Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks

[1]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[2]  Anton H. M. Akkermans,et al.  Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[3]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[4]  Alessandro Neri,et al.  Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system , 2011, 2011 IEEE International Systems Conference.

[5]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[6]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[7]  Nasir D. Memon,et al.  Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[8]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[9]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[10]  Michael K. Reiter,et al.  The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.

[11]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[12]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[13]  Loris Nanni,et al.  Combining local, regional and global matchers for a template protected on-line signature verification system , 2010, Expert Syst. Appl..

[14]  S. Kanade,et al.  Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[15]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[16]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[17]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[18]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[19]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[20]  Ann Cavoukian Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .

[21]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[22]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[23]  Ingrid Verbauwhede,et al.  Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[24]  Hervé Sibert,et al.  Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.

[25]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[26]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[27]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[28]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[29]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[30]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[31]  Mohamed Abid,et al.  Towards a secure E-passport protocol based on biometrics , 2009 .

[32]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[33]  P. Jonathon Phillips,et al.  Face Recognition Grand Challenge , 2004 .

[34]  H. Vincent Poor,et al.  Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case , 2011, IEEE Transactions on Information Forensics and Security.

[35]  Bernadette Dorizzi,et al.  Generating and sharing biometrics based session keys for secure cryptographic applications , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[36]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[37]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[38]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[39]  Sharath Pankanti,et al.  Error analysis of pattern recognition systems - the subsets bootstrap , 2004, Comput. Vis. Image Underst..

[40]  Ray A. Perlner,et al.  Electronic Authentication Guideline , 2014 .

[41]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[42]  Bernadette Dorizzi,et al.  Guide to Biometric Reference Systems and Performance Evaluation , 2009 .

[43]  Chun Chen,et al.  Biometric binary string generation with detection rate optimized bit allocation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[44]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[45]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[46]  Arun Ross,et al.  Image versus feature mosaicing: a case study in fingerprints , 2006, SPIE Defense + Commercial Sensing.

[47]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[48]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[49]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[50]  Qi Han,et al.  A Novel Template Protection Algorithm for Iris Recognition , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[51]  Ann Cavoukian,et al.  Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.

[52]  Irving S. Reed,et al.  Reed-Solomon Codes , 1999 .

[53]  Weiguo Sheng,et al.  Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.

[54]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[55]  Nalini K. Ratha,et al.  Physics-based revocable face recognition , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[56]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[57]  Alessandra Lumini,et al.  Can Fingerprints be Reconstructed from ISO Templates? , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[58]  Nalini K. Ratha,et al.  Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics , 2008, 2008 19th International Conference on Pattern Recognition.

[59]  Umut Uludag,et al.  Secure biometric systems , 2006 .

[60]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[61]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[62]  Stelvio Cimato,et al.  Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).

[63]  Berk Gökberk,et al.  "3D Face": Biometric Template Protection for 3D Face Recognition , 2007, ICB.

[64]  Huaxiong Wang,et al.  An On-Line Secure E-Passport Protocol , 2008, ISPEC.

[65]  C. Busch,et al.  Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[66]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[67]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[68]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[69]  Anil K. Jain,et al.  Fuzzy Fingerprint Vault , 2004 .

[70]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[71]  Joachim von zur Gathen,et al.  A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes , 2010 .

[72]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[73]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[74]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[75]  Arun Ross,et al.  Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.

[76]  Bernadette Dorizzi,et al.  Multi-biometrics based crypto-biometric session key generation and sharing protocol , 2011, MM&Sec '11.

[77]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[78]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[79]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[80]  Chun-I Fan,et al.  Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.

[81]  K. Srinathan,et al.  Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.

[82]  Pieter H. Hartel,et al.  Secure Ad-hoc Pairing with Biometrics: SAfE , 2007 .

[83]  Anton H. M. Akkermans,et al.  Face biometrics with renewable templates , 2006, Electronic Imaging.

[84]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[85]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[86]  Anil K. Jain,et al.  On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[87]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[88]  Christophe Rosenberger,et al.  A Study on the Convergence of FingerHashing and a Secured Biometric System , 2009, CIIA.

[89]  Arun Ross,et al.  An introduction to multibiometrics , 2007, 2007 15th European Signal Processing Conference.

[90]  Alvin F. Martin,et al.  The DET curve in assessment of detection task performance , 1997, EUROSPEECH.

[91]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[92]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[93]  Claude Barral Biometrics & [and] Security , 2010 .

