A Survey on Biometric Template Protection
Keywords:
Biometric template protection, Biometric cryptosystem, Cancelable biometrics, Bloom filter, Honey templateAbstract
Biometric authentication offers most reliable approach to person authentication. This authentication approach is based on the "what you are" security measure. However, biometric templates are vulnerable to different types of attacks and any data leakage cause privacy risks. Unlike passwords, stolen biometric data cannot be revoked or reissued hence biometric templates must be protected and any leakage of biometric information must be prevented. This paper surveys various biometric template protection schemes.
References
- Jain, A.K., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, pp. 4–20
- Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, pp. 1–17
- A. K. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999.
- ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011: ‘Information technology – security techniques – biometric information protection, International Organization for Standardization, 2011, 14
- Uludag, U., Pankanti, S., Prabhakar, S., et al.: ‘Biometric cryptosystems: issues and challenges’, Proc. IEEE, 2004, 92, (6), pp. 948–960
- Ratha, N., Connell, J., Bolle, R.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (3), pp. 614–634
- Juels, A., Sudan, M.: ‘A fuzzy vault scheme’, Des. Codes Cryptogr., 2006, 38, (2), pp. 237–257
- Nandakumar, K., Jain, A.K., Pankanti, S.: ‘Fingerprint-based fuzzy vault: implementation and performance’, IEEE Trans. Inf. Forensics Sec., 2007, 2, pp. 744–757
- Wu, Y., Qiu, B.: ‘Transforming a pattern identifier into biometric key generators’. Proc. Int. Conf. on Multimedia and Expo, ICME, 2010, pp. 78–82
- A. Juels and M. Wattenberg, “A Fuzzy Commitment Scheme,” in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 28-36
- Davida G, Frankel Y, Matt B, “On the relation of error correction and cryptography to an off line biometric based identication scheme”, Proc of WCC99, Workshop on Coding and Cryptography 1999, 129-138
- Rathgeb C, Uhl A: An iris-based interval-mapping scheme for biometric key generation. Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA ‘09 2009.
- Kong, A., Cheunga, K.-H., Zhanga, D., et al.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 1359–1368
- Y. Sutcu, H. T. Sencar, and N. Memon, “A Secure Biometric Authentication Scheme Based on Robust Hashing,” in Proceedings of ACM Multimedia and Security Workshop, New York, USA, August 2005, pp. 111–116.
- Rathgeb, C., Breitinger, F., Busch, C.: ‘Alignment-free cancelable iris biometric templates based on adaptive bloom filters’. Proc. Int. Conf. On Biometrics, ICB, 2013, pp. 1–8
- Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al.: ‘Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters’. Proc. Int. Conf. on Pattern Recognition, ICPR, 2014, pp. 4483–4488
- Rathgeb, C., Breitinger, F., Busch, C., et al.: ‘On the application of bloom filters to iris biometrics’, IET Biometrics, 2014, 3, (1), pp. 207–218
- Rathgeb, C., Busch, C.: ‘Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters’, Comput. Sec., 2014, 42, (0), pp. 1–12
- Rathgeb, C., Gomez-Barrero, M., Busch, C., et al.: ‘Towards cancellable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris’. Proc. Int. Workshop on Biometrics and Forensics, IWBF, 2015, pp. 1–7
- Li, G., Yang, B., Rathgeb, C., et al.: ‘Towards generating protected fingerprint templates based on bloom filters’. Proc. Int. Workshop on Biometrics and Forensics (IWBF), 2015
- Abe, N., Yamada, S., Shinzaki, T.: ‘Irreversible fingerprint template using minutiae relation code with bloom filter’. Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2015
- Hermans, J., Mennink, B., Peeters, R.: ‘When a bloom filter is a doom filter: security assessment of a novel iris biometric’. Proc. Int. Conf. of the Biometrics Special Interest Group, BIOSIG, 2014
- Bringer, J., Morel, C., Rathgeb, C.: ‘Security analysis of bloom filter-based iris biometric template protection’. Proc. Int. Conf. on Biometrics, ICB, 2015, pp. 527–534
- Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al.: ‘Unlinkable and irreversible biometric template protection based on bloom filters’, Inf. Sci., 2016, 370–371, pp. 18–32
- Juels, A., Rivest, R.L.: ‘Honeywords: Making password-cracking detectable’. Proc. ACM SIGSAC Conf. on Computer and Communications Security, 2013, pp. 145–160.
- Yang, B., Martiri, E.: ‘Using honey templates to augment hash based biometric template protection’. Proc. Int. Workshop on Secure Identity Management in the Cloud Environment (SIMICE), 2015
- Martiri, E., Yang, B., Busch, C.: ‘Protected honey face templates’. Proc. BIOSIG, 2015
- Martiri, E., Gomez-Barrero, M., Yang, B., Busch, C.: ‘Biometric template protection based on bloom filter and honey template’.IET Biometrics, 2017,6,(1),pp.19–2
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.