access icon free Review of key-binding-based biometric data protection schemes

With the advent of modern technology, the use of biometric authentication systems has been on the rise. The core of any biometric system consists of a database which contains the biometric traits of the successfully enrolled users. As such, maintenance of the security of the database is paramount, i.e. it must be made sure that the contents of the database should not be compromised to foreign threats or adversaries. Biometric encryption (BE) is by far the most successfully studied and analysed technique used for providing this required level of security in biometric systems. In this survey, we discuss the intuition behind this idea and study in deep the key-binding-based mechanisms of BE which will provide a basic foundation for future novel researches in this area. In addition to the latest available survey, our paper investigates in details the core ideas behind the development of the fuzzy frameworks and includes the most recent works in the available literature. This study is concluded by inspecting the merging of multimodal biometrics with the fuzzy systems and discussing some open challenges in this domain.

Inspec keywords: database management systems; cryptography; biometrics (access control); fuzzy set theory

Other keywords: biometric encryption; biometric traits; database security maintenance; fuzzy systems; key-binding-based biometric data protection schemes; biometric authentication systems

Subjects: Combinatorial mathematics; Combinatorial mathematics; Data security; Database management systems (DBMS); Cryptography

References

    1. 1)
      • 116. Buhan, I.R., Doumen, J.M., Hartel, P.H., et al: ‘Constructing practical fuzzy extractors using QIM’. Technical Report TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, Enschede, July2007, http://eprints.eemcs.utwente.nl/10785/.
    2. 2)
      • 99. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Multibiometric cryptosystems based on feature-level fusion’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (1), pp. 255268.
    3. 3)
      • 109. Ao, M., Li, S.Z.: ‘Near infrared face based biometric key binding’. Proc. Third Int. Conf. on Advances in Biometrics, ser. ICB ’09, Berlin, Heidelberg, 2009, pp. 376385.
    4. 4)
      • 128. Choi, W.-Y., Pan, S.B., Kim, J.-M., et al: ‘Fast polynomial reconstruction attack against fuzzy fingerprint vault’. Fifth Int. Conf. on New Trends in Information Science and Service Science (NISS), October 2011, vol. 2, pp. 299302.
    5. 5)
      • 86. Eskander, G., Sabourin, R., Granger, E.: ‘Signature based fuzzy vaults with boosted feature selection’. IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM), April 2011, pp. 131138.
    6. 6)
      • 51. Wang, Y., Plataniotis, K.N.: ‘Fuzzy vault for face based cryptographic key generation’. Proc. Biometrics Symp. 2007, 2007.
    7. 7)
      • 107. Li, X., Sun, D.: ‘A dual-mode fingerprint fusion encryption method based on fuzzy vault’. Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), October 2012, pp. 208215.
    8. 8)
      • 50. Frassen, T., Zhou, X., Busch, C.: ‘Fuzzy vault for 3D face recognition systems’. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP ’08), August 2008, pp. 10691074.
    9. 9)
      • 96. Rathgeb, C., Uhl, A., Wild, P.: ‘Reliability-balanced feature level fusion for fuzzy commitment scheme’. Int. Joint Conf. on Biometrics (IJCB), October 2011, pp. 17.
    10. 10)
      • 82. Kumar, A., Wong, D.C., Shen, H.C., et al: ‘Personal authentication using hand images’, Pattern Recognit. Lett., 2006, 27, (13), pp. 14781486.
    11. 11)
      • 24. Veen, M.V.D., Kevenaar, T., jan Schrijen, G., et al: ‘Face biometrics with renewable templates’. Proc. of SPIE, Volume 6072: Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720J, 2006, p. 2006.
    12. 12)
      • 118. Ballard, L., Kamara, S., Reiter, M.K.: ‘The practical subtleties of biometric key generation’. Proc. 17th Conf. Security Symp., ser. SS'08, Berkeley, CA, USA, 2008, pp. 6174.
