Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Revisiting the accuracy of the biohashing algorithm on fingerprints

Biometric template protection is suitable with the widespread deployment of biometric authentication schemes. Template protection methods are used to ensure the diversity and the security of biometric data, by avoiding storage and misuse of the original template. This study provides an evaluation of the accuracy performance of biometric template protection methods, by revisiting experiments on the biohashing algorithm on fingerprints. It is shown how and why experimental results can be completely falsified with only five random bits.

References

    1. 1)
      • 28. Panneton, F., L'Ecuyer, P., Matsumoto, M.: ‘Improved long-period generators based on linear recurrences modulo 2’, ACM Trans. Math. Softw., 2006, 32, (1), pp. 116 (doi: 10.1145/1132973.1132974).
    2. 2)
      • 4. Zhou, X., Kuijper, A., Busch, C.: ‘Retrieving secrets from iris fuzzy commitment’. International Conf. Biometrics (ICB'12), 2012, pp. 238244.
    3. 3)
      • 13. Cavoukian, A., Stoianov, A.: ‘Biometric encryption from the encyclopedia of biometrics’ (Springer Verlag, 2009).
    4. 4)
      • 3. Simoens, K., Chang, C., Preneel, B.: ‘Privacy weaknesses in biometric sketches’. IEEE Symp. Security and Privacy, 2009, pp. 188203.
    5. 5)
      • 25. Zuo, J., Ratha, N.K., Connell, J.H.: ‘Cancelable iris biometric’. International Conf. Pattern Recognition (ICPR), 2008, pp. 14.
    6. 6)
      • 7. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Multibiometric cryptosystems based on feature-level fusion’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 255268 (doi: 10.1109/TIFS.2011.2166545).
    7. 7)
      • 8. Bringer, J., Chabanne, H.: ‘An authentication protocol with encrypted biometric data’. Proc. AfricaCrypt'08, 2008 (LNCS, 5023), pp. 109124.
    8. 8)
      • 21. ISO/IEC 24745 Information technology – Security techniques – Biometric information protection, 2011.
    9. 9)
      • 11. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: ‘Generating cancelable fingerprint templates’, IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, (4), pp. 561572 (doi: 10.1109/TPAMI.2007.1004).
    10. 10)
      • 18. Lumini, A., Nanni, L.: ‘An improved BioHashing for human authentication’, Pattern Recognit., 2007, 40, (3), pp. 10571065 (doi: 10.1016/j.patcog.2006.05.030).
    11. 11)
      • 9. Ratha, N., Connell, J.H., Bolle, R.M.: ‘Enhancing security and privacy in biometrics biased authentication systems’, IBM Syst., 2001, 40, (3), pp. 614634 (doi: 10.1147/sj.403.0614).
    12. 12)
      • 12. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Proc., 2008, 8, (2), pp. 117 (doi: 10.1155/2008/657081).
    13. 13)
      • 22. Simoens, K., Yang, B., Zhou, X., et al: ‘Criteria towards metrics for benchmarking template protection algorithms’. Int. Conf. Biometrics (ICB'12), 2012, pp. 498505.
    14. 14)
      • 24. ISO/IEC 2382-37 Information technology – Vocabulary – Part 37: Harmonized Biometric Vocabulary, 2012.
    15. 15)
      • 26. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Biometric template transformation: a security analysis’. Media Forensics and Security, 2010, pp. 75410.
    16. 16)
      • 5. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’. Proc. IEEE Int. Symp. Information Theory (ISIT), 2002, pp. 408.
    17. 17)
      • 16. Teoh, A., Ngo, D., Goh, A.: ‘Biohashing: two factor authentication featuring fingerprint data and tokenised random number’, Pattern Recognit., 2004, 37, (11), pp. 22452255 (doi: 10.1016/j.patcog.2004.04.011).
    18. 18)
      • 20. Rathgeb, C., Uhl, A.: ‘Two-factor authentication or how to potentially counterfeit experimental results in biometric systems’. Int. Conf. Image Analysis and Recognition (ICIAR), 2010, pp. 296305.
    19. 19)
      • 19. Teoh, A., Kuang, Y.W., Lee, S.: ‘Cancellable biometrics and annotations on biohash’, Pattern Recognit., 2008, 41, pp. 20342044 (doi: 10.1016/j.patcog.2007.12.002).
    20. 20)
      • 27. Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: ‘FVC2002: second fingerprint verification competition’. Int. Conf. Pattern Recognition (ICPR), 2002, pp. 1115.
    21. 21)
      • 17. Kong, A., Cheung, K.H., Zhang, D., Kamel, M., You, J.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 13591368 (doi: 10.1016/j.patcog.2005.10.025).
    22. 22)
      • 2. Dodis, Y., Reyzin, L., Smith, A.: ‘How to generate strong keys from biometrics and other noisy data’. Proc. EUROCRYPT'04, 2004 (LNCS, 3027), pp. 523540.
    23. 23)
      • 10. Bolle, R.M., Connell, J.H., Ratha, N.K.: ‘Biometric perils and patches’, Pattern Recognit., 2002, 35, pp. 27272738 (doi: 10.1016/S0031-3203(01)00247-3).
    24. 24)
      • 14. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Sec., 2011, 3, DOI: 10.1186/1687-417X-2011-3.
    25. 25)
      • 23. ISO/IEC 19795 Information technology – Biometric performance testing and reporting, 2006.
    26. 26)
      • 6. Schreier, W., Boult, T.: ‘Cracking fuzzy vaults and biometric encryption’. Biometrics Symp., 2007.
    27. 27)
      • 15. Goh, A., Ngo, D.C.L.: ‘Computation of cryptographic keys from face biometrics’. Communications and Multimedia Security, 2003 (LNCS, 2828), pp. 113.
    28. 28)
      • 1. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. ACM Conf. Computer and Communication Security, 1999, pp. 2836.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2012.0041
Loading

Related content

content/journals/10.1049/iet-bmt.2012.0041
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address