A survey on biometric cryptosystems and cancelable biometrics

Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms for biometric-dependent key-release. In the last years a significant amount of approaches to both technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[3]  Huibin Wang,et al.  Authentication and Key Establishment Scheme Based on Token for Mobile Commerce , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[4]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Christoph Busch,et al.  A Reference Architecture for Biometric Template Protection based on Pseudo Identities , 2008, BIOSIG.

[6]  Pengfei Shi,et al.  PKI Key Generation Based on Iris Features , 2008, 2008 International Conference on Computer Science and Software Engineering.

[7]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[8]  Andrew Beng Jin Teoh,et al.  Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..

[9]  Berk Sunar,et al.  Differential template attacks on PUF enabled cryptographic devices , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[10]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[11]  A. Uhl,et al.  An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[12]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[13]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[14]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[15]  Andreas Uhl,et al.  Privacy Preserving Key Generation for Iris Biometrics , 2010, Communications and Multimedia Security.

[16]  Ajay Kumar,et al.  A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.

[17]  Ee-Chien Chang,et al.  Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.

[18]  Norimichi Tsumura,et al.  BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..

[19]  K. P. Soman,et al.  Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme , 2009 .

[20]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[21]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[22]  K. Srinathan,et al.  Efficient Biometric Verification in Encrypted Domain , 2009, ICB.

[23]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[24]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[26]  Vincenzo Piuri,et al.  Privacy-preserving fingercode authentication , 2010, MM&Sec '10.

[27]  Zhang Tao,et al.  Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[28]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[29]  A. Kannammal,et al.  A secure cryptosystem from palm vein biometrics , 2009, ICIS.

[30]  Randall K. Nichols ICSA guide to cryptography , 1998 .

[31]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[32]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[33]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[34]  Kar-Ann Toh,et al.  A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[35]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[36]  A. Arakala SECURE AND PRIVATE FINGERPRINT-BASED AUTHENTICATION , 2009, Bulletin of the Australian Mathematical Society.

[37]  Sergey Yekhanin,et al.  Secure Biometrics Via Syndromes , 2005 .

[38]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[39]  C. Rathgeb,et al.  Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.

[40]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[41]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[42]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[43]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[44]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[45]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[46]  Stefan Katzenbeisser,et al.  Signal Processing in the Encrypted Domain , 2007 .

[47]  Xiaomin Wang,et al.  Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .

[48]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[49]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[50]  Claus Vielhauer Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.

[51]  Andrew Beng Jin Teoh,et al.  Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.

[52]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[53]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[54]  Nasir D. Memon,et al.  Secure Sketch for Biometric Templates , 2006, ASIACRYPT.

[55]  Andreas Uhl,et al.  Iris-Biometric Hash Generation for Biometric Database Indexing , 2010, 2010 20th International Conference on Pattern Recognition.

[56]  Bernadette Dorizzi,et al.  Application of Biometrics to Obtain High Entropy Cryptographic Keys , 2009 .

[57]  David Zhang,et al.  Multiscale competitive code for efficient palmprint recognition , 2008, 2008 19th International Conference on Pattern Recognition.

[58]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[59]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[60]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[61]  Claus Vielhauer,et al.  Biometric hashing for handwriting: entropy-based feature selection and semantic fusion , 2008, Electronic Imaging.

[62]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[63]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[64]  Terrance E. Boult,et al.  Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.

[65]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[66]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[67]  Kenta Takahashi,et al.  Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[68]  David Zhang,et al.  A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.

[69]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[70]  Michael K. Reiter,et al.  The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.

[71]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[72]  K. Srinathan,et al.  Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[73]  Andrew Beng Jin Teoh,et al.  Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[74]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[75]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[76]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[77]  Kar-Ann Toh,et al.  Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[78]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[79]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[80]  Tsuhan Chen,et al.  Biometrics : Challenges arising from Theory to Practice , 2004 .

[81]  Jorge Guajardo,et al.  Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[82]  Mingwu Zhang,et al.  Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor , 2011, Int. J. Netw. Secur..

