Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Biometric template protection based on Bloom filters and honey templates

Biometric verification can be considered one of the most reliable approaches to person authentication. However, biometrics are highly sensitive personal data and any information leakage poses severe security and privacy risks. Biometric templates should hence be protected and impersonation with stolen templates must be prevented, while preserving system's performance. In this study, a general biometric template protection scheme based on honey templates and Bloom filters is proposed, in order to grant privacy protection to the enrolled subject and detect the use of stolen templates. The performance and security evaluations show the soundness of the proposed scheme for facial verification. The benchmark is conducted with the publicly available BioSecure Multimodal DB and the free Bob image processing toolbox, so that research is fully reproducible.

References

    1. 1)
      • 30. Bloom, B.: ‘Space/time tradeoffs in hash coding with allowable errors’, Commun. ACM, 1970, 13, (7), pp. 422426.
    2. 2)
      • 7. Ratha, N., Connell, J., Bolle, R.: ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM Syst. J., 2001, 40, (3), pp. 614634.
    3. 3)
      • 8. Juels, A., Rivest, R.L.: ‘Honeywords: Making password-cracking detectable’. Proc. ACM SIGSAC Conf. on Computer and Communications Security, 2013, pp. 145160.
    4. 4)
      • 29. Ratha, N.K., Connell, J., Chikkerur, S.: ‘Generating cancelable fingerprint templates’, IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, (4), pp. 561572.
    5. 5)
      • 35. Bringer, J., Morel, C., Rathgeb, C.: ‘Security analysis of bloom filter-based iris biometric template protection’. Proc. Int. Conf. on Biometrics, ICB, 2015, pp. 527534.
    6. 6)
      • 2. Jain, A.K., Flynn, P., Ross, A.A.: ‘Handbook of biometrics’ (Springer, 2008).
    7. 7)
      • 27. Kong, A., Cheunga, K.-H., Zhanga, D., et al: ‘An analysis of BioHashing and its variants’, Pattern Recognit., 2006, 39, (7), pp. 13591368.
    8. 8)
      • 19. Anjos, A., El-Shafey, L., Wallace, R., et al: ‘Bob: a free signal processing and machine learning toolbox for researchers’. Proc. ACM Int. Conf. on Multimedia, MM, 2012, pp. 14491452.
    9. 9)
      • 14. Li, G., Yang, B., Rathgeb, C., et al: ‘Towards generating protected fingerprint templates based on bloom filters’. Proc. Int. Workshop on Biometrics and Forensics (IWBF), 2015.
    10. 10)
      • 24. Juels, A., Sudan, M.: ‘A fuzzy vault scheme’, Des. Codes Cryptogr., 2006, 38, (2), pp. 237257.
    11. 11)
      • 36. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al: ‘Unlinkable and irreversible biometric template protection based on bloom filters’, Inf. Sci., 2016, 370–371, pp. 1832.
    12. 12)
      • 37. Rathgeb, C., Breitinger, F., Busch, C., et al: ‘On the application of bloom filters to iris biometrics’, IET Biometrics, 2014, 3, (1), pp. 207218.
    13. 13)
      • 25. Nandakumar, K., Jain, A.K., Pankanti, S.: ‘Fingerprint-based fuzzy vault: implementation and performance’, IEEE Trans. Inf. Forensics Sec., 2007, 2, pp. 744757.
    14. 14)
      • 3. Jain, A.K., Nandakumar, K., Nagar, A.: ‘Biometric template security’, EURASIP J. Adv. Signal Process., 2008, 2008, pp. 117.
    15. 15)
      • 15. Abe, N., Yamada, S., Shinzaki, T.: ‘Irreversible fingerprint template using minutiae relation code with bloom filter’. Proc. Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS), 2015.
    16. 16)
      • 10. Martiri, E., Yang, B., Busch, C.: ‘Protected honey face templates’. Proc. BIOSIG, 2015.
    17. 17)
      • 1. Jain, A.K., Ross, A., Prabhakar, S.: ‘An introduction to biometric recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, pp. 420.
    18. 18)
      • 12. Rathgeb, C., Breitinger, F., Busch, C.: ‘Alignment-free cancelable iris biometric templates based on adaptive bloom filters’. Proc. Int. Conf. on Biometrics, ICB, 2013, pp. 18.
    19. 19)
