A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security

Edwin T. L. Rampine, Cynthia H. Ngejane

2016

Abstract

Biometric systems are vastly adopted and consolidated into various information and security systems. Hence, it is vital that these biometrics-based systems be immune to attacks. Fingerprint template protection is a critical part of fingerprint based biometric systems. A significant number of fingerprint template protection schemes have been published. However, none of the existing protection schemes can satisfy all security requirements for template protection. Hence more researchers are combining these single schemes to create more robust hybrid schemes. In this paper we present an overview of some of the various proposed hybrid schemes for fingerprint template security. We also present their general performance results. Our goal is to briefly report on this growing interest in creating a fully secure biometric hybrid scheme, and show some of the proposed solutions in the literature so far.

References

  1. Jain, A. K., Ross, A., & Prabhakar, S., 2004. An introduction to biometric recognition. Circuits and Systems for Video Technology, IEEE Transactions on, 14(1), 4-20.
  2. Cappelli, R., Maio, D., Lumini, A., & Maltoni, D., 2007. Fingerprint image reconstruction from standard templates. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 29(9), 1489-1503.
  3. Nagar, A., Nandakumar, K., & Jain, A. K., 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In Pattern Recognition, 2008. ICPR 2008. 19th International Conference on (pp. 1-4). IEEE.
  4. Feng, Y. C., Yuen, P. C., & Jain, A. K., 2008. A hybrid approach for face template protection. In SPIE Defense and Security Symposium (pp. 694408- 694408). International Society for Optics and Photonics.
  5. Liu, H., Sun, D., Xiong, K., & Qiu, Z., 2014. A hybrid approach to protect palmprint templates. The Scientific World Journal, 2014.
  6. Ratha, N. K., Connell, J. H., & Bolle, R. M., 2001. Enhancing security and privacy in biometrics-based authentication systems. IBM systems Journal, 40(3), 614-634.
  7. Vacca, J. R., 2007. Biometric technologies and verification systems. Butterworth-Heinemann.
  8. Ulaganathan, P., & Baskaran, J., 2015. Betterment of Fingerprint Template Protection Schemes-A Review. In International Journal on Recent and Innovation Trends in Computing and Communication, ISSN: 2321-8169, Vol. 3 Issue: 2, pp 165-171.
  9. Jain, A. K., Nandakumar, K., & Nagar, A., 2013. Fingerprint Template Protection: From Theory to Practice. In Security and Privacy in Biometrics (pp. 187-214). Springer London.
  10. Andrew Teoh Beng Jin and Lim Meng Hui, 2010 Cancelable biometrics. Scholarpedia, 5(1):9201.
  11. Teoh, A. B. J., Toh, K. A., & Yip, W. K., 2007. 2 N discretisation of biophasor in cancellable biometrics. In Advances in Biometrics (pp. 435-444). Springer Berlin Heidelberg.
  12. Ratha, N. K., Chikkerur, S., Connell, J. H., & Bolle, R. M., 2007. Generating cancelable fingerprint templates. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 29(4), 561-572.
  13. Mwema, J., Kimwele, M., & Kimani, S., 2015. A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates. International Journal of Computer Trends and Technology, 20(1), 12-18.
  14. Teoh, A. B., Kuan, Y. W., & Lee, S., 2008. Cancellable biometrics and annotations on biohash. Pattern recognition, 41(6), 2034-2044.
  15. Cheung, K. H., Kong, A. W. K., You, J., & Zhang, D., 2005. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing. In CISST (Vol. 2005, pp. 40-45).
  16. Radha, N., & Karthikeyan, S., 2011. An evaluation of fingerprint security using noninvertible biohash. International Journal of Network Security & Its Applications (IJNSA), 3(4).
  17. Ramu, T., & Arivoli, T., 2012. Biometric Template Security: An Overview. In Proceedings of International Conference on Electronics (Vol. 65).
  18. Uludag, U., Pankanti, S., Prabhakar, S., & Jain, A. K., 2004. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 92(6), 948-960.
  19. Juels, A., & Wattenberg, M., 1999. A fuzzy commitment scheme. In Proceedings of the 6th ACM conference on Computer and communications security (pp. 28-36). ACM.
  20. Draper, S. C., Khisti, A., Martinian, E., Vetro, A., & Yedidia, J. S., 2007. Using distributed source coding to secure fingerprint biometrics. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on (Vol. 2, pp. II-129). IEEE.