    13. 13)
      • 9. Stoianov, A., Kevenaar, T., van der Veen, M.: ‘Security issues of biometric encryption’. IEEE Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH), September 2009, pp. 3439.
    14. 14)
      • 52. Chang, Y.-J., Zhang, W., Chen, T.: ‘Biometrics-based cryptographic key generation’. IEEE Int. Conf. on Multimedia and Expo (ICME ’04), June 2004, vol. 3, pp. 22032206.
    15. 15)
      • 37. Li, P., Yang, X., Cao, K., et al: ‘An alignment-free fingerprint cryptosystem based on fuzzy vault scheme’, J. Netw. Comput. Appl., 2010, 33, (3), pp. 207220.
    16. 16)
      • 61. Lee, Y.J., Bae, K., Lee, S.J., et al: ‘Biometric key binding: fuzzy vault based on iris images’. Proc. 2007 Int. Conf. on Advances in Biometrics, ser. ICB'07, Berlin, Heidelberg, 2007, pp. 800808.
    17. 17)
      • 70. Chen, L., Xiang, Y., Chen, Y., et al: ‘Retinal image registration using bifurcation structures’. ICIP, 2011, pp. 21692172.
    18. 18)
      • 56. Feng, Y.C., Yuen, P.: ‘Protecting face biometric data on smartcard with Reed–Solomon code’. Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW), June 2006, pp. 2929.
    19. 19)
      • 98. Ross, A., Shahand, S., Shah, J.: ‘Image versus feature mosaicing: a case study in fingerprints’. Biometric Technology for Human Identification III, Orlando (Kissimmee), FL, April 2006, vol. 6202, pp. 112.
    20. 20)
      • 69. Meenakshi, V.S., Padmavathi, G.: ‘Security analysis of hardened retina based fuzzy vault’. Int. Conf. on Advances in Recent Technologies in Communication and Computing, October 2009, pp. 926930.
    21. 21)
      • 3. Jain, A.K., Flynn, P., Ross, A.A.: ‘Handbook of biometrics’ (Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007).
    22. 22)
      • 129. Hong, S., Jeon, W., Kim, S., et al: ‘The vulnerabilities analysis of fuzzy vault using password’. Second Int. Conf. on Future Generation Communication and Networking, December 2008, vol. 3, pp. 7683.
    23. 23)
      • 21. Rathgeb, C., Uhl, A.: ‘Adaptive fuzzy commitment scheme based on iris-code error analysis’. Second European Workshop on Visual Information Processing (EUVIP), July 2010, pp. 4144.
    24. 24)
      • 95. Bose, R., Ray-Chaudhuri, D.: ‘On a class of error correcting binary group codes’, Inf. Control, 1960, 3, (1), pp. 6879.
    25. 25)
      • 85. Eskander, G.S., Sabourin, R., Granger, E.: ‘A dissimilarity-based approach for biometric fuzzy vaults-application to handwritten signature images’. ICIAP Workshops, 2013 (LNCS, 8158), pp. 95102.
    26. 26)
      • 66. Wu, X., Qi, N., Wang, K., et al: ‘An iris cryptosystem for information security’. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP ’08), August 2008, pp. 15331536.
    27. 27)
      • 101. Meenakshi, V.S., Padmavathi, G.: ‘Secure and revocable multibiometric templates using fuzzy vault for fingerprint and iris’. ICT, ser. Communications in Computer and Information Science, 2010, vol. 101, pp. 206214.
    28. 28)
      • 88. Zhang, X., Shi, R., Ritcey, J.: ‘On the implementation of modified fuzzy vault for biometric encryption’. Information Theory and Applications Workshop (ITA), 2012, February 2012, pp. 5661.
    29. 29)
      • 111. Moon, D., Yong Choi, W., Moon, K., et al: ‘Fuzzy fingerprint vault using multiple polynomials’. IEEE 13th Int. Symp. on Consumer Electronics. ISCE ’09, May 2009, pp. 290293.
