Review Analysis of Properties for an Ideal Secure Biometric Template Scheme

Phiwa Mzila

Abstract

With new advances in technologies, biometrics is becoming emerging technology for verification and authentication of individuals. However, the storage of biometric templates still needs necessary attention since it poses major threats to user privacy and system security. To mitigate this problem, various biometric protection techniques have been proposed. Most of these schemes aim to satisfy diversity, revocability, security and performance properties, as requirements for ideal secured biometric template storage. Conventionally, priority is given to robustness of biometric system in terms of its accuracy, and high performance with regards to matching and recognition rate. Little attention is payed to user privacy and system security. In this paper, existing work in biometric template protection schemes are reviewed, analysed, and compared with reference to properties of an ideal biometric secured template system. The question of properties needed for a complete and ideal biometric secured template system is beyond the scope of this research.

References

  1. Breebaart, J., Yang, B., Dulman, B., Busch, C., 2009. Biometric Template Protection: The need for open standards. Privacy and Data Security Journal.
  2. Bringer J., Despiegel, V., 2010. Binary Feature Vector Fingerprint Representation from Minutiae Vicinities. In Proc. of the 4th IEEE Int. Conf. on Biometrics: Theory, applications and systems (BTAS'10), pp. 1-6.
  3. Cavoukian, A., Stoianov, A., 2009. Biometric Encryption: The New Breed of Untraceable Biometrics. In Biometrics: fundamentals, theory, and systems. Wiley.
  4. Chang, Y., Zhang, W., and Chen, T., 2004. BiometricsBased Cryptographic Key Generation. Multimedia and Expo, ICME'04, IEEE Imternational Conference on, Taipei, pp. 2203-2206.
  5. Connell, J. H., Ratha, N. K., and Zuo,J., 2010. Salting System and Method for Cancelable Iris Biometrics. US Patent, No. 0046808.
  6. Das, P., Karthik, K., and Garai, B. C., 2012. A Robust Alignment-free Fingerprint Hashing Algorithm Based on Minimum Distance Graphs. Pattern Recognition, 45(9), 3373-3388.
  7. Dodis, Y., Ostrovsky, R., L. Reyzin and Smith, A., 2008. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT 7804), Interlaken, Switzerland, pp. 523- 540.
  8. Feng, Y. C., Yuen, P. C. and Jain, A. K., 2008. A Hybrid Approach for Face Template Protection. SPIE Defense and Security Symposium, Vol. 102, No. 2, pp. 169-177.
  9. Hao, F., Anderson, R and Daugman, J., 2006. Combining Crypto with Biometrics Effectively. IEEE Transactions on Computers, pp. 1081-1088.
  10. Jain, A., Nandakumar, K., Nagar, A., 2008. Biometric Template Security. Journal on Advances in Signal Processing, pp. 1-17. doi:10.1155/2008/579416.
  11. Juels, A., Sudan, M., 2006. A Fuzzy Vault Scheme. Designs, Codes and Cryptography, Vol. 38, No. 2, pp. 237- 257. doi:10.1007/s10623-005-6343-z.
  12. Kanade, S., Petrovska-Delacretaz, D., and Dorizzi, B., 2009. Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data. Computer Vision and Pattern Recognition, CVPR, IEEE Conference, Miami, pp. 120-127.
  13. Kerschbaum, F., Atallah, M. J., M'Raïhi, D., Rice, J. R., 2004. Private Fingerprint Verification without Local Storage. In ICBA. (Hong Kong, China), pp. 87-394.
  14. Lumini, A., Nanni, A., 2007. An Improved BioHashing for Human Authentication. Pattern Recognition, Vol. 40, No. 3, pp. 1057-1065. doi:10.1016/j.patcog.2006.05. 030.
  15. Malhotra S., Verma, C., 2013. A Hybrid Approach for Securing Biometric Template. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 - 8958, Vol. 2, No. 5.
  16. Maltoni, D., Maio, D., Jain, A. and Prabhakar, S., 2009. HandBook of Fingerprint Recongnition. Springer, 2nd Edition.
  17. Mwele, J., Kiman, S., 2015. A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates. International Journal of Computer Trends and Technology, 20(1), pp. 12-18.
  18. Radha, N., Karthikeyan, S., 2011. An Evaluation of Fingerprint Security Using Non-invertible Biohash. International Journal of Network Security & Its Applications (IJNSA), 3(4).
  19. Rahultech, 2010, IT trends-latest/recent trends in information technology http://rtmnuittrends.blogspot. com/2010/09/biometrics.html
  20. Ratha, N., Chikkerur, S., and Connell, J., 2007. Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No. 4, pp. 561-572. doi:10.1109/TPAMI.2007.1004.
  21. Ratha, N. K., Connell J. H., Bolle, R. M., 2011. Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Syst J 40: 614-634.
  22. Rathgeb, C., Busch, C., 2013. Multi-Biometric Template Protection: Issues and Challenges. In New Trends and Developments in Biometrics, chapter 8, pp. 173-190.
  23. Rathgeb, C., and Uhl, A., 2011. A Survey on Biometric Cryptosystems and Cancelable Biometrics, EURASIP JIS, vol. 3, pp. 1-25.
  24. Simoens, K., Tuyls, P., and Preneel, B., 2009. Privacy Weaknesses in Biometric Sketches. Security and Privacy, 2009 30th IEEE Symposium, pp. 188-203.
  25. Sutcu, Y., Li, Q., and Memon, N., 2007. Protecting Biometric Templates with Sketch: Theory and Practice. Information Forensics and Security, IEEE Transactions on, Vol. 2, No. 3, pp. 503-512. doi:10.1109/TIFS.2007.902022.
  26. Teoh, A., Goh, A., Ngo, D., 2006. Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 12, pp. 1892-1901. doi:10.1109/TPAMI.2006.250
  27. Turk, M. A., Pentland, A. P., 1991. Face recognition using eigenfaces. In Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 586-591.
  28. Uludag, U., Jain, A., 2006. Securing Fingerprint Template: Fuzzy Vault with Helper Data. Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops, New York, p. 163.
  29. Uludag, U., Pankanti, S., Jain, A., 2004. Biometric cryptosystems: Issues and Challenges, pp. 948-960. In Proceedings of the IEEE.
  30. Xu, H., Veldhuis, R. N., 2010. Binary Representations of Fingerprint Spectral Minutiae Feature. In Proc. of the 20th Int. Conf. on Pattern Recognition (ICPR'10), pp. 1212-1216.
Download


Paper Citation


in Harvard Style

Mzila P. (2016). Review Analysis of Properties for an Ideal Secure Biometric Template Scheme . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 333-339. DOI: 10.5220/0005727303330339


in Bibtex Style

@conference{icissp16,
author={Phiwa Mzila},
title={Review Analysis of Properties for an Ideal Secure Biometric Template Scheme},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={333-339},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005727303330339},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Review Analysis of Properties for an Ideal Secure Biometric Template Scheme
SN - 978-989-758-167-0
AU - Mzila P.
PY - 2016
SP - 333
EP - 339
DO - 10.5220/0005727303330339