2 RELATED WORK
One potential means of safe-guarding stored
templates is encryption. In a review article, Jain et
al, (2007) suggest that multiple acquisitions of the
same biometric trait will not yield the same feature
set and as a result biometric templates cannot be
stored in an encrypted form. Furthermore, the
biometric templates would need to be decrypted
prior to matching; therefore they will be inevitably
exposed to potential hacker attacks (Braithwaite et
al, 2002). Ratha et al, (2001) proposed the concept
of cancellable transforms to overcome the problems
of compromised biometric templates. The technique
introduced unique distortions of raw biometric data
such that instead of storing the original biometric it
is transformed using a one-way function; the
transformed biometric and transformation are stored.
In their proposal they conclude that transforms are
noninvertible therefore it is computationally hard to
recover the original biometric identifier from a
transformed version thus preserving privacy.
Braithwaite et al, (2002) argues that it is necessary
in some cases to reverse the transformation prior to
matching which would expose the raw biometric
data and make it susceptible to hacking. To
eliminate the need to revert the templates to a non-
transformed state during the authentication,
Braithwaite et al, (2002) propose the use of
application-specific biometric templates. In this
approach the biometric template assumes a new
format that is unique for each application and the
transformations are such that the matching can be
performed on the transformed templates. Argles et
al, (2007) consider a similar problem of ensuring
privacy of the users’ biometric even if the biometric
database server is compromised. They suggest a split
and merge technique which is a hybrid scheme
incorporating an electronic token and biometric
verification. In this method the encrypted biometric
template and user key is split during storage. One
half of the encrypted template is stored on an
electronic media and the other is retained inside the
secure biometric database. Storing the encrypted
data in two separate locations makes it difficult for
an intruder to compromise the system. Without the
decryption key the attacker will first be required to
break the encryption algorithm. Once the key
generator is exposed the information leakage
becomes problematic, reducing the difficulty of
guessing the template by half.
Other approaches which address the issue of
ensuring privacy of biometric templates include the
use of steganography (Jain & Uludag, 2003) and the
secure sketch scheme (Sutcu et al, 2007).
3 ANALYSIS OF SPLIT AND
MERGE TECHNIQUE
The split and merge technique attempts to ensure
privacy of the biometric factor by splitting the factor
into multiple components (Argles et al, 2007). The
system uses a biometric (fingerprint) and physical
(USB drive) factor; where the removable storage
device is used to secure a user-selectable password
(user key). In figure 2 and figure 3 the enrolment
and matching processes of the method is shown. To
analyse the split and merge system we shall assume
that key generation, splitting, merging, encryption
and decryption functions have the following
properties:
Assumption 1: The key generation function is a
good pseudorandom function with a large period -
without knowing the seed, we cannot deduce the
next outcome of the generator irrespective of how
many previous outcomes we have collected
Assumption 2: The splitting function
),(: BbAaxS
a
splits an input x into two
components containing equal amounts of
information:
() ()
biaiBA =⇔=
Assumption 3: The encryption function is
Shannon secure (Shannon, 1951) and leaks no
information. For a cryptosystem:
}
)()
cmHmHcmkDE |,,,,,
These simplifications are made so we can
analyse the system independently of any weaknesses
that maybe inherited from these functions in
implementation.
}),{,( utkE
k
p
C
d
C
u
Figure 2: Enrolment using the split and merge method.
ENSURING PRIVACY OF BIOMETRIC FACTORS IN MULTI-FACTOR AUTHENTICATION SYSTEMS
45