    30. 30)
      • 20. Rathgeb, C., Uhl, A.: ‘Context-based texture analysis for secure revocable iris-biometric key generation’. Third Int. Conf. on Crime Detection and Prevention (ICDP 2009), December 2009, pp. 16.
    31. 31)
      • 40. Uludag, U., Jain, A.: ‘Securing fingerprint template: fuzzy vault with helper data’. Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW ’06), June 2006, pp. 163163.
    32. 32)
      • 41. Nagar, A., Nandakumar, K., Jain, A.: ‘Securing fingerprint template: fuzzy vault with minutiae descriptors’. 19th Int. Conf. on Pattern Recognition (ICPR 2008), December 2008, pp. 14.
    33. 33)
      • 23. Nandakumar, K.: ‘A fingerprint cryptosystem based on minutiae phase spectrum’. IEEE Int. Workshop on Information Forensics and Security (WIFS), December 2010, pp. 16.
    34. 34)
      • 16. Verbitskiy, E., Tuyls, P., Denteneer, D., et al: ‘Reliable biometric authentication with privacy protection’. 24th Benelux Symp. on Inf. Theory, 2003, pp. 125132.
    35. 35)
      • 58. Mansfield, T., Kelly, G., Chandler, D., et al: ‘Biometric product testing final report’. Technical Report 1.0, National Physics Laboratory, UK, Teddington, Middlesex, 2001.
    36. 36)
      • 53. Wu, L., Yuan, S.: ‘A face based fuzzy vault scheme for secure online authentication’. Second Int. Symp. on Data, Privacy and E-Commerce (ISDPE), September 2010, pp. 4549.
    37. 37)
      • 38. Feng, J.: ‘Combining minutiae descriptors for fingerprint matching’, Pattern Recognit., 2008, 41, (1), pp. 342352.
    38. 38)
      • 18. Bringer, J., Chabanne, H., Cohen, G., et al: ‘Theoretical and practical boundaries of binary secure sketches’, IEEE Trans. Inf. Forensics Sec., 2008, 3, (4), pp. 673683.
    39. 39)
      • 110. Wang, W., Lu, Y., Fang, Z.: ‘Biometric template protection based on biometric certificate and fuzzy fingerprint vault’. Advanced Data Mining and Applications, 2013 (LNCS, 8346), pp. 241252.
    40. 40)
      • 62. Daugman, J.: ‘How iris recognition works?’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 2130.
    41. 41)
      • 106. Sowkarthika, S., Radha, N.: ‘Securing iris and fingerprint templates using fuzzy vault and symmetric algorithm’. Seventh Int. Conf. on Intelligent Systems and Control (ISCO), January 2013, pp. 189193.
    42. 42)
      • 125. Kholmatov, A., Yanikoglu, B.: ‘Realization of correlation attack against the fuzzy vault scheme’. Society of Photo-Optical Instrumentation Engineers (SPIE) Conf. Series, ser. Society of Photo-Optical Instrumentation Engineers (SPIE) Conf. Series, March 2008, vol. 6819.
    43. 43)
      • 35. Yang, S., Verbauwhede, I.: ‘Automatic secure fingerprint verification system based on fuzzy vault scheme’. Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP ’05), March 2005, vol. 5, pp. v/609v/612.
    44. 44)
      • 74. Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: ‘Cryptographic key generation using handwritten signature’. Biometric Technology for Human Identification III, SPIE, Bellingham, WA, USA, April 2006.
    45. 45)
      • 105. Brindha, V.E., Natarajan, A.M.: ‘Multi-modal biometric template security: fingerprint and palmprint based fuzzy vault’, J. Biometrics Biostat., 2012, 3, (6), p. 6.