      • 26. Wu, Y., Qiu, B.: ‘Transforming a pattern identifier into biometric key generators’. Proc. Int. Conf. on Multimedia and Expo, ICME, 2010, pp. 7882.
    20. 20)
      • 33. Hermans, J., Mennink, B., Peeters, R.: ‘When a bloom filter is a doom filter: security assessment of a novel iris biometric’. Proc. Int. Conf. of the Biometrics Special Interest Group, BIOSIG, 2014.
    21. 21)
      • 18. Zhang, W., Shan, S., Gao, W., et al: ‘Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition’. Proc. Int. Conf. on Computer Vision, ICCV, 2005, vol. 1, pp. 786791.
    22. 22)
      • 39. Gadat, S., Younes, L.: ‘A stochastic algorithm for feature selection in pattern recognition’, J. Mach. Learn. Res., 2007, 8, pp. 509547.
    23. 23)
      • 11. ISO/IEC JTC1 SC27 Security Techniques, ISO/IEC 24745:2011: ‘Information technology – security techniques – biometric information protection, International Organization for Standardization, 2011, 14.
    24. 24)
      • 22. Juels, A.: ‘A bodyguard of lies: The use of honey objects in information security’. Proc. ACM Symp. on Access Control Models and Technologies, 2014, pp. 14.
    25. 25)
      • 6. Uludag, U., Pankanti, S., Prabhakar, S., et al: ‘Biometric cryptosystems: issues and challenges’, Proc. IEEE, 2004, 92, (6), pp. 948960.
    26. 26)
      • 31. Broder, A., Mitzenmacher, M.: ‘Network applications of bloom filters: a survey’, Internet Math., 2005, 1, (4), pp. 485509.
    27. 27)
      • 23. Simoens, K., Yang, B., Zhou, X., et al: ‘Criteria towards metrics for benchmarking template protection algorithms’. Proc. Int. Conf. on Biometrics, ICB, 2012, pp. 498505.
    28. 28)
      • 21. Yuill, J., Zappe, M., Denning, D., et al: ‘Honeyfiles: deceptive files for intrusion detection’. Proc. SMC Information Assurance Workshop (IAW), 2004, pp. 116122.
    29. 29)
      • 17. Ortega-Garcia, J., Fierrez, J., Alonso-Fernandez, F., et al: ‘The multi-scenario multi-environment BioSecure multimodal database (BMDB)’, IEEE Trans. Pattern Anal. Mach. Intell., 2010, 32, pp. 10971111.
    30. 30)
      • 9. Yang, B., Martiri, E.: ‘Using honey templates to augment hash based biometric template protection’. Proc. Int. Workshop on Secure Identity Management in the Cloud Environment (SIMICE), 2015.
    31. 31)
      • 28. Teoh, A.B.J., Goh, A., Ngo, D.C.L.: ‘Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs’, IEEE Trans. Pattern Anal. Mach. Intell., 2006, 28, (12), pp. 18921901.
    32. 32)
      • 5. Rathgeb, C., Uhl, A.: ‘A survey on biometric cryptosystems and cancelable biometrics’, EURASIP J. Inf. Secur., 2011, 2011, (3), doi:10.1186/1687-417X-2011-3.
    33. 33)
      • 13. Gomez-Barrero, M., Rathgeb, C., Galbally, J., et al: ‘Protected facial biometric templates based on local Gabor patterns and adaptive bloom filters’. Proc. Int. Conf. on Pattern Recognition, ICPR, 2014, pp. 44834488.
    34. 34)
      • 20. Spitzner, L.: ‘Honeypots: tracking hackers’ (Addison Wesley, 2002).
    35. 35)
      • 16. Rathgeb, C., Gomez-Barrero, M., Busch, C., et al: ‘Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris’. Proc. Int. Workshop on Biometrics and Forensics, IWBF, 2015, pp. 17.
    36. 36)
      • 38. Gunther, M., Wallace, R., Marcel, S.: ‘An open source framework for standardized comparisons of face recognition algorithms’. Proc. European Conf. on Computer Vision, ECCV (ser. LNCS 7585), 2012, pp. 547556.
    37. 37)
      • 32. Daugman, J.: ‘How iris recognition works’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 2130.
    38. 38)
      • 34. Rathgeb, C., Busch, C.: ‘Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters’, Comput. Sec., 2014, 42, (0), pp. 112.
    39. 39)
      • 4. Cavoukian, A., Stoianov, A.: ‘Biometric encryption in encyclopaedia of biometrics’ (Springer Verlag, 2009).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-bmt.2015.0111
Loading

Related content

content/journals/10.1049/iet-bmt.2015.0111
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address