  21. Juels, A., & Sudan, M., 2006. A fuzzy vault scheme. Designs, Codes and Cryptography, 38(2), 237-257.
  22. Tuyls, P., Akkermans, A. H., Kevenaar, T. A., Schrijen, G. J., Bazen, A. M., & Veldhuis, R. N., 2005. Practical biometric authentication with template protection. In Audio-and Video-Based Biometric Person Authentication (pp. 436-446). Springer Berlin Heidelberg.
  23. Dodis, Y., Reyzin, L., & Smith, A., 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in cryptology-Eurocrypt 2004 (pp. 523-540). Springer Berlin Heidelberg.
  24. Verbitskiy, E., Tuyls, P., Obi, C., & Schoenmakers, B., 2010. Key extraction from general nondiscrete signals. Information Forensics and Security, IEEE Transactions on, 5(2), 269-279.
  25. Li, S. Z., 2009. Encyclopedia of Biometrics: I-Z (Vol. 1). Springer Science & Business Media.
  26. Rathgeb, C., & Uhl, A., 2010. Adaptive fuzzy commitment scheme based on iris-code error analysis. In Visual Information Processing (EUVIP), 2010 2nd European Workshop on (pp. 41-44). IEEE.
  27. Jain, A. K., Nandakumar, K., & Nagar, A. (2008). Biometric template security. EURASIP Journal on Advances in Signal Processing, 2008, 113.
  28. Campisi, P., 2013. Security and Privacy in Biometrics. London: Springer.
  29. Chen, H., & Chen, H., 2010. A hybrid scheme for securing fingerprint templates. International Journal of Information Security, 9(5), 353-361.
  30. Ghany, K. K., Hefny, H. A., Hassanien, A. E., & Ghali, N., 2012. A Hybrid approach for biometric template security. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on (pp. 941-942). IEEE.
  31. Liu, H., Sun, D., Xiong, K., & Qiu, Z., 2014. A hybrid approach to protect palmprint templates. The Scientific World Journal, 2014.
  32. Feng, Y. C., Yuen, P. C., & Jain, A. K., 2008. A hybrid approach for face template protection. In SPIE Defense and Security Symposium (pp. 694408- 694408). International Society for Optics and Photonics.
  33. Rathgeb, C., & Uhl, A., 2011. A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011(1), 1-25.
  34. Savvides, M., Kumar, B. V. K. V., & Khosla, P. K., 2004. Cancelable biometric filters for face recognition. In Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on (Vol. 3, pp. 922-925). IEEE.
  35. Nagar, A., Nandakumar, K., & Jain, A. K., 2010. A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 31(8), 733-741.
  36. Nandakumar, K., Nagar, A., & Jain, A. K., 2007. Hardening fingerprint fuzzy vault using password. In Advances in biometrics (pp. 927-937). Springer Berlin Heidelberg.
  37. Mirmohamadsadeghi, L., & Drygajlo, A., 2013. A template privacy protection scheme for fingerprint minutiae descriptors. In Biometrics Special Interest Group (BIOSIG), 2013 International Conference of the (pp. 1-8). IEEE.
  38. Bringer, J., Chabanne, H., & Kindarji, B., 2008. The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming, 74(1), 43-51.
  39. Lalithamani, N., & Soman, K., 2009. An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates. Int. J. Comput. Sci. Netw. Secur, 9(3), 183-193.
  40. Valencia, V. S., 2003. Biometric Testing: It's Not as Easy as You Think'. In Biometric Consortium Conference.
  41. Maio, D., Maltoni, D., Cappelli, R., Wayman, J. L., & Jain, A. K., 2002. FVC2002: Second fingerprint verification competition. In Pattern recognition, 2002. Proceedings. 16th international conference on (Vol. 3, pp. 811-814). IEEE.
  42. Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., & Scotti, F., 2004. Accuracy and performance of biometric systems. In Instrumentation and Measurement Technology Conference, 2004. IMTC 04. Proceedings of the 21st IEEE (Vol. 1, pp. 510- 515). IEEE.
Download


Paper Citation


in Harvard Style

Rampine E. and Ngejane C. (2016). A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 340-346. DOI: 10.5220/0005730503400346


in Bibtex Style

@conference{icissp16,
author={Edwin T. L. Rampine and Cynthia H. Ngejane},
title={A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={340-346},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005730503400346},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security
SN - 978-989-758-167-0
AU - Rampine E.
AU - Ngejane C.
PY - 2016
SP - 340
EP - 346
DO - 10.5220/0005730503400346