    46. 46)
      • 10. Rathgeb, C., Busch, C.: ‘Multi-biometric template protection: issues and challenges, new trends and developments in biometrics’ (InTech, 2012), Ch. 8.
    47. 47)
      • 132. Barni, M., Bianchi, T., Catalano, D., et al: ‘A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates’. Fourth IEEE Int. Conf. on Biometrics: Theory Applications and Systems (BTAS), September 2010, pp. 17.
    48. 48)
      • 26. Maiorana, E., Campisi, P.: ‘Fuzzy commitment for function based signature template protection’, IEEE Signal Process. Lett., 2010, 17, (3), pp. 249252.
    49. 49)
      • 104. Cimato, S., Gamassi, M., Piuri, V., et al: ‘A multi-biometric verification system for the privacy protection of iris templates’. CISIS, ser. Advances in Soft Computing, 2008, vol. 53, pp. 227234.
    50. 50)
      • 27. Zheng, G., Li, W., Zhan, C.: ‘Cryptographic key generation from biometric data using lattice mapping’. ICPR. IEEE Computer Society, 2006, pp. 513516.
    51. 51)
      • 72. Vielhauer, C., Steinmetz, R., Mayerhofer, A.: ‘Biometric hash based on statistical features of online signatures’. Proc. 16th Int. Conf. on Pattern Recognition, 2002, vol. 1, pp. 123126.
    52. 52)
      • 32. Nguyen, T.H., Wang, Y., Ha, Y., et al: ‘Improved chaff point generation for vault scheme in bio-cryptosystems’, IET Biometrics, 2013, 2, (2), pp. 4855.
    53. 53)
      • 7. Cavoukian, A., Stoianov, A., Carter, F.: ‘Biometric encryption: technology for strong authentication, security and privacy’, in Leeuw, E., Fischer-Hoobner, S., Tseng, J., Borking, J. (Eds.): ‘Policies and research in identity management’, ser. The Int. Federation for Information Processing (Springer US, 2008), vol. 261, pp. 5777.
    54. 54)
      • 36. Jeffers, J., Arakala, A.: ‘Minutiae-based structures for a fuzzy vault’. Biometrics Symp.: Special Session on Research at the Biometric Consortium Conf., September 2006, pp. 16.
    55. 55)
      • 75. Eskander, G.S., Sabourin, R., Granger, E.: ‘A bio-cryptographic system based on offline signature images’, Inf. Sci., 2014, 259, (0), pp. 170191.
    56. 56)
      • 80. Lu, G., zhang, J., Shan, F.: ‘A novel template protection method based on palmprint feature’. Image Analysis and Recognition, 2013 (LNCS, 7950), pp. 8088.
    57. 57)
      • 19. Bringer, J., Chabanne, H., Cohen, G., et al: ‘Optimal iris fuzzy sketches’. First IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems (BTAS 2007), September 2007.
    58. 58)
      • 77. Jain, A., Feng, J.: ‘Latent palmprint matching’, IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (6), pp. 10321047.
    59. 59)
      • 93. Kelkboom, E.J.C., Zhou, X., Breebaart, J., et al: ‘Multi-algorithm fusion with template protection’. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, BTAS ’09, September 2009, pp. 18.
    60. 60)
      • 64. Kanade, S., Camara, D., Krichen, E., et al: ‘Three factor scheme for biometric-based cryptographic key regeneration using iris’. Biometrics Symp., 2008 (BSYM ’08), September 2008, pp. 5964.
    61. 61)
      • 63. Bae, K., Noh, S., Kim, J.: ‘Iris feature extraction using independent component analysis’. Audio- and Video-Based Biometric Person Authentication, 2003 (LNCS, 2688), pp. 838844.
    62. 62)
      • 42. Nandakumar, K., Jain, A., Pankanti, S.: ‘Fingerprint-based fuzzy vault: implementation and performance’, IEEE Trans. Inf. Forensics Sec., 2007, 2, (4), pp. 744757.
