Operational bio-hash to preserve privacy of fingerprint minutiae templates

The storage of fingerprints is an important issue as this biometric modality is more and more deployed for real applications. Considering minutiae templates as sensitive information, a key question concerns the secure and privacy management of this digital identity. Indeed, if an attacker obtains the minutiae template of a subject, he/she will be able to generate a fingerprint having the same characteristics. Instead of directly storing the minutiae templates, the authors propose in this study a new adaptation of BioHashing to generate a cancellable template in the context of un-ordered set of noisy minutiae features. To the authors knowledge, little interest has been paid in the literature to the question of protecting minutiae template by BioHashing until now. Using the FVC2002 benchmark database, they show the effectiveness of the proposed approach in term of privacy preservation. They show how the proposed method copes with irreversibility and diversity properties and therefore can be efficient in a realistic context.

[1]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[2]  Andrew Beng Jin Teoh,et al.  Remarks on BioHash and its mathematical foundation , 2006, Inf. Process. Lett..

[3]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[4]  Nalini K. Ratha,et al.  Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[5]  Loris Nanni,et al.  Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .

[6]  Loris Nanni,et al.  Local binary patterns for a hybrid fingerprint matcher , 2008, Pattern Recognit..

[7]  S. Karthikeyan,et al.  AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH , 2011 .

[8]  Chulhan Lee,et al.  Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..

[9]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[10]  Venu Govindaraju,et al.  Combination of Symmetric Hash Functions for Secure Fingerprint Matching , 2010, 2010 20th International Conference on Pattern Recognition.

[11]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[12]  Venu Govindaraju,et al.  K-plet and Coupled BFS: A Graph Based Fingerprint Representation and Matching Algorithm , 2006, ICB.

[13]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[14]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[15]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[16]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[18]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[19]  Samuel Kaski,et al.  Dimensionality reduction by random mapping: fast similarity computation for clustering , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).

[20]  Ibrahim Sogukpinar,et al.  Classification Based Revocable Biometric Identity Code Generation , 2009, COST 2101/2102 Conference.

[21]  Xudong Jiang,et al.  Fingerprint Reference-Point Detection , 2005, EURASIP J. Adv. Signal Process..

[22]  Raymond N. J. Veldhuis,et al.  Spectral Minutiae Representations for Fingerprint Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[23]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[24]  Andrew Beng Jin Teoh,et al.  An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number , 2004, ICBA.

[25]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[26]  Zhe Jin,et al.  Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..

[27]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[28]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[29]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[30]  Weiwei Zhang,et al.  Core-based structure matching algorithm of fingerprint verification , 2002, Object recognition supported by user interaction for service robots.

[31]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[32]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[33]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[34]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[35]  Pauli Kuosmanen,et al.  Fingerprint Matching Using an Orientation-Based Minutia Descriptor , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[36]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[37]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[38]  Sharath Pankanti,et al.  On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[39]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[40]  Andrew Beng Jin Teoh,et al.  Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.

[41]  Stark C. Draper,et al.  Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.

[42]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[43]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and user-dependent multi-state discretization in BioHash , 2009, Pattern Analysis and Applications.

[44]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[45]  Christophe Rosenberger,et al.  Biohashing for Securing Minutiae Template , 2010, 2010 20th International Conference on Pattern Recognition.

[46]  Anil K. Jain,et al.  Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.

[47]  Loris Nanni,et al.  Empirical tests on BioHashing , 2006, Neurocomputing.

[48]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[49]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.