Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment

Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne

2015

Abstract

We propose a novel vein extraction technique adapted to template protection and use it to apply a fuzzy commitment scheme. We construct dedicated error correcting codes that enable us to maintain a good accuracy after template protection. In a second application, we offer to overcome the alignment issues when comparing two vein templates by performing this step outside of the protection scheme. Different implementations are proposed to explore trade-offs between False Rejection Rate, False Acceptance Rate, comparison time and security. All approaches are tested on the recent database of University of Twente from ICB 2013. Our biometric performances are close to state of the art approaches whilst bringing security with the template protection scheme.

References

  1. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G. (2007). Optimal iris fuzzy sketches. In Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on, pages 1-6. IEEE.
  2. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G. (2008). Theoretical and practical boundaries of binary secure sketches. Information Forensics and Security, IEEE Transactions on, 3(4):673-683.
  3. Frangi, A. F., Niessen, W. J., Vincken, K. L., and Viergever, M. A. (1998). Multiscale vessel enhancement filtering. In Medical Image Computing and ComputerAssisted Interventation-MICCAI'98, pages 130-137. Springer.
  4. Fuksis, R., Kadikis, A., and Greitans, M. (2011). Biohashing and fusion of palmprint and palm vein biometric data. In Hand-Based Biometrics (ICHB), 2011 International Conference on, pages 1-6. IEEE.
  5. Hartung, D., Aastrup Olsen, M., Xu, H., Thanh Nguyen, H., and Busch, C. (2012). Comprehensive analysis of spectral minutiae for vein pattern recognition. Biometrics, IET, 1(1):25-36.
  6. Hartung, D. and Busch, C. (2009). Why vein recognition needs privacy protection. In Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP'09. Fifth International Conference on, pages 1090-1095. IEEE.
  7. Hartung, D., Olsen, M. A., Xu, H., and Busch, C. (2011). Spectral minutiae for vein pattern recognition. In Biometrics (IJCB), 2011 International Joint Conference on, pages 1-7. IEEE.
  8. Hirata, S. and Takahashi, K. (2009). Cancelable biometrics with perfect secrecy for correlation-based matching. In Advances in Biometrics, pages 868-878. Springer.
  9. Ignatenko, T. and Willems, F. M. (2010). Information leakage in fuzzy commitment schemes. Information Forensics and Security, IEEE Transactions on, 5(2):337-348.
  10. ISO (2011). Standard iso/iec 24745:2011. information technology - security techniques - biometric information protection.
  11. Juels, A. and Sudan, M. (2006). A fuzzy vault scheme. Des. Codes Cryptography, 38(2):237-257.
  12. Juels, A. and Wattenberg, M. (1999). A fuzzy commitment scheme. In Motiwalla, J. and Tsudik, G., editors, ACM Conference on Computer and Communications Security, pages 28-36. ACM.
  13. Kelkboom, E. J., Breebaart, J., Kevenaar, T. A., Buhan, I., and Veldhuis, R. N. (2011). Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. Information Forensics and Security, IEEE Transactions on, 6(1):107-121.
  14. Korte, U. and Plaga, R. (2007). Cryptographic protection of biometric templates: Chance, challenges and applications. In Brömme, A., Busch, C., and Hühnlein, D., editors, BIOSIG, volume 108 of LNI, pages 33-46. GI.
  15. Kumar, A. and Zhou, Y. (2012). Human identification using finger images. Image Processing, IEEE Transactions on, 21(4):2228-2244.
  16. Ladoux, P.-O., Rosenberger, C., and Dorizzi, B. (2009). Palm vein verification system based on sift matching. In Advances in Biometrics, pages 1290-1298. Springer.
  17. Miura, N., Nagasaka, A., and Miyatake, T. (2004). Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Machine Vision and Applications, 15(4):194- 203.
  18. Miura, N., Nagasaka, A., and Miyatake, T. (2007). Extraction of finger-vein patterns using maximum curvature points in image profiles. IEICE TRANSACTIONS on Information and Systems, 90(8):1185-1194.