    63. 63)
      • 44. Moon, K., Moon, D., Yoo, J.-H., et al: ‘Biometrics information protection using fuzzy vault scheme’. SITIS. IEEE, 2012, pp. 124128.
    64. 64)
      • 127. Poon, H.T., Miri, A.: ‘A collusion attack on the fuzzy vault scheme’, ISeCure, ISC Int. J. Inf. Sec., 2009, 1, (1), pp. 2734.
    65. 65)
      • 126. Mihailescu, P.: ‘The fuzzy vault for fingerprints is vulnerable to brute force attack’. CoRR, 2007, vol. abs/0708.2974.
    66. 66)
      • 67. Reddy, E., Ramesh Babu, I.: ‘Performance of iris based hard fuzzy vault’. IEEE Eighth Int. Conf. Computer and Information Technology Workshops (CIT Workshops 2008), July 2008, pp. 248253.
    67. 67)
      • 114. Liu, H., Sun, D., Xiong, K., et al: ‘Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?’. Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), October 2011, pp. 279284.
    68. 68)
      • 122. Failla, P., Sutcu, Y., Barni, M.: ‘esketch: A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics’. Proc. 12th ACM Workshop on Multimedia and Security, ser. MM& Sec ’10, New York, NY, USA, 2010, pp. 241246.
    69. 69)
      • 103. Chikkerur, S., Wu, C., Govindaraju, V.: ‘A systematic approach for feature extraction in fingerprint images’. ICBA, 2004 (LNCS, 3072), pp. 344350.
    70. 70)
      • 120. Simoens, K., Tuyls, P., Preneel, B.: ‘Privacy weaknesses in biometric sketches’. 30th IEEE Symp. Security and Privacy, May 2009, pp. 188203.
    71. 71)
      • 22. Teoh, A.B.J., Kim, J.: ‘Secure biometric template protection in fuzzy commitment scheme’, IEICE Electron. Express, 2007, 4, (23), pp. 724730.
    72. 72)
      • 94. Kelkboom, E.J.C., Gokberk, B., Kevenaar, T.A.M., et al: ‘‘3d face’: biometric template protection for 3D face recognition’. ICB, 2007 (LNCS, 4642), pp. 566573.
    73. 73)
      • 5. Scheirer, W., Boult, T.: ‘Cracking fuzzy vaults and biometric encryption’. Biometrics Symp., September 2007, pp. 16.
    74. 74)
      • 90. Poon, H.T., Miri, A.: ‘On efficient decoding for the fuzzy vault scheme’. 11th Int. Conf. on Information Science, Signal Processing and their Applications (ISSPA), July 2012, pp. 454459.
    75. 75)
      • 73. Kholmatov, A., Yanikoglu, B.: ‘Biometric cryptosystem using online signatures’. Computer and Information Sciences (ISCIS 2006), 2006, pp. 981990.
    76. 76)
      • 47. Nguyen, T.H., Wang, Y., Ha, Y., et al: ‘Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints’, IET Biometrics, 2015, 4, (1), pp. 2939.
    77. 77)
      • 25. Lu, H., Martin, K., Bui, F., et al: ‘Face recognition with biometric encryption for privacy-enhancing self-exclusion’. 16th Int. Conf. on Digital Signal Processing, July 2009, pp. 18.
    78. 78)
      • 57. Joshi, V., Sanghavi, P.: ‘Three tier data storage security in cloud using face fuzzy vault’. Int. Conf. on Computing, Communication and Applications (ICCCA), February 2012, pp. 16.
    79. 79)
      • 100. Meenakshi, V.S., Padmavathi, G.: ‘Security analysis of password hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications’. Proc. CS, 2010, vol. 2, pp. 195206.
    80. 80)
      • 76. Eskander, G., Sabourin, R., Granger, E.: ‘Improving signature-based biometric cryptosystems using cascaded signature verification-fuzzy vault (sv-fv) approach’. 14th Int. Conf. on Frontiers in Handwriting Recognition (ICFHR), September 2014, pp. 187192.
