stored  and  analyzed  during  the  verification  process 
resulting the most likely codeword.  
3.2.12 Key Generation Attack  
In this attack the attacker can inject a generated series 
as secret key so that he can gain access to the systems. 
The key generation module can be also changed by 
the  attacker  using  another  one  that  makes  the 
illegitimate access easier. 
4  CONCLUSIONS 
Biometric  cryptosystems  are  proposed  as  secure 
technologies  for  protecting  biometric  template. 
However,  these  systems  stay  vulnerable  to  several 
attacks. Despite active research in recent years in the 
evaluation  of  biometric  cryptosystems,  very  few 
studies have focused on the security and robustness 
of  these  systems.  Most  of  proposed  biometric 
cryptosystems  evaluation  studies  are  based  on 
information  theory  such  as  entropy,  mutual 
information  etc,  these  measures  are  difficult  to  be 
estimated when the distribution of biometric features 
is  unknown  (  do  the  intra-class  and  inter-class 
variability). On other hand, many studies consider the 
false  acceptance  rate  FAR  to  evaluate  the  security 
when  this  criterion  is  considered  as  performance 
measure  and  can’t  be  sufficient  to  measure  the 
security.  Consequently,  the  proposed  studies  to 
analyze the security of biometric  cryptosystems  are 
very limited. In order to present a generalized study 
to evaluate  the  security  of  biometric cryptosystems, 
we  proposed  in  this  work  a  generalized  conception 
framework. This framework takes in into account all 
the modules threats. 
REFERENCES 
A.  K.  Jain,  R.  Bolle,  and  S.  Pankanti,  Eds.,  Biometrics: 
Personal Identification in Networked Society. Norwell, 
MA: Kluwer, 1999. 
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. 
K. Vijaya Kumar, “Biometric encryption using image 
processing,”  in  Proc.  SPIE,  Optical  Security  and 
Counterfeit Deterrence Techniques II, vol. 3314, 1998, 
pp. 178–188. 
K.  Nandakumar,  A.  Nagar,  and  A.  K  Jain.  Hardening 
fingerprint fuzzy vault using password. In Advances in 
biometrics, pages 927-937.Springer, 2007.  
Ari  Juels  and  Martin  Wattenberg.  A  fuzzy  commitment 
scheme. In Proceedings of the 6th ACM conference on 
Computer and communications security, pages 28-36. 
ACM, 1999.  
Yongjin  Wang  and  KN  Plataniotis.  Fuzzy  vault  for  face 
based  cryptographic  key  generation.  In  Biometrics 
Symposium, pages 1-6. IEEE, 2007. 
Ross, A., Jain, A. (2003). Information fusion in biometrics. 
Pattern Recognition Letters, 24 (13) 2115–2125  
Ratha,  N.,  Connell,  J.,  Bolle,  R.  (2001).  An  analysis  of 
minutiae  matching  strength.  In:  Audio-and  Video-
Based  Biometric  Person  Authentication,  p.  223–228. 
Springer. 
Hao,  F.,  Anderson,  R.,  Daugman,  J.  (2006).  Combining 
crypto with biometrics effectively, IEEE Transactions 
on Computers, 55 (9) 1081–1088. 
Li,  Q.,  Sutcu,  Y.,  Memon,  N.  (2006).  Secure  sketch  for 
biometric  templates.  Advances  in  Cryptology–
ASIACRYPT 2006, p. 99–113. 
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A. K. (2004). 
Biometric  cryptosystems:  issues  and  challenges.  In: 
Proceedings of the IEEE, 92 (6) 948–960. 
Juels,  A.,  Wattenberg,  M.  (1999).  A  fuzzy  commitment 
scheme. In: Proceedings of the 6th ACM conference on 
Computer  and  communications  security,  p.  28–36. 
ACM  
Juels,  A.,  Sudan,  M.  (2006).  A  fuzzy  vault  scheme. 
Designs, Codes and Cryptography, 38 (2) 237–257. 
Scheirer, W. J., Boult, T. E. (2007). Cracking fuzzy vaults 
and biometric encryption. In: Biometrics Symposium, 
p. 1–6.IEEE. 
Xuebing  Zhou,  Arjan  Kuijper,  Raymond  Veldhuis,  and 
Christoph Busch.  Quantifying privacy and security of 
biometric  fuzzy  commitment.  In  International  Joint 
Conference  on  Biometrics  (IJCB),  pages  1-8.  IEEE, 
2011.  
Abhishek  Nagar,  Karthik  Nandakumar,  and  Anil  K  Jain. 
Multibiometric  cryptosystems  based  on  feature-level 
fusion.  IEEE  Transactions  on  Information  Forensics 
and Security, 7(1) :255-268, 2012. 
Ye  Wang,  Shantanu  Rane,  Stark  C  Draper,  and  Prakash 
Ishwar.  An  information-theoretic  analysis  of 
revocability  and  reusability  in  secure  biometrics.  In 
Information Theory and Applications Workshop (ITA), 
pages 1-10. IEEE, 2011. (Cité en pages 45 et 50.)  
Seira  Hidano,  Tetsushi  Ohki,  and  Kenta  Takahashi. 
Evaluation of security for biometric guessing attacks in 
biometric  cryptosystem  using  fuzzy  commitment 
scheme.  In  BIOSIG-Proceedings  of  the  International 
Conference  of  the  Biometrics  Special  Interest  Group 
(BIOSIG), pages 1-6. IEEE, 2012.  
VS  Meenakshi  and  G  Padmavathi.  Security  analysis  of 
password hardened multimodal biometric fuzzy vault. 
World Acad. Sci. Eng. Tech, 56 :312-320,2009. 
Hisham Al-Assam  and  Sabah Jassim.  Security evaluation 
of  biometric  keys.computers  &  security,  31(2)  :151-
163, 2012.  
Andy Adler. Sample images can be independently restored 
from face recognition templates. In CCECE Canadian 
Conference  on  Electrical  and  Computer  Engineering, 
volume 2, pages 1163-1166. IEEE, 2003