  19. Muller, D. E. (1954). Application of boolean algebra to switching circuit design and to error detection. Electronic Computers, Transactions of the IRE Professional Group on, (3):6-12.
  20. Rathgeb, C. and Uhl, A. (2011). A survey on biometric cryptosystems and cancelable biometrics. EURASIP Journal on Information Security, 2011(1):1-25.
  21. Reed, I. (1954). A class of multiple-error-correcting codes and the decoding scheme. Information Theory, Transactions of the IRE Professional Group on, 4(4):38-49.
  22. Shannon, C. E. (2001). A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review, 5(1):3-55.
  23. Simoens, K., Tuyls, P., and Preneel, B. (2009). Privacy weaknesses in biometric sketches. In IEEE Symposium on Security and Privacy, pages 188-203. IEEE Computer Society.
  24. Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E. M., and Preneel, B. (2012). Criteria towards metrics for benchmarking template protection algorithms. In Jain, A. K., Ross, A., Prabhakar, S., and Kim, J., editors, ICB, pages 498-505. IEEE.
  25. Smith, A. D. (2004). Maintaining secrecy when information leakage is unavoidable. PhD thesis, Citeseer.
  26. Stoianov, A., Kevenaar, T., and Van der Veen, M. (2009). Security issues of biometric encryption. In Science and Technology for Humanity (TIC-STH), 2009 IEEE Toronto International Conference, pages 34-39. IEEE.
  27. Tanner, R. M. (1981). A recursive approach to low complexity codes. Information Theory, IEEE Transactions on, 27(5):533-547.
  28. Ton, B. and Veldhuis, R. (2013). A high quality finger vascular pattern dataset collected using a custom designed capturing device. In Biometrics (ICB), 2013 International Conference on, pages 1-5. IEEE.
  29. Tuyls, P. and Goseling, J. (2004). Capacity and examples of template-protecting biometric authentication systems. In Biometric Authentication, pages 158-170. Springer.
  30. Uludag, U. and Jain, A. (2006). Securing fingerprint template: Fuzzy vault with helper data. In Computer Vision and Pattern Recognition Workshop, 2006. CVPRW'06. Conference on, pages 163-163. IEEE.
  31. Wu, X., He, Y., and Zhu, G. (2007). Performance of improved three-dimensional turbo product code decoder. In Integration Technology, 2007. ICIT'07. IEEE International Conference on, pages 563-567. IEEE.
  32. Xu, H., Veldhuis, R., Bazen, A. M., Kevenaar, T. A., Akkermans, T. A., and Gokberk, B. (2009). Fingerprint verification using spectral minutiae representations. Information Forensics and Security, IEEE Transactions on, 4(3):397-409.
  33. Yang, J. and Li, X. (2010). Efficient finger vein localization and recognition. In Pattern Recognition (ICPR), 2010 20th International Conference on, pages 1148-1151. IEEE.
  34. Yang, W., Hu, J., and Wang, S. (2013). A finger-vein based cancellable bio-cryptosystem. In Network and System Security, pages 784-790. Springer.
  35. Yu, C.-B., Qin, H.-F., Cui, Y.-Z., and Hu, X.-Q. (2009). Finger-vein image recognition combining modified hausdorff distance with minutiae feature matching. Interdisciplinary Sciences: Computational Life Sciences, 1(4):280-289.
  36. Zhou, Y. and Kumar, A. (2010). Contactless palm vein identification using multiple representations. In Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on, pages 1-6. IEEE.
Download


Paper Citation


in Harvard Style

Favre M., Picard S., Bringer J. and Chabanne H. (2015). Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 304-311. DOI: 10.5220/0005241403040311


in Bibtex Style

@conference{icissp15,
author={Mélanie Favre and Sylvaine Picard and Julien Bringer and Hervé Chabanne},
title={Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={304-311},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005241403040311},
isbn={978-989-758-081-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment
SN - 978-989-758-081-9
AU - Favre M.
AU - Picard S.
AU - Bringer J.
AU - Chabanne H.
PY - 2015
SP - 304
EP - 311
DO - 10.5220/0005241403040311