
 
2 RELATED WORK 
One potential means of safe-guarding stored 
templates is encryption. In a review article, Jain et 
al, (2007) suggest that multiple acquisitions of the 
same biometric trait will not yield the same feature 
set and as a result biometric templates cannot be 
stored in an encrypted form. Furthermore, the 
biometric templates would need to be decrypted 
prior to matching; therefore they will be inevitably 
exposed to potential hacker attacks (Braithwaite et 
al, 2002). Ratha et al, (2001) proposed the concept 
of cancellable transforms to overcome the problems 
of compromised biometric templates. The technique 
introduced unique distortions of raw biometric data 
such that instead of storing the original biometric it 
is transformed using a one-way function; the 
transformed biometric and transformation are stored. 
In their proposal they conclude that transforms are 
noninvertible therefore it is computationally hard to 
recover the original biometric identifier from a 
transformed version thus preserving privacy. 
Braithwaite  et al, (2002) argues that it is necessary 
in some cases to reverse the transformation prior to 
matching which would expose the raw biometric 
data and make it susceptible to hacking. To 
eliminate the need to revert the templates to a non-
transformed state during the authentication, 
Braithwaite  et al, (2002) propose the use of 
application-specific biometric templates. In this 
approach the biometric template assumes a new 
format that is unique for each application and the 
transformations are such that the matching can be 
performed on the transformed templates. Argles et 
al, (2007) consider a similar problem of ensuring 
privacy of the users’ biometric even if the biometric 
database server is compromised. They suggest a split 
and merge technique which is a hybrid scheme 
incorporating an electronic token and biometric 
verification. In this method the encrypted biometric 
template and user key is split during storage. One 
half of the encrypted template is stored on an 
electronic media and the other is retained inside the 
secure biometric database. Storing the encrypted 
data in two separate locations makes it difficult for 
an intruder to compromise the system. Without the 
decryption key the attacker will first be required to 
break the encryption algorithm. Once the key 
generator is exposed the information leakage 
becomes problematic, reducing the difficulty of 
guessing the template by half.  
Other approaches which address the issue of 
ensuring privacy of biometric templates include the 
use of steganography (Jain & Uludag, 2003) and the 
secure sketch scheme (Sutcu et al, 2007).  
3  ANALYSIS OF SPLIT AND 
MERGE TECHNIQUE 
The split and merge technique attempts to ensure 
privacy of the biometric factor by splitting the factor 
into multiple components (Argles et al, 2007).  The 
system uses a biometric (fingerprint) and physical 
(USB drive) factor; where the removable storage 
device is used to secure a user-selectable password 
(user key). In figure 2 and figure 3 the enrolment 
and matching processes of the method is shown. To 
analyse the split and merge system we shall assume 
that key generation, splitting, merging, encryption 
and decryption functions have the following 
properties: 
Assumption 1: The key generation function is a 
good pseudorandom function with a large period - 
without knowing the seed, we cannot deduce the 
next outcome of the generator irrespective of how 
many previous outcomes we have collected 
Assumption 2: The splitting function 
),(: BbAaxS
a
 splits an input x into two 
components containing equal amounts of 
information:
 
() ()
biaiBA =⇔=
  
Assumption 3: The encryption function is 
Shannon secure (Shannon, 1951) and leaks no 
information. For a cryptosystem: 
}
)()
cmHmHcmkDE |,,,,,
 
These simplifications are made so we can 
analyse the system independently of any weaknesses 
that maybe inherited from these functions in 
implementation. 
}),{,( utkE
k
p
C
d
C
u
 
Figure 2: Enrolment using the split and merge method. 
ENSURING PRIVACY OF BIOMETRIC FACTORS IN MULTI-FACTOR AUTHENTICATION SYSTEMS
45