    81. 81)
      • 49. Nagar, A., Chaudhury, S.: ‘Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme’. ICPR (4), 2006, pp. 537540.
    82. 82)
      • 1. Jain, A.K., Ross, A., Uludag, U.: ‘Biometric template security: challenges and solutions’. Proc. European Signal Processing Conf. (EUSIPCO), 2005.
    83. 83)
      • 45. Merkle, J., Ihmor, H., Korte, U., et al: ‘Performance of the fuzzy vault for multiple fingerprints (extended version)’. CoRR, 2010, vol. abs/1008.0807.
    84. 84)
      • 108. Lalithamani, N., Sabrigiriraj, M.: ‘Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem’, Imaging Sci. J., 2015, 63, (2), pp. 111118.
    85. 85)
      • 113. Tams, B., Mihailescu, P., Munk, A.: ‘Security considerations in minutiae-based fuzzy vaults’, IEEE Trans. Inf. Forensics Sec., 2015, 10, (5), pp. 985998.
    86. 86)
      • 55. Kim, A.-Y., Lee, S.-H.: ‘Authentication protocol using fuzzy eigenface vault based on moc’. The Ninth Int. Conf. on Advanced Communication Technology, February 2007, vol. 3, pp. 17711775.
    87. 87)
      • 71. Yip, W.K., Goh, A., Ngo, D.C.L., et al: ‘Generation of replaceable cryptographic keys from dynamic handwritten signatures’. Proc. Int. Conf. on Advances in Biometrics, ser. ICB'06, Berlin, Heidelberg, 2006, vol. 79, pp. 509515.
    88. 88)
      • 33. Orencik, C., Pedersen, T.B., Savas, E., et al: ‘Improved fuzzy vault scheme for fingerprint verification’. SECRYPT, 2008, pp. 3743.
    89. 89)
      • 92. Ross, A., Jain, A.K.: ‘Multimodal biometrics: an overview’. EUSIPCO, 2004, pp. 12211224.
    90. 90)
      • 65. Wu, X., Qi, N., Wang, K., et al: ‘A novel cryptosystem based on iris key generation’. Proc. Fourth Int. Conf. on Natural Computation – Volume 04, ser. ICNC ’08, Washington, DC, USA, 2008, pp. 5356.
    91. 91)
      • 87. Eskander, G.S., Sabourin, R., Granger, E.: ‘Offline signature-based fuzzy vault (OSFV: review and new results’. CoRR, 2014, vol. abs/1408.3985.
    92. 92)
      • 13. Massey, J.: ‘Shift-register synthesis and bch decoding’, IEEE Trans. Inf. Theory, 1969, 15, (1), pp. 122127.
    93. 93)
      • 14. Guruswami, V., Sudan, M.: ‘Improved decoding of reed-solomon and algebraic-geometry codes’, IEEE Trans. Inf. Theory, 1999, 45, (6), pp. 17571767.
    94. 94)
      • 78. Uludag, U., Member, S., Pankanti, S., et al: ‘Biometric cryptosystems: issues and challenges’. Proc. IEEE, 2004, pp. 948960.
    95. 95)
      • 130. Nandakumar, K., Jain, A.: ‘Biometric template protection: Bridging the performance gap between theory and practice’, IEEE Signal Process. Mag., 2015, 32, (5), pp. 88100.
    96. 96)
      • 131. Bringer, J., Chabanne, H.: ‘An authentication protocol with encrypted biometric data’. Progress in Cryptology AFRICACRYPT 2008, 2008 (LNCS, 5023), pp. 109124.
    97. 97)
      • 46. Hidano, S., Ohki, T., Komatsu, N., et al: ‘On biometric encryption using fingerprint and it's security evaluation’. Tenth Int. Conf. on Control, Automation, Robotics and Vision, December 2008, pp. 950956.