[94]  S. Yang,et al.  Secure fuzzy vault based fingerprint verification system , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[95]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[96]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[97]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[98]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[99]  K. Srinathan,et al.  Efficient Biometric Verification in Encrypted Domain , 2009, ICB.

[100]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[101]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[102]  F. Hao,et al.  On using fuzzy data in security mechanisms , 2007 .

[103]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[104]  Julian Fiérrez,et al.  Dynamic signature verification with template protection using helper data , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[105]  Vincenzo Piuri,et al.  Privacy-preserving fingercode authentication , 2010, MM&Sec '10.

[106]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[107]  Patrizio Campisi,et al.  Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.

[108]  L. Hong,et al.  Can multibiometrics improve performance , 1999 .

[109]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[110]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[111]  Nasir D. Memon,et al.  Secure Sketch for Biometric Templates , 2006, ASIACRYPT.

[112]  Anil K. Jain,et al.  Multibiometric systems: fusion strategies and template security , 2008 .

[113]  Bernadette Dorizzi,et al.  Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.

[114]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[115]  A. Stoianov,et al.  Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[116]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[117]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[118]  Ee-Chien Chang,et al.  Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.

[119]  Kouichi Sakurai,et al.  A Proposal of One-Time Biometric Authentication , 2006, Security and Management.

[120]  Xuebing Zhou Template protection and its implementation in 3D face recognition systems , 2007, SPIE Defense + Commercial Sensing.

[121]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[122]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[123]  Julien Bringer,et al.  The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..

[124]  Patrick J. Flynn,et al.  Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[125]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[126]  John Daugman,et al.  How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.

[127]  Bernadette Dorizzi,et al.  Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[128]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[129]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[130]  Andrew Beng Jin Teoh,et al.  Remarks on BioHashing based cancelable biometrics in verification system , 2006, Neurocomputing.

[131]  Shigeo Tsujii,et al.  Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures , 2004, International Journal of Information Security.

[132]  Loris Nanni,et al.  Empirical tests on BioHashing , 2006, Neurocomputing.

[133]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[134]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[135]  Bruce A. Draper,et al.  The CSU Face Identification Evaluation System , 2005, Machine Vision and Applications.

[136]  Ee-Chien Chang,et al.  Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[137]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[138]  T.E. Boult,et al.  Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.

[139]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[140]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[141]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[142]  Elaine B. Barker,et al.  SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .

[143]  Alex Stoianov,et al.  Security of Error Correcting Code for biometric Encryption , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[144]  Andrew Beng Jin Teoh,et al.  Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..

[145]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[146]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[147]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[148]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[149]  Joachim M. Buhmann,et al.  Distortion Invariant Object Recognition in the Dynamic Link Architecture , 1993, IEEE Trans. Computers.

[150]  Jana Dittmann,et al.  Advanced Studies on Reproducibility of Biometric Hashes , 2008, BIOID.

[151]  Fei Su,et al.  A Biometric Key-Binding and Template Protection Framework Using Correlation Filters , 2009, ICB.

[152]  Terrance E. Boult,et al.  Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.

[153]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[154]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[155]  Benoit Geller,et al.  Blind estimation of timing and carrier frequency offsets in OFDM systems , 2007, 2009 17th European Signal Processing Conference.

[156]  Bo Fu,et al.  Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.

[157]  Ileana Buhan,et al.  Cryptographic keys from noisy data, theory and applications , 2008 .

[158]  Ying Luo,et al.  Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[159]  Michael G. Strintzis,et al.  A Channel Coding Approach for Human Authentication From Gait Sequences , 2009, IEEE Transactions on Information Forensics and Security.

[160]  Bernadette Dorizzi,et al.  Iris based authentication mechanism for e-Passports , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).

[161]  Qiang Tang,et al.  An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.

[162]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[163]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[164]  Christoph Busch,et al.  A Novel Privacy Enhancing Algorithm for Biometric System , 2008, BIOSIG.

[165]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[166]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[167]  Anne M. P. Canuto,et al.  Enhancing Performance of Cancellable Fingerprint Biometrics Using Classifier Ensembles , 2010, 2010 Eleventh Brazilian Symposium on Neural Networks.

[168]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[169]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[170]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[171]  Boris Skoric Security with Noisy Data - (Extended Abstract of Invited Talk) , 2010, Information Hiding.

[172]  S. Kanade,et al.  Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.

[173]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[174]  N.K. Ratha,et al.  Generating Registration-free Cancelable Fingerprint Templates , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.