[83]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[84]  Frans M. J. Willems,et al.  Achieving Secure Fuzzy Commitment Scheme for Optical PUFs , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[85]  Andreas Uhl,et al.  Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.

[86]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[87]  Dongho Won,et al.  The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[88]  Kwok-Yan Lam,et al.  Key Management Using Biometrics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[89]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[90]  Alex Stoianov,et al.  Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .

[91]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[92]  Stark C. Draper,et al.  Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes , 2007 .

[93]  Zhang Weidong,et al.  Key Binding Based on Biometric Shielding Functions , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[94]  G. Padmavathi,et al.  Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .

[95]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[96]  Ee-Chien Chang,et al.  Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.

[97]  Andreas Uhl,et al.  Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[98]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[99]  Evgeny Verbitskiy,et al.  RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .

[100]  S. Kanade,et al.  Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[101]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[102]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.

[103]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[104]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[105]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[106]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[107]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[108]  Claus Vielhauer,et al.  Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.

[109]  Anton H. M. Akkermans,et al.  A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.

[110]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[111]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[112]  Kwok-Yan Lam,et al.  A Quick Algorithmfor Reduction of Attribute in Information Systems , 2007 .

[113]  Andrew Beng Jin Teoh,et al.  High security Iris verification system based on random secret integration , 2006, Comput. Vis. Image Underst..

[114]  Lucas Ballard,et al.  On the Requirements of Biometric Key Generators Technical Report TR-JHU-SPAR-BKMR-090707 , 2007 .

[115]  Arun Ross,et al.  Proceedings of SPIE- The International Society for Optical Engineering: Introduction , 2008 .

[116]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[117]  Albert Levi,et al.  Secret sharing using biometric traits , 2006, SPIE Defense + Commercial Sensing.

[118]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[119]  A. Stoianov,et al.  Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[120]  Pong C. Yuen,et al.  A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.

[121]  I. R. Babu,et al.  Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[122]  Colin Pattinson,et al.  A schema for cryptographic keys generation using hybrid biometrics , 2006 .

[123]  Sushil Jajodia,et al.  BIOMETRIC USER AUTHENTICATION FOR IT SECURITY From Fundamentals to Handwriting by Claus Vielhauer Universitdt , 2006 .

[124]  Julien Bringer,et al.  The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..

[125]  K. P. Soman,et al.  Towards generating irrevocable key for cryptography from cancelable fingerprints , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[126]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[127]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[128]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[129]  Raymond N. J. Veldhuis,et al.  Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[130]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[131]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[132]  Stelvio Cimato,et al.  Privacy in biometrics , 2009 .

[133]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[134]  Ee-Chien Chang,et al.  Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[135]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[136]  T.E. Boult,et al.  Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.

[137]  Sunil V. K. Gaddam,et al.  Efficient Cancelable Biometric Key Generation Scheme for Cryptography , 2010, Int. J. Netw. Secur..

[138]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[139]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.

[140]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[141]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[142]  Stan Z. Li,et al.  Near Infrared Face Based Biometric Key Binding , 2009, ICB.

[143]  Raymond N. J. Veldhuis,et al.  Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source , 2010, Defense + Commercial Sensing.

[144]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[145]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[146]  Christoph Busch,et al.  Renewable Minutiae Templates with Tunable Size and Security , 2010, 2010 20th International Conference on Pattern Recognition.

[147]  W. Gareth J. Howells,et al.  Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.

[148]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[149]  Ee-Chien Chang,et al.  Robust Extraction of Secret Bits from Minutiae , 2007, ICB.

[150]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[151]  Daesung Moon,et al.  Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .

[152]  Ingrid Verbauwhede,et al.  Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[153]  Hervé Sibert,et al.  Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.

[154]  Frans M. J. Willems,et al.  Identification and secret-key binding in binary-symmetric template-protected biometric systems , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[155]  Pieter H. Hartel,et al.  Constructing practical Fuzzy Extractors using QIM , 2007 .

