A Survey on Biometric Template Protection

Authors

  • Laxmi Menaria  Department of Computer Science and Engineering, College of Technology and Engineering, Udaipur, Rajasthan, India
  • Kalpana Jain  Department of Computer Science and Engineering, College of Technology and Engineering, Udaipur, Rajasthan, India

Keywords:

Biometric template protection, Biometric cryptosystem, Cancelable biometrics, Bloom filter, Honey template

Abstract

Biometric authentication offers most reliable approach to person authentication. This authentication approach is based on the "what you are" security measure. However, biometric templates are vulnerable to different types of attacks and any data leakage cause privacy risks. Unlike passwords, stolen biometric data cannot be revoked or reissued hence biometric templates must be protected and any leakage of biometric information must be prevented. This paper surveys various biometric template protection schemes.

References

  1. Jain, A.K., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, pp. 4–20
  2. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, pp. 1–17
  3. A. K. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
  4. ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011: ‘Information technology – security techniques – biometric information protection, International Organization for Standardization, 2011, 14
  5. Uludag, U., Pankanti, S., Prabhakar, S., et al.: ‘Biometric cryptosystems: issues and challenges’, Proc. IEEE, 2004, 92, (6), pp. 948–960
  6. Ratha, N., Connell, J., Bolle, R.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (3), pp. 614–634
  7. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’, Des. Codes Cryptogr., 2006, 38, (2), pp. 237–257
  8. Nandakumar, K., Jain, A.K., Pankanti, S.: ‘Fingerprint-based fuzzy vault: implementation and performance’, IEEE Trans. Inf. Forensics Sec., 2007, 2, pp. 744–757
  9. Wu, Y., Qiu, B.: ‘Transforming a pattern identifier into biometric key generators’. Proc. Int. Conf. on Multimedia and Expo, ICME, 2010, pp. 78–82
  10. A. Juels and M. Wattenberg, “A Fuzzy Commitment Scheme,” in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 28-36
  11. Davida G, Frankel Y, Matt B, “On the relation of error correction and cryptography to an off line biometric based identication scheme”, Proc of WCC99, Workshop on Coding and Cryptography 1999, 129-138
  12. Rathgeb C, Uhl A: An iris-based interval-mapping scheme for biometric key generation. Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA ‘09 2009.
  13. Kong, A., Cheunga, K.-H., Zhanga, D., et al.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 1359–1368
  14. Y. Sutcu, H. T. Sencar, and N. Memon, “A Secure Biometric Authentication Scheme Based on Robust Hashing,” in Proceedings of ACM Multimedia and Security Workshop, New York, USA, August 2005, pp. 111–116.
  15. Rathgeb, C., Breitinger, F., Busch, C.: ‘Alignment-free cancelable iris biometric templates based on adaptive bloom filters’. Proc. Int. Conf. On Biometrics, ICB, 2013, pp. 1–8
  16. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al.: ‘Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters’. Proc. Int. Conf. on Pattern Recognition, ICPR, 2014, pp. 4483–4488
  17. Rathgeb, C., Breitinger, F., Busch, C., et al.: ‘On the application of bloom filters to iris biometrics’, IET Biometrics, 2014, 3, (1), pp. 207–218
  18. Rathgeb, C., Busch, C.: ‘Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters’, Comput. Sec., 2014, 42, (0), pp. 1–12
  19. Rathgeb, C., Gomez-Barrero, M., Busch, C., et al.: ‘Towards cancellable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris’. Proc. Int. Workshop on Biometrics and Forensics, IWBF, 2015, pp. 1–7
  20. Li, G., Yang, B., Rathgeb, C., et al.: ‘Towards generating protected fingerprint templates based on bloom filters’. Proc. Int. Workshop on Biometrics and Forensics (IWBF), 2015
  21. Abe, N., Yamada, S., Shinzaki, T.: ‘Irreversible fingerprint template using minutiae relation code with bloom filter’. Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2015
  22. Hermans, J., Mennink, B., Peeters, R.: ‘When a bloom filter is a doom filter: security assessment of a novel iris biometric’. Proc. Int. Conf. of the Biometrics Special Interest Group, BIOSIG, 2014
  23. Bringer, J., Morel, C., Rathgeb, C.: ‘Security analysis of bloom filter-based iris biometric template protection’. Proc. Int. Conf. on Biometrics, ICB, 2015, pp. 527–534
  24. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al.: ‘Unlinkable and irreversible biometric template protection based on bloom filters’, Inf. Sci., 2016, 370–371, pp. 18–32
  25. Juels, A., Rivest, R.L.: ‘Honeywords: Making password-cracking detectable’. Proc. ACM SIGSAC Conf. on Computer and Communications Security, 2013, pp. 145–160.
  26. Yang, B., Martiri, E.: ‘Using honey templates to augment hash based biometric template protection’. Proc. Int. Workshop on Secure Identity Management in the Cloud Environment (SIMICE), 2015
  27. Martiri, E., Yang, B., Busch, C.: ‘Protected honey face templates’. Proc. BIOSIG, 2015
  28. Martiri, E., Gomez-Barrero, M., Yang, B., Busch, C.: ‘Biometric template protection based on bloom filter and honey template’.IET Biometrics, 2017,6,(1),pp.19–2

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Laxmi Menaria, Kalpana Jain, " A Survey on Biometric Template Protection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.995-999, March-April-2017.