http://iet.metastore.ingenta.com
1887

access icon openaccess Biometric template protection based on Bloom filters and honey templates

  • HTML
    105.23828125Kb
  • PDF
    3.821420669555664MB
  • XML
    98.798828125Kb
Loading full text...

Full text loading...

/deliver/fulltext/iet-bmt/6/1/IET-BMT.2015.0111.html;jsessionid=3r0hqmljd8a61.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fiet-bmt.2015.0111&mimeType=html&fmt=ahah

References

    1. 1)
      • 1. Jain, A.K., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, pp. 420.
    2. 2)
      • 2. Jain, A.K., Flynn, P., Ross, A.A.: ‘Handbook of biometrics’ (Springer, 2008).
    3. 3)
      • 3. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, 2008, pp. 117.
    4. 4)
      • 4. Cavoukian, A., Stoianov, A.: ‘Biometric encryption in encyclopaedia of biometrics’ (Springer Verlag, 2009).
    5. 5)
      • 5. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 2011, (3), doi:10.1186/1687-417X-2011-3.
    6. 6)
      • 6. Uludag, U., Pankanti, S., Prabhakar, S., et al: ‘Biometric cryptosystems: issues and challenges’, Proc. IEEE, 2004, 92, (6), pp. 948960.
    7. 7)
      • 7. Ratha, N., Connell, J., Bolle, R.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (3), pp. 614634.
    8. 8)
      • 8. Juels, A., Rivest, R.L.: ‘Honeywords: Making password-cracking detectable’. Proc. ACM SIGSAC Conf. on Computer and Communications Security, 2013, pp. 145160.
    9. 9)
      • 9. Yang, B., Martiri, E.: ‘Using honey templates to augment hash based biometric template protection’. Proc. Int. Workshop on Secure Identity Management in the Cloud Environment (SIMICE), 2015.
    10. 10)
      • 10. Martiri, E., Yang, B., Busch, C.: ‘Protected honey face templates’. Proc. BIOSIG, 2015.
    11. 11)
      • 11. ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011: ‘Information technology – security techniques – biometric information protection, International Organization for Standardization, 2011, 14.
    12. 12)
      • 12. Rathgeb, C., Breitinger, F., Busch, C.: ‘Alignment-free cancelable iris biometric templates based on adaptive bloom filters’. Proc. Int. Conf. on Biometrics, ICB, 2013, pp. 18.
    13. 13)
      • 13. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al: ‘Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters’. Proc. Int. Conf. on Pattern Recognition, ICPR, 2014, pp. 44834488.
    14. 14)
      • 14. Li, G., Yang, B., Rathgeb, C., et al: ‘Towards generating protected fingerprint templates based on bloom filters’. Proc. Int. Workshop on Biometrics and Forensics (IWBF), 2015.
    15. 15)
      • 15. Abe, N., Yamada, S., Shinzaki, T.: ‘Irreversible fingerprint template using minutiae relation code with bloom filter’. Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2015.
    16. 16)
      • 16. Rathgeb, C., Gomez-Barrero, M., Busch, C., et al: ‘Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris’. Proc. Int. Workshop on Biometrics and Forensics, IWBF, 2015, pp. 17.
    17. 17)
      • 17. Ortega-Garcia, J., Fierrez, J., Alonso-Fernandez, F., et al: ‘The multi-scenario multi-environment BioSecure multimodal database (BMDB)’, IEEE Trans. Pattern Anal. Mach. Intell., 2010, 32, pp. 10971111.
    18. 18)
      • 18. Zhang, W., Shan, S., Gao, W., et al: ‘Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition’. Proc. Int. Conf. on Computer Vision, ICCV, 2005, vol. 1, pp. 786791.
    19. 19)
      • 19. Anjos, A., El-Shafey, L., Wallace, R., et al: ‘Bob: a free signal processing and machine learning toolbox for researchers’. Proc. ACM Int. Conf. on Multimedia, MM, 2012, pp. 14491452.