    98. 98)
      • 28. Clancy, T.C.: ‘Secure smartcard-based fingerprint authentication’. ACM Workshop on Biometrics: Methods and Applications, 2003, pp. 4552.
    99. 99)
      • 6. Adler, A.: ‘Vulnerabilities in biometric encryption systems’. Proc. Fifth Int. Conf. on Audio- and Video-Based Biometric Person Authentication, ser. AVBPA'05, Berlin, Heidelberg, 2005, pp. 11001109.
    100. 100)
      • 30. Chang, E.-C., Li, Q.: ‘Hiding secret points amidst chaff’. Proc. 24th Annual Int. Conf. on Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT'06, Berlin, Heidelberg, 2006, pp. 5972.
    101. 101)
      • 91. Marshall, K., Rosenthal, J., Schipani, D., et al: ‘Subspace fuzzy vault’. CoRR, 2012, vol. abs/1210.7190.
    102. 102)
      • 60. Lee, Y.J., Park, K.R., Lee, S.J., et al: ‘A new method for generating an invariant iris private key based on the fuzzy vault system’, IEEE Trans. Syst. Man Cybern. B, 2008, 38, (5), pp. 13021313.
    103. 103)
      • 84. Hailun Liu, K.X., Sun, D., Qiu, Z.: ‘Palmprint based multidimensional fuzzy vault scheme’, Sci. World J., 2014, no. Article ID 819031, p. 9.
    104. 104)
      • 97. Nandakumar, K., Jain, A.: ‘Multibiometric template security using fuzzy vault’. Second IEEE Int. Conf. on Biometrics: Theory, Applications and Systems, BTAS 2008, September 2008, pp. 16.
    105. 105)
      • 81. Kumar, A., Kumar, A.: ‘A palmprint-based cryptosystem using double encryption’. Biometric technology for human identification V, March 2008, vol. 6944, p. 9.
    106. 106)
      • 34. Chung, Y., Moon, D., Lee, S., et al: ‘Automatic alignment of fingerprint features for fuzzy fingerprint vault’. CISC, 2005 (LNCS, 3822), pp. 358369.
    107. 107)
      • 8. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Information Security, 2011, 2011, p. 3.
    108. 108)
      • 124. Chang, E.-C., Shen, R., Teo, F.W.: ‘Finding the original point set hidden among chaff’. Proc. 2006 ACM Symp. on Information, Computer and Communications Security, ser. ASIACCS ’06, New York, NY, USA, 2006, pp. 182188.
    109. 109)
      • 17. Hao, F., Anderson, R., Daugman, J.: ‘Combining crypto with biometrics effectively’, IEEE Trans. Comput., 2006, 55, (9), pp. 10811088.
    110. 110)
      • 89. Dodis, Y., Reyzin, L., Smith, A.: ‘Fuzzy extractors: how to generate strong keys from biometrics and other noisy data’. Advances in Cryptology – EUROCRYPT 2004, 2004 (LNCS, 3027), pp. 523540.
    111. 111)
      • 102. Meenakshi, V., Padmavathi, G.: ‘Retina and iris based multimodal biometric fuzzy vault’, Int. J. Comput. Appl., 2010, 1, (29), pp. 6773, Published by Foundation of Computer Science.
    112. 112)
      • 29. V. Neurotechnologija ltd: ‘www.neurotechnologija.com.’ [Online]. Available: www.neurotechnologija.com.
    113. 113)
      • 15. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. Sixth ACM Conf. on Computer and Communications Security, ser. CCS ’99, New York, NY, USA, 1999, pp. 2836.
    114. 114)
      • 12. Khalil-Hani, M., Marsono, M.N., Bakhteri, R.: ‘Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm’, Future Gener. Comput. Syst., 2013, 29, (3), pp. 800810.
