Biometric template protection using cancelable biometrics and visual cryptography techniques

Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual cryptography are two recent technologies introduced to address the concerns regarding privacy of biometric data, and to improve public confidence and acceptance of biometric systems. Cancelable biometrics is an important technique that allows generation of revocable biometric templates. As the number of biometric instances are limited and once compromised they are lost forever. Cancelable biometrics allows templates to be cancelled and revoked like passwords innumerable times. Recently, various approaches that utilize visual cryptography to secure the stored template and impart privacy to the central databases have been introduced. This work attempts to summarize the existing approaches in literature making use of these two technologies to protect biometric templates.

[1]  Kiyoung Moon,et al.  One-Time Templates for Face Authentication , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[2]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[3]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[4]  Yong Man Ro,et al.  Biometric authentication using augmented face and random projection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[5]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[6]  Andrew Beng Jin Teoh,et al.  Remarks on BioHash and its mathematical foundation , 2006, Inf. Process. Lett..

[7]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[8]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[9]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[10]  Rama Chellappa,et al.  Sparse representations and Random Projections for robust and cancelable biometrics , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.

[11]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[12]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[13]  W. Z. Gandhare,et al.  Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.

[14]  J. Fierrez-Aguilar,et al.  Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[15]  Arun Ross,et al.  Mixing fingerprints for generating virtual identities , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[16]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[17]  Andy Adler,et al.  Biometric System Security , 2008 .

[18]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[19]  P. Muhammed A Secured Approach to Visual Cryptographic Biometric Template , 2011 .

[20]  Christophe Rosenberger,et al.  Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[21]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Jiankun Hu,et al.  Attacks via record multiplicity on cancelable biometrics templates , 2014, Concurr. Comput. Pract. Exp..

[23]  P. Babu Anto,et al.  Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.

[24]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[25]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[26]  Hengjian Li,et al.  Chaos-Based Cancelable Palmprint Authentication System , 2012 .

[27]  Carsten Rust TURBINE: Trusted revocable biometric identities , 2009 .

[28]  Sunil V. K. Gaddam,et al.  Efficient Cancelable Biometric Key Generation Scheme for Cryptography , 2010, Int. J. Netw. Secur..

[29]  Arun Ross,et al.  Mixing fingerprints for template security and privacy , 2011, 2011 19th European Signal Processing Conference.

[30]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[31]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[32]  Xi Chen,et al.  Chaotic Random Projection for Cancelable Biometric Key Generation , 2012, IScIDE.

[33]  Daesung Moon,et al.  Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .

[34]  Arun Ross,et al.  Visual cryptography for face privacy , 2010, Defense + Commercial Sensing.

[35]  Christophe Rosenberger,et al.  Texture based fingerprint BioHashing: Attacks and robustness , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[36]  Shu-Hua Hsiao,et al.  The Association of Stock Index among the market of China, US., and Japan , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[37]  Yanxiong Li,et al.  A two -step hybrid approach for voiceprint-biometric template protection , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[38]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[39]  Kiyoung Moon,et al.  Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[40]  J. Bringer,et al.  Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[41]  Kar-Ann Toh,et al.  A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[42]  Christoph Busch,et al.  Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..

[43]  Claus Vielhauer,et al.  Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.

[44]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[45]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[46]  Quan Feng,et al.  Cancelable fingerprint fuzzy vault scheme: Cancelable fingerprint fuzzy vault scheme , 2008 .

[47]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[48]  N. Dey,et al.  BioHash code generation from electrocardiogram features , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[49]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[50]  K. P. Soman,et al.  An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[51]  V. Vaithiyanathan,et al.  Sheltered iris attestation by means of Visual Cryptography (SIA-VC) , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[52]  Su Fei,et al.  Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.

[53]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[54]  Loris Nanni,et al.  Empirical tests on BioHashing , 2006, Neurocomputing.

[55]  Loris Nanni,et al.  Cancellable Biometrics: Problems and Solutions for Improving Accuracy , 2010 .

[56]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[57]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[58]  Richard T. Watson,et al.  Teledemocracy in local government , 1999, CACM.

[59]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[60]  Venu Govindaraju,et al.  Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.

[61]  Andrew Beng Jin Teoh,et al.  Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..

[62]  Anand Sharma,et al.  Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[63]  Wen-Guey Tzeng,et al.  Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.

[64]  David Zhang,et al.  An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[65]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[66]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[67]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[68]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[69]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[70]  David Zhang,et al.  An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.

[71]  Pong C. Yuen,et al.  A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.

[72]  Arun Ross,et al.  Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.

[73]  Ee-Chien Chang,et al.  Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.

[74]  Wenhua Xu,et al.  Cancelable Voiceprint Template Based on Chaff-Points-Mixture Method , 2008, 2008 International Conference on Computational Intelligence and Security.

[75]  Anil K. Jain,et al.  On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[76]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[77]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[78]  Jiankun Hu,et al.  Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures , 2013, CSS.

[79]  Anne M. P. Canuto,et al.  Ensemble systems and cancellable transformations for multibiometric-based identification , 2014, IET Biom..

[80]  Chulhan Lee,et al.  Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..

[81]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[82]  L. Leng,et al.  Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[83]  Dacheng Xu,et al.  A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence , 2010, 2010 IEEE International Conference on Mechatronics and Automation.

[84]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[85]  Alessandro Neri,et al.  Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system , 2011, 2011 IEEE International Systems Conference.

[86]  N. Kiyavash,et al.  Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .

[87]  Rohit Nalavade,et al.  Biometric Data Security using Recursive Visual Cryptography , 2012 .

[88]  Ibrahim Sogukpinar,et al.  Classification Based Revocable Biometric Identity Code Generation , 2009, COST 2101/2102 Conference.

[89]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[90]  L. Latha,et al.  Efficient Approach for Retinal Biometric Template Security and Person Authentication using Noninvertible Constructions , 2013 .

[91]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[92]  Tao Li,et al.  Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.

[93]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[94]  Marina L. Gavrilova,et al.  Multimodal biometric approach for cancelable face template generation , 2012, Defense + Commercial Sensing.

[95]  Alessandro Neri,et al.  Cancellable Biometrics for On-line Signature Recognition , 2011 .

[96]  Julien Bringer,et al.  The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..

[97]  Bin-Chang Chieu,et al.  Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques , 2012, J. Electronic Imaging.

[98]  Kenta Takahashi,et al.  Parameter management schemes for cancelable biometrics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[99]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[100]  Christophe Rosenberger,et al.  Evaluation of Cancelable Biometric Systems: Application to Finger-Knuckle-Prints , 2011, 2011 International Conference on Hand-Based Biometrics.

[101]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[102]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[103]  Marina L. Gavrilova,et al.  A Novel Cross Folding Algorithm for Multimodal Cancelable Biometrics , 2012, Int. J. Softw. Sci. Comput. Intell..

[104]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[105]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[106]  Marina L. Gavrilova,et al.  Situation awareness of cancelable biometric system , 2013, The Visual Computer.

[107]  Takato Hirano,et al.  Homomorphic encryption based cancelable biometrics secure against replay and its related attack , 2012, 2012 International Symposium on Information Theory and its Applications.

[108]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[109]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[110]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.