    20. 20)
      • 20. Spitzner, L.: ‘Honeypots: tracking hackers’ (Addison Wesley, 2002).
    21. 21)
      • 21. Yuill, J., Zappe, M., Denning, D., et al: ‘Honeyfiles: deceptive files for intrusion detection’. Proc. SMC Information Assurance Workshop (IAW), 2004, pp. 116122.
    22. 22)
      • 22. Juels, A.: ‘A bodyguard of lies: The use of honey objects in information security’. Proc. ACM Symp. on Access Control Models and Technologies, 2014, pp. 14.
    23. 23)
      • 23. Simoens, K., Yang, B., Zhou, X., et al: ‘Criteria towards metrics for benchmarking template protection algorithms’. Proc. Int. Conf. on Biometrics, ICB, 2012, pp. 498505.
    24. 24)
      • 24. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’, Des. Codes Cryptogr., 2006, 38, (2), pp. 237257.
    25. 25)
      • 25. Nandakumar, K., Jain, A.K., Pankanti, S.: ‘Fingerprint-based fuzzy vault: implementation and performance’, IEEE Trans. Inf. Forensics Sec., 2007, 2, pp. 744757.
    26. 26)
      • 26. Wu, Y., Qiu, B.: ‘Transforming a pattern identifier into biometric key generators’. Proc. Int. Conf. on Multimedia and Expo, ICME, 2010, pp. 7882.
    27. 27)
      • 27. Kong, A., Cheunga, K.-H., Zhanga, D., et al: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 13591368.
    28. 28)
      • 28. Teoh, A.B.J., Goh, A., Ngo, D.C.L.: ‘Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs’, IEEE Trans. Pattern Anal. Mach. Intell., 2006, 28, (12), pp. 18921901.
    29. 29)
      • 29. Ratha, N.K., Connell, J., Chikkerur, S.: ‘Generating cancelable fingerprint templates’, IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, (4), pp. 561572.
    30. 30)
      • 30. Bloom, B.: ‘Space/time tradeoffs in hash coding with allowable errors’, Commun. ACM, 1970, 13, (7), pp. 422426.
    31. 31)
      • 31. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2005, 1, (4), pp. 485509.
    32. 32)
      • 32. Daugman, J.: ‘How iris recognition works’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 2130.
    33. 33)
      • 33. Hermans, J., Mennink, B., Peeters, R.: ‘When a bloom filter is a doom filter: security assessment of a novel iris biometric’. Proc. Int. Conf. of the Biometrics Special Interest Group, BIOSIG, 2014.
    34. 34)
      • 34. Rathgeb, C., Busch, C.: ‘Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters’, Comput. Sec., 2014, 42, (0), pp. 112.
    35. 35)
      • 35. Bringer, J., Morel, C., Rathgeb, C.: ‘Security analysis of bloom filter-based iris biometric template protection’. Proc. Int. Conf. on Biometrics, ICB, 2015, pp. 527534.
    36. 36)
      • 36. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al: ‘Unlinkable and irreversible biometric template protection based on bloom filters’, Inf. Sci., 2016, 370–371, pp. 1832.
    37. 37)
      • 37. Rathgeb, C., Breitinger, F., Busch, C., et al: ‘On the application of bloom filters to iris biometrics’, IET Biometrics, 2014, 3, (1), pp. 207218.
    38. 38)
      • 38. Gunther, M., Wallace, R., Marcel, S.: ‘An open source framework for standardized comparisons of face recognition algorithms’. Proc. European Conf. on Computer Vision, ECCV (ser. LNCS 7585), 2012, pp. 547556.
    39. 39)
      • 39. Gadat, S., Younes, L.: ‘A stochastic algorithm for feature selection in pattern recognition’, J. Mach. Learn. Res., 2007, 8, pp. 509547.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0111
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0111
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address