    115. 115)
      • 112. Benhammadi, F., Bey, K.B.: ‘Password hardened fuzzy vault for fingerprint authentication system’, Image Vis. Comput., 2014, 32, (8), pp. 487496.
    116. 116)
      • 54. Wu, L., Xiao, P., Yuan, S., et al: ‘A fuzzy vault scheme for ordered biometrics’, JCM, 2011, 6, (9), pp. 682690.
    117. 117)
      • 119. Ignatenko, T., Willems, F.M.J.: ‘Information leakage in fuzzy commitment schemes’, IEEE Trans. Inf. Forensics Secur., 2010, 5, (2), pp. 337348.
    118. 118)
      • 31. Collins, C.R., Stephenson, K.: ‘A circle packing algorithm’, Comput. Geom. Theory Appl., 2003, 25, pp. 233256.
    119. 119)
      • 83. Verma, O., Bharathan, D.: ‘A new palm print based fuzzy vault system for securing cryptographic key’, Int. J. Inf. Electron. Eng., 2012, 2, (2), pp. 289292.
    120. 120)
      • 121. Kelkboom, E.J.C., Breebaart, J., Kevenaar, T.A.M., et al: ‘Preventing the decodability attack based cross-matching in a fuzzy commitment scheme’, IEEE Trans. Inf. Forensics Sec., 2011, 6, (1), pp. 107121.
    121. 121)
      • 2. Jain, A., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 420.
    122. 122)
      • 43. Nagar, A., Nandakumar, K., Jain, A.K.: ‘A hybrid biometric cryptosystem for securing fingerprint minutiae templates’, Pattern Recognit. Lett., 2010, 31, (8), pp. 733741.
    123. 123)
      • 117. Buhan, I., Doumen, J., Hartel, P., et al: ‘Fuzzy extractors for continuous distributions’. Proc. Second ACM Symp. on Information, Computer and Communications Security, ser. ASIACCS ’07, New York, NY, USA, 2007, pp. 353355.
    124. 124)
      • 48. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingerprint fuzzy vault using password’. Proc. Int. Conf. on Advances in Biometrics, ser. ICB'07, Berlin, Heidelberg, 2007, pp. 927937.
    125. 125)
      • 115. Ignatenko, T., Willems, F.M.J.: ‘Biometric systems: privacy and secrecy aspects’, IEEE Trans. Inf. Forensics Sec., 2009, 4, (4), pp. 956973.
    126. 126)
      • 11. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’. IEEE Int. Symp. on Information Theory, 2002, p. 408.
    127. 127)
      • 123. Merkle, J., Niesing, M., Schwaiger, M., et al: ‘Security capacity of the fuzzy fingerprint vault’, Int. J. Adv. Sec., 2010, 3, (3), pp. 146168.
    128. 128)
      • 79. Wu, X., Wang, K., Zhang, D.: ‘A cryptosystem based on palmprint feature’. 19th Int. Conf. on Pattern Recognition, December 2008, pp. 14.
    129. 129)
      • 59. Fouad, M., El-Saddik, A., Zhao, J., et al: ‘A fuzzy vault implementation for securing revocable iris templates’. IEEE Int. Systems Conf. (SysCon), April 2011, pp. 491494.
    130. 130)
      • 39. Uludag, U., Pankanti, S., Jain, A.K.: ‘Fuzzy vault for fingerprints’. Proc. AVBPA, 2005 (LNCS, 3546), pp. 310319.
    131. 131)
      • 4. Jain, A., Ross, A., Pankanti, S.: ‘Biometrics: a tool for information security’, IEEE Trans. Inf. Forensics Sec., 2006, 1, (2), pp. 125143.
    132. 132)
      • 68. Meenakshi, V.S., Padmavathi, G.: ‘Securing iris templates using combined user and soft biometric based password hardened fuzzy vault’. CoRR, 2010, vol. abs/1003.1449.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0035
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0035
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading