http://iet.metastore.ingenta.com
1887

Operational bio-hash to preserve privacy of fingerprint minutiae templates

Operational bio-hash to preserve privacy of fingerprint minutiae templates

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Biometrics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The storage of fingerprints is an important issue as this biometric modality is more and more deployed for real applications. Considering minutiae templates as sensitive information, a key question concerns the secure and privacy management of this digital identity. Indeed, if an attacker obtains the minutiae template of a subject, he/she will be able to generate a fingerprint having the same characteristics. Instead of directly storing the minutiae templates, the authors propose in this study a new adaptation of BioHashing to generate a cancellable template in the context of un-ordered set of noisy minutiae features. To the authors knowledge, little interest has been paid in the literature to the question of protecting minutiae template by BioHashing until now. Using the FVC2002 benchmark database, they show the effectiveness of the proposed approach in term of privacy preservation. They show how the proposed method copes with irreversibility and diversity properties and therefore can be efficient in a realistic context.

References

    1. 1)
      • 1. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, 12, pp. 113:1113:17.
    2. 2)
      • 2. Ratha, N.K., Connell, J.H., Bolle, R.M.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (03), pp. 614634 (doi: 10.1147/sj.403.0614).
    3. 3)
      • 3. Dodis, Y., Reyzin, L., Smith, A.: ‘Fuzzy extractors: how to generate strong keys from biometrics and other noisy data’, Adv. Cryptol. Eurocrypt, 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 79–100 (Springer Verlag, 2004).
    4. 4)
      • 4. Teoh, A.B.J., Ngo, D., Goh, A.: ‘BioHashing: two factor authentication featuring fingerprint data and tokenised random number’, Pattern Recognit., 2004, 37, (11), pp. 22452255 (doi: 10.1016/j.patcog.2004.04.011).
    5. 5)
      • 5. Teoh, A.B.J., Kuan, Y., Lee, S.: ‘Cancellable biometrics and annotations on BioHash’, Pattern Recognit., 2007, 41, pp. 20342044 (doi: 10.1016/j.patcog.2007.12.002).
    6. 6)
      • 6. ISO/IEC 24745 Information technology – Security techniques – Biometric information protection, 2011.
    7. 7)
      • 7. Lumini, A., Nanni, L.: ‘Empirical tests on biohashing’, Neurocomputing, 2006, 69, (16), pp. 23902395.
    8. 8)
      • 8. Nanni, L., Lumini, A.: ‘Local binary patterns for a hybrid fingerprint matcher’, Pattern Recognit. J., 2008, 41, pp. 34613466 (doi: 10.1016/j.patcog.2008.05.013).
    9. 9)
      • 9. Kanak, A., Sogukpinar, I.: ‘Classification based revocable biometric identity code generation’ (BioID MultiComm, 2009).
    10. 10)
      • 10. Xu, H.: ‘Spectral minutiae representations for fingerprint recognition’. PhD thesis, University of Twente, 2010.
    11. 11)
      • 11. Yang, B., Hartung, D., Simoens, K., Busch, C.: ‘Dynamic random projection for biometric tempalte protection’ (4th IEEE BTAS, 2010).
    12. 12)
      • 12. Belguechi, R., Rosenberger, C., Ait-Aoudia, S.: ‘BioHashing for securing minutiae template’. Proc. 20th Int. Conf. Pattern Recognition (ICPR), 2010, pp. 118128.
    13. 13)
      • 13. Radha, N., Karthikeyan, S.: ‘An evaluation of fingerprint security using noninvertible biohash’, Int. J. Netw. Secur. Appl. (IJNSA), 2011, 3.
    14. 14)
      • 14. Nanni, L., Brahnam, S., Lumini, A.: ‘Biohashing applied to an orientation-based minutia descriptor for a secure fingerprint authentication system’, IET Electron. Lett., 2011, 47, (15), pp. 851853 (doi: 10.1049/el.2011.1525).
    15. 15)
      • 15. Tico, M., Kuosmanen, P.: ‘Fingerprint matching using an orientation-based minutia descriptor’, IEEE Trans. PAMI, 2003, 25, pp. 10091014 (doi: 10.1109/TPAMI.2003.1217604).
    16. 16)
      • 16. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: ‘Filterbank based fingerprint matching’, IEEE Trans. Image Process., 2000, 9, (5), pp. 846859 (doi: 10.1109/83.841531).
    17. 17)
      • 17. Juels, A., Wattenberg, M.: ‘A fuzzy commitment scheme’. Proc. Sixth ACM Conf. Computer and Communications Security, 1999.
    18. 18)
      • 18. Nagar, A., Nandakumar, K., Jain, A.K.: ‘A hybrid biometric cryptosystem for securing fingerprint minutiae templates’, Pattern Recognit. Lett., 2009, 31, (8), pp. 733741 (doi: 10.1016/j.patrec.2009.07.003).
    19. 19)
      • 19. Nandakumar, K., Nagar, A., Jain, A.K.: ‘Hardening fingeprint fuzzy vault using password’. Int. Conf. Biometrics, 2007.
    20. 20)
      • 20. Linnartz, J.M.G., Tuyls, P.: ‘New shielding functions to enhance privacy and prevent misuse of biometric templates’. Proc. Fourth Int. Conf. Audio- and Video-Based Biometric Person Authentication, 2003.
    21. 21)
      • 21. Sutcu, Y., Rane, S., Yedidia, J., Draper, S., Vetro, A.: ‘Feature extraction for a Slepian-Wolf biometric system using LDPC codes’. Proc. IEEE Int. Symp. Information Theory, 2008.
    22. 22)
      • 22. Scheirer, W., Boult, T.: ‘Cracking fuzzy vaults and biometric encryption’. Proc. Biometrics Symp., 2007.
    23. 23)
      • 23. Kholmatov, A., Yanikoglu, B.: ‘Realization of correlation attack against the fuzzy vault scheme’. Proc. SPIE: Biometrics, Security, Forensics, Steganography and Watermarking of Multimedia Contents, San Jose, USA, 2008.
    24. 24)
      • 24. Simoens, K., Yang, B., Zhou, X., et al.: ‘Criteria towards metrics for benchmarking template protection algorithms’ (ICB, 2012), pp. 498505.
    25. 25)
      • 25. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: ‘Generating cancelable fingerprint templates’ (IEEE Trans on PAMI, 2007).
    26. 26)
      • 26. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Biometric template transformation: a security analysis’. Proc. SPIE, 2010.
    27. 27)
      • 27. Kumar, G., Tulyakov, S., Govindaraju, V.: ‘Combination of symmetric hash functions for secure fingerprint matching’. Proc. 20th Int. Conf. Pattern Recognition (ICPR), 2010.
    28. 28)
      • 28. Farooq, F., Bolle, R.M., Tsai-Yang, J., Ratha, N.: ‘Anonymous and revocable fingerprint recognition’. IEEE Conf. CVPR, 2007.
    29. 29)
      • 29. Boult, T., Scheirer, W., Woodworth, R.: ‘Revocable fingerprint biotokens: accuracy and security analysis’. Int Conf. CVPR, 2007.
    30. 30)
      • 30. Lee, C., Kim, J.: ‘Cancelable fingerprint templates using minutiae-based bit-strings’, J. Netw. Comput. Appl., 2010, 33, pp. 236246 (doi: 10.1016/j.jnca.2009.12.011).
    31. 31)
      • 31. Jin, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: ‘Fingerprint template protection with minutiae-based bit-string for security and privacy preserving’, J. Expert Syst. Appl., 2012, 39, pp. 61576167 (doi: 10.1016/j.eswa.2011.11.091).
    32. 32)
      • 32. Savvides, M., Kumar, B., Khosla, P.: ‘Cancelable biometric filters for face recognition’. Proc. 17th Int. Conf. Pattern Recognition, 2004, vol. 3, pp. 922925.
    33. 33)
      • 33. Yip, W.K., Teoh, A.B.J., Ngo, D.C.L.: ‘Replaceable and securely hashed keys from online signatures’, IEICE Electron. Express, 2006, 3, (18), pp. 410416 (doi: 10.1587/elex.3.410).
    34. 34)
      • 34. Pillai, J.K., Patel, V.M., Chellappa, R., Ratha, N.K.: ‘Sectored random projections for cancelable iris biometrics’. Proc. IEEE Int. Conf. Acoustics Speech and Signal Processing (ICASSP), 2010, pp. 18381841.
    35. 35)
      • 35. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Sec., 2011, 3, pp. 2011:3.
    36. 36)
      • 36. Kaski, S.: ‘Dimensionality reduction by random mapping’. Int. Joint Conf. Neural Networks, 1998, pp. 413418.
    37. 37)
      • 37. Hazewinkel, M.: ‘Orthogonalization’, in ‘Encyclopedia of Mathematics’ (Kluwer Academic Publishers, 2002).
    38. 38)
      • 38. Kong, A., Cheung, K.H., Zhang, D., Kamel, M., You, J.: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2005, 39, pp. 13591368 (doi: 10.1016/j.patcog.2005.10.025).
    39. 39)
      • 39. Teoh, A.B.J., Kuan, Y.W., Kar-Ann, T.: ‘Cancellable biometrics and user-dependent multi-state discretization in BioHash’, Pattern Anal. Appl., 2010, 13, pp. 301307 (doi: 10.1007/s10044-009-0158-x).
    40. 40)
      • 40. Lumini, A., Nanni, L.: ‘An improved BioHashing for human authentication’, Pattern Recognit., 2007, 40, pp. 10571065 (doi: 10.1016/j.patcog.2006.05.030).
    41. 41)
      • 41. Pankanti, S., Prabhakar, S., Jain, A.: ‘On the individuality of fingerprints’, IEEE Trans. PAMI, 2002, 24, (8), pp. 10101025 (doi: 10.1109/TPAMI.2002.1023799).
    42. 42)
      • 42. Chikkerur, S., Cartwright, A.N., Govindaraju, V.: ‘K-plet and coupled BFS: a graph based fingerprint representation and matching algorithm’. Proc. Int. Conf. Biometrics, 2006, pp. 309315.
    43. 43)
      • 43. Zhang, W., Wang, Y.: ‘Core-based structure matching algorithm of fingerprint verification’. Proc. 16th Int. Conf. Pattern Recognition, 2002.
    44. 44)
      • 44. Liu, M., Jiang, X., Kot, A.C.: ‘Fingerprint reference-point detection’, EURASIP J. Appl. Signal Process., 2005, 4, pp. 498509.
    45. 45)
      • 45. Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: ‘FVC2002: second fingerprint verification competition’ (ICPR, Canada, 2002).
    46. 46)
      • 46. Daugman, J.: ‘The importance of being random: statistical principles of iris recognition’, Pattern Recognit., 2003, 36, (2), pp. 279291 (doi: 10.1016/S0031-3203(02)00030-4).
    47. 47)
      • 47. Nagar, A., Nandakumar, K., Jain, A.K.: ‘Biometric template transformation: a security analysis’. Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 2010.
    48. 48)
      • 48. Ang, R., Safavi-Naini, R., McAven, L.: ‘Cancellable key-based fingerprint templates’, ACISP, 2005, 3574, pp. 242252.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2012.0039
Loading

Related content

content/journals/10.1049/iet-bmt.2012.0039
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address