access icon free Operational bio-hash to preserve privacy of fingerprint minutiae templates

The storage of fingerprints is an important issue as this biometric modality is more and more deployed for real applications. Considering minutiae templates as sensitive information, a key question concerns the secure and privacy management of this digital identity. Indeed, if an attacker obtains the minutiae template of a subject, he/she will be able to generate a fingerprint having the same characteristics. Instead of directly storing the minutiae templates, the authors propose in this study a new adaptation of BioHashing to generate a cancellable template in the context of un-ordered set of noisy minutiae features. To the authors knowledge, little interest has been paid in the literature to the question of protecting minutiae template by BioHashing until now. Using the FVC2002 benchmark database, they show the effectiveness of the proposed approach in term of privacy preservation. They show how the proposed method copes with irreversibility and diversity properties and therefore can be efficient in a realistic context.

Inspec keywords: fingerprint identification; cryptography; data privacy

Other keywords: digital identity privacy management; biometric modality; fingerprint minutiae template privacy preservation; operational bio-hash; sensitive information; cancellable template generation; irreversibility properties; unordered noisy minutiae feature sets; diversity properties; digital identity security; fingerprint storage; FVC2002 benchmark database

Subjects: Image recognition; Data security; Computer vision and image processing techniques; Cryptography

References

    1. 1)
      • 35. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Sec., 2011, 3, pp. 2011:3.
    2. 2)
      • 27. Kumar, G., Tulyakov, S., Govindaraju, V.: ‘Combination of symmetric hash functions for secure fingerprint matching’. Proc. 20th Int. Conf. Pattern Recognition (ICPR), 2010.
    3. 3)
      • 16. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: ‘Filterbank based fingerprint matching’, IEEE Trans. Image Process., 2000, 9, (5), pp. 846859 (doi: 10.1109/83.841531).
    4. 4)
      • 22. Scheirer, W., Boult, T.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., 2007.
    5. 5)
      • 12. Belguechi, R., Rosenberger, C., Ait-Aoudia, S.: ‘BioHashing for securing minutiae template’. Proc. 20th Int. Conf. Pattern Recognition (ICPR), 2010, pp. 118128.
    6. 6)
      • 37. Hazewinkel, M.: ‘Orthogonalization’, in ‘Encyclopedia of Mathematics’ (Kluwer Academic Publishers, 2002).
    7. 7)
      • 21. Sutcu, Y., Rane, S., Yedidia, J., Draper, S., Vetro, A.: ‘Feature extraction for a Slepian-Wolf biometric system using LDPC codes’. Proc. IEEE Int. Symp. Information Theory, 2008.
    8. 8)
      • 41. Pankanti, S., Prabhakar, S., Jain, A.: ‘On the individuality of fingerprints’, IEEE Trans. PAMI, 2002, 24, (8), pp. 10101025 (doi: 10.1109/TPAMI.2002.1023799).
    9. 9)
      • 45. Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: ‘FVC2002: second fingerprint verification competition’ (ICPR, Canada, 2002).
    10. 10)
      • 15. Tico, M., Kuosmanen, P.: ‘Fingerprint matching using an orientation-based minutia descriptor’, IEEE Trans. PAMI, 2003, 25, pp. 10091014 (doi: 10.1109/TPAMI.2003.1217604).
    11. 11)
      • 14. Nanni, L., Brahnam, S., Lumini, A.: ‘Biohashing applied to an orientation-based minutia descriptor for a secure fingerprint authentication system’, IET Electron. Lett., 2011, 47, (15), pp. 851853 (doi: 10.1049/el.2011.1525).
    12. 12)
      • 42. Chikkerur, S., Cartwright, A.N., Govindaraju, V.: ‘K-plet and coupled BFS: a graph based fingerprint representation and matching algorithm’. Proc. Int. Conf. Biometrics, 2006, pp. 309315.
    13. 13)
      • 30. Lee, C., Kim, J.: ‘Cancelable fingerprint templates using minutiae-based bit-strings’, J. Netw. Comput. Appl., 2010, 33, pp. 236246 (doi: 10.1016/j.jnca.2009.12.011).
    14. 14)
      • 31. Jin, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: ‘Fingerprint template protection with minutiae-based bit-string for security and privacy preserving’, J. Expert Syst. Appl., 2012, 39, pp. 61576167 (doi: 10.1016/j.eswa.2011.11.091).
    15. 15)
      • 4. Teoh, A.B.J., Ngo, D., Goh, A.: ‘BioHashing: two factor authentication featuring fingerprint data and tokenised random number’, Pattern Recognit., 2004, 37, (11), pp. 22452255 (doi: 10.1016/j.patcog.2004.04.011).
    16. 16)
      • 34. Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: ‘Sectored random projections for cancelable iris biometrics’. Proc. IEEE Int. Conf. Acoustics Speech and Signal Processing (ICASSP), 2010, pp. 18381841.
    17. 17)
      • 33. Yip, W.K., Teoh, A.B.J., Ngo, D.C.L.: ‘Replaceable and securely hashed keys from online signatures’, IEICE Electron. Express, 2006, 3, (18), pp. 410416 (doi: 10.1587/elex.3.410).
    18. 18)
      • 2. Ratha, N.K., Connell, J.H., Bolle, R.M.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (03), pp. 614634 (doi: 10.1147/sj.403.0614).
    19. 19)
      • 36. Kaski, S.: ‘Dimensionality reduction by random mapping’. Int. Joint Conf. Neural Networks, 1998, pp. 413418.
    20. 20)
      • 44. Liu, M., Jiang, X., Kot, A.C.: ‘Fingerprint reference-point detection’, EURASIP J. Appl. Signal Process., 2005, 4, pp. 498509.
    21. 21)
      • 11. Yang, B., Hartung, D., Simoens, K., Busch, C.: ‘Dynamic random projection for biometric tempalte protection’ (4th IEEE BTAS, 2010).
    22. 22)
      • 20. Linnartz, J.M.G., Tuyls, P.: ‘New shielding functions to enhance privacy and prevent misuse of biometric templates’. Proc. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication, 2003.
    23. 23)
      • 3. Dodis, Y., Reyzin, L., Smith, A.: ‘Fuzzy extractors: how to generate strong keys from biometrics and other noisy data’, Adv. Cryptol. Eurocrypt, 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 79–100 (Springer Verlag, 2004).
    24. 24)
      • 47. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Biometric template transformation: a security analysis’. Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 2010.
    25. 25)
      • 5. Teoh, A.B.J., Kuan, Y., Lee, S.: ‘Cancellable biometrics and annotations on BioHash’, Pattern Recognit., 2007, 41, pp. 20342044 (doi: 10.1016/j.patcog.2007.12.002).
    26. 26)
      • 23. Kholmatov, A., Yanikoglu, B.: ‘Realization of correlation attack against the fuzzy vault scheme’. Proc. SPIE: Biometrics, Security, Forensics, Steganography and Watermarking of Multimedia Contents, San Jose, USA, 2008.
    27. 27)
      • 13. Radha, N., Karthikeyan, S.: ‘An evaluation of fingerprint security using noninvertible biohash’, Int. J. Netw. Secur. Appl. (IJNSA), 2011, 3.
    28. 28)
      • 1. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, 12, pp. 113:1113:17.
    29. 29)
      • 29. Boult, T., Scheirer, W., Woodworth, R.: ‘Revocable fingerprint biotokens: accuracy and security analysis’. Int Conf. CVPR, 2007.
    30. 30)
      • 19. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingeprint fuzzy vault using password’. Int. Conf. Biometrics, 2007.
    31. 31)
      • 18. Nagar, A., Nandakumar, K., Jain, A.K.: ‘A hybrid biometric cryptosystem for securing fingerprint minutiae templates’, Pattern Recognit. Lett., 2009, 31, (8), pp. 733741 (doi: 10.1016/j.patrec.2009.07.003).
    32. 32)
      • 25. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: ‘Generating cancelable fingerprint templates’ (IEEE Trans on PAMI, 2007).
    33. 33)
      • 43. Zhang, W., Wang, Y.: ‘Core-based structure matching algorithm of fingerprint verification’. Proc. 16th Int. Conf. Pattern Recognition, 2002.
    34. 34)
      • 7. Lumini, A., Nanni, L.: ‘Empirical tests on biohashing’, Neurocomputing, 2006, 69, (16), pp. 23902395.
    35. 35)
      • 17. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. Sixth ACM Conf. Computer and Communications Security, 1999.
    36. 36)
      • 38. Kong, A., Cheung, K.H., Zhang, D., Kamel, M., You, J.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2005, 39, pp. 13591368 (doi: 10.1016/j.patcog.2005.10.025).
    37. 37)
      • 24. Simoens, K., Yang, B., Zhou, X., et al.: ‘Criteria towards metrics for benchmarking template protection algorithms’ (ICB, 2012), pp. 498505.
    38. 38)
      • 6. ISO/IEC 24745 Information technology – Security techniques – Biometric information protection, 2011.
    39. 39)
      • 26. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Biometric template transformation: a security analysis’. Proc. SPIE, 2010.
    40. 40)
      • 9. Kanak, A., Sogukpinar, I.: ‘Classification based revocable biometric identity code generation’ (BioID MultiComm, 2009).
    41. 41)
      • 32. Savvides, M., Kumar, B., Khosla, P.: ‘Cancelable biometric filters for face recognition’. Proc. 17th Int. Conf. Pattern Recognition, 2004, vol. 3, pp. 922925.
    42. 42)
      • 28. Farooq, F., Bolle, R.M., Tsai-Yang, J., Ratha, N.: ‘Anonymous and revocable fingerprint recognition’. IEEE Conf. CVPR, 2007.
    43. 43)
      • 40. Lumini, A., Nanni, L.: ‘An improved BioHashing for human authentication’, Pattern Recognit., 2007, 40, pp. 10571065 (doi: 10.1016/j.patcog.2006.05.030).
    44. 44)
      • 39. Teoh, A.B.J., Kuan, Y.W., Kar-Ann, T.: ‘Cancellable biometrics and user-dependent multi-state discretization in BioHash’, Pattern Anal. Appl., 2010, 13, pp. 301307 (doi: 10.1007/s10044-009-0158-x).
    45. 45)
      • 46. Daugman, J.: ‘The importance of being random: statistical principles of iris recognition’, Pattern Recognit., 2003, 36, (2), pp. 279291 (doi: 10.1016/S0031-3203(02)00030-4).
    46. 46)
      • 8. Nanni, L., Lumini, A.: ‘Local binary patterns for a hybrid fingerprint matcher’, Pattern Recognit. J., 2008, 41, pp. 34613466 (doi: 10.1016/j.patcog.2008.05.013).
    47. 47)
      • 10. Xu, H.: ‘Spectral minutiae representations for fingerprint recognition’. PhD thesis, University of Twente, 2010.
    48. 48)
      • 48. Ang, R., Safavi-Naini, R., McAven, L.: ‘Cancellable key-based fingerprint templates’, ACISP, 2005, 3574, pp. 242252.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2012.0039
Loading

Related content

content/journals/10.1049/iet-bmt.2012.0039
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading