biometric signals in an irreversible manner. The
majority of published approaches to template
protection schemes indicated a significant decrease in
recognition accuracy (Rathgeb and Uhl, 2011).
When considering biometric template protection
technologies, it is not actually clear which biometric
characteristics to apply in which type of application.
In fact, it has been shown that even the iris may not
exhibit enough reliable information to bind or extract
sufficiently long keys, to providing acceptable trade-
offs between accuracy and security. Stability of
biometric features is required to limit information
leakage of stored helper data. In addition, feature
adaption schemes that preserve accuracy must be
utilized in order to obtain common representations of
arbitrary biometric characteristics. Several
approaches to address such impediments in biometric
template protection schemes have been developed.
Extracting fixed-length binary fingerprint templates
(Bringer and Despiegel, 2010) and (Xu and Veldhuis,
2010) are an example.
7 CONCLUSIONS
In this paper we have reviewed the properties for a
generic biometric system and biometric template
protection schemes. These requirements were
analysed and measured against different approaches
proposed in the literature to define an ideal biometric
template protection schemes, which provides high
performance vs. accuracy and security vs. privacy. In
the future we would like to develop a more secure
hybrid scheme that will use password hardening
technique with one or more of the well-known
schemes such as surface folding and fuzzy vault
without compromising performance to improve the
revocability aspect of the scheme.
REFERENCES
Breebaart, J., Yang, B., Dulman, B., Busch, C., 2009.
Biometric Template Protection: The need for open
standards. Privacy and Data Security Journal.
Bringer J., Despiegel, V., 2010. Binary Feature Vector
Fingerprint Representation from Minutiae Vicinities. In
Proc. of the 4th IEEE Int. Conf. on Biometrics: Theory,
applications and systems (BTAS’10), pp. 1–6.
Cavoukian, A., Stoianov, A., 2009. Biometric Encryption:
The New Breed of Untraceable Biometrics. In
Biometrics: fundamentals, theory, and systems. Wiley.
Chang, Y., Zhang, W., and Chen, T., 2004. Biometrics-
Based Cryptographic Key Generation. Multimedia and
Expo, ICME’04, IEEE Imternational Conference on,
Taipei, pp. 2203-2206.
Connell, J. H., Ratha, N. K., and Zuo,J., 2010. Salting
System and Method for Cancelable Iris Biometrics. US
Patent, No. 0046808.
Das, P., Karthik, K., and Garai, B. C., 2012. A Robust
Alignment-free Fingerprint Hashing Algorithm Based
on Minimum Distance Graphs. Pattern Recognition,
45(9), 3373-3388.
Dodis, Y., Ostrovsky, R., L. Reyzin and Smith, A., 2008.
Fuzzy Extractors: How to Generate Strong Keys from
Biometrics and Other Noisy Data. International
Conference on the Theory and Applications of
Cryptographic Techniques: Advances in Cryptology
(EUROCRYPT ’04), Interlaken, Switzerland, pp. 523-
540.
Feng, Y. C., Yuen, P. C. and Jain, A. K., 2008. A Hybrid
Approach for Face Template Protection. SPIE Defense
and Security Symposium, Vol. 102, No. 2, pp. 169-177.
Hao, F., Anderson, R and Daugman, J., 2006. Combining
Crypto with Biometrics Effectively. IEEE Transactions
on Computers, pp. 1081-1088.
Jain, A., Nandakumar, K., Nagar, A., 2008. Biometric
Template Security. Journal on Advances in Signal
Processing, pp. 1-17. doi:10.1155/2008/579416.
Juels, A., Sudan, M., 2006. A Fuzzy Vault Scheme.
Designs, Codes and Cryptography, Vol. 38, No. 2, pp.
237- 257. doi:10.1007/s10623-005-6343-z.
Kanade, S., Petrovska-Delacretaz, D., and Dorizzi, B.,
2009. Cancelable Iris Biometrics and Using Error
Correcting Codes to Reduce Variability in Biometric
Data. Computer Vision and Pattern Recognition,
CVPR, IEEE Conference, Miami, pp. 120-127.
Kerschbaum, F., Atallah, M. J., M’Raïhi, D., Rice, J. R.,
2004. Private Fingerprint Verification without Local
Storage. In ICBA. (Hong Kong, China), pp. 87–394.
Lumini, A., Nanni, A., 2007. An Improved BioHashing for
Human Authentication. Pattern Recognition, Vol. 40,
No. 3, pp. 1057-1065. doi:10.1016/j.patcog.2006.05.
030.
Malhotra S., Verma, C., 2013. A Hybrid Approach for
Securing Biometric Template. International Journal of
Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Vol. 2, No. 5.
Maltoni, D., Maio, D., Jain, A. and Prabhakar, S., 2009.
HandBook of Fingerprint Recongnition. Springer, 2
nd
Edition.
Mwele, J., Kiman, S., 2015. A Simple Review of Biometric
Template Protection Schemes Used in Preventing
Adversary Attacks on Biometric Fingerprint
Templates. International Journal of Computer Trends
and Technology, 20(1), pp. 12-18.
Radha, N., Karthikeyan, S., 2011. An Evaluation of
Fingerprint Security Using Non-invertible Biohash.
International Journal of Network Security & Its
Applications (IJNSA), 3(4).
Rahultech, 2010, IT trends-latest/recent trends in
information technology http://rtmnuittrends.blogspot.
com/2010/09/biometrics.html
Ratha, N., Chikkerur, S., and Connell, J., 2007. Generating