[156]  Stelvio Cimato,et al.  A Multi-biometric Verification System for the Privacy Protection of Iris Templates , 2008, CISIS.

[157]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[158]  Andreas Uhl,et al.  Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.

[159]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[160]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[161]  Jeng-Shyang Pan,et al.  Information Hiding and Multimedia Signal Processing , 2008, J. Digit. Inf. Manag..

[162]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[163]  Nasir D. Memon,et al.  How to protect biometric templates , 2007, Electronic Imaging.

[164]  Yongdong Wu,et al.  Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[165]  Michael K. Reiter,et al.  Towards practical biometric key generation with randomized biometric templates , 2008, CCS.

[166]  Konstantinos N. Plataniotis,et al.  Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .

[167]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[168]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[169]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[170]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[171]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[172]  Anil K. Jain,et al.  Fuzzy Fingerprint Vault , 2004 .

[173]  Andreas Uhl,et al.  Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems , 2010, ICIAR.

[174]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[175]  Andrew Beng Jin Teoh,et al.  Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.

[176]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[177]  Nasir D. Memon,et al.  Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[178]  Ralf Steinmetz,et al.  Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..

[179]  Daniel P. Lopresti,et al.  Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.

[180]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..

[181]  Sokratis K. Katsikas,et al.  Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices , 2006, Int. J. Netw. Secur..

[182]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[183]  N. Lalithamani,et al.  An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates , 2009 .

[184]  David Zhang,et al.  An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[185]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[186]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[187]  Ali Miri,et al.  A collusion attack on the fuzzy vault scheme , 2009, ISC Int. J. Inf. Secur..

[188]  Berrin A. Yanikoglu,et al.  Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.

[189]  Dr.K. Duraiswamy,et al.  Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .

[190]  Julien Bringer,et al.  Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[191]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[192]  Colin Boyd,et al.  A Multiple-Control Fuzzy Vault , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[193]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[194]  A. Shanmugam,et al.  GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY , 2009 .

[195]  Venu Govindaraju,et al.  Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.

[196]  Andrew Beng Jin Teoh,et al.  Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..

[197]  Andreas Uhl,et al.  Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.

[198]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[199]  Paul A. Watters,et al.  A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).

[200]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[201]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[202]  Raymond N. J. Veldhuis,et al.  Binary Representations of Fingerprint Spectral Minutiae Features , 2010, 2010 20th International Conference on Pattern Recognition.

[203]  Boris Skoric,et al.  Key Extraction From General Nondiscrete Signals , 2010, IEEE Transactions on Information Forensics and Security.

[204]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[205]  Daesung Moon,et al.  Fuzzy fingerprint vault using multiple polynomials , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[206]  Norimichi Tsumura,et al.  Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.

[207]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[208]  Ying Luo,et al.  Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[209]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[210]  Raymond N. J. Veldhuis,et al.  Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[211]  Ferhaoui Chafia,et al.  A biometric crypto-system for authentication , 2010, 2010 International Conference on Machine and Web Intelligence.

[212]  Qiu-Liang Xu,et al.  An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[213]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[214]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[215]  J. van Leeuwen,et al.  Audio- and Video-Based Biometric Person Authentication , 2001, Lecture Notes in Computer Science.

[216]  Tieniu Tan,et al.  Robust Biometric Key Extraction Based on Iris Cryptosystem , 2009, ICB.

[217]  Gevorg Margarov,et al.  Biometrics Based Secret Sharing Using Fuzzy Vault , 2009 .

[218]  J. Bringer,et al.  Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[219]  Andrew Beng Jin Teoh,et al.  Secure speech template protection in speaker verification system , 2010, Speech Commun..

[220]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[221]  Edward J. Delp,et al.  Front Matter: Volume , 2008 .

[222]  Yonghong Peng,et al.  Effective features based on normal linear structures for detecting microcalcifications in mammograms , 2008, 2008 19th International Conference on Pattern Recognition.