Evaluating the Security of Handwriting Biometrics , 2006 .

[42]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[43]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[44]  Berrin A. Yanikoglu,et al.  Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.

[45]  Srinivas Devadas,et al.  Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.

[46]  David Zhang,et al.  A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.

[47]  C. Rathgeb,et al.  Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.

[48]  David Zhang,et al.  Tongue shape classification by geometric features , 2010, Inf. Sci..

[49]  Nazatul Haque Sultan,et al.  PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor , 2015, 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).

[50]  Dongdai Lin,et al.  Optional multi-biometric cryptosystem based on fuzzy extractor , 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[51]  Lifang Wu,et al.  A Fuzzy Vault Scheme for Ordered Biometrics , 2011, J. Commun..

[52]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[53]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[54]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[55]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[56]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[57]  Kar-Ann Toh,et al.  Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[58]  Marina Blanton,et al.  Analysis of Reusability of Secure Sketches and Fuzzy Extractors , 2013, IEEE Transactions on Information Forensics and Security.

[59]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[60]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[61]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[62]  Arun Ross,et al.  Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[63]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[64]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[65]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[66]  Rama Chellappa,et al.  Identification of humans using gait , 2004, IEEE Transactions on Image Processing.

[67]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[68]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[69]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[70]  Robert Sabourin,et al.  A bio-cryptographic system based on offline signature images , 2014, Inf. Sci..

[71]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[72]  Václav Matyás,et al.  Biometric authentication - security and usability , 2002, Communications and Multimedia Security.

[73]  Jiankun Hu,et al.  A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.

[74]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[75]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[76]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[77]  Juergen Luettin,et al.  Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.