Table 1: Biohashing analysis for the three datasets and for
different sizes of the BioCode.
Size A
1
A
2
A
3
A
4
A
5
A
6
A
7
A
8
A
9
512 1 0 0 0 0 1 0.36 0 0
256 1 0 0 0 0 1 0.36 0 0
128 1 0 0 0 0 0.99 0.36 0 0
64 0.99 0 0 0.02 0 0.99 0.36 0 0
32 0.98 0.03 0 0.19 0.03 0.94 0.36 0.03 0.07
512 1 0 0 0 0 1 0.46 0 0
256 1 0 0 0 0 0.99 0.46 0 0
128 0.99 0 0 0 0 0.99 0.46 0 0
64 0.99 0.01 0 0.09 0 0.99 0.46 0.01 0.02
32 0.92 0.07 0 0.4 0.06 0.93 0.46 0.12 0.12
512 1 0 0 0 0 0.99 0.62 0 0
256 1 0 0 0 0 0.99 0.62 0 0
128 0.99 0 0 0 0 1 0.62 0 0
64 0.99 0 0 0.01 0 1 0.62 0 0
32 0.84 0.02 0 0.18 0.02 0.95 0.62 0.05 0.05
Table 2: BioPhasor analysis for the three datasets and for
different sizes of the BioCode.
Size A
1
A
2
A
3
A
4
A
5
A
6
A
7
A
8
A
9
512 1 0 0 0 0 0.99 0.36 0 0
256 1 0 0 0 0 1 0.36 0 0
128 1 0 0 0 0 1 0.36 0 0
64 1 0 0 0.28 0 0.99 0.36 0 0
32 0.99 0 0 0.84 0 0.99 0.36 0 0
512 1 0 0 0 0 0.99 0.46 0 0
256 1 0 0 0 0 1 0.46 0 0
128 1 0 0 0 0 1 0.46 0 0
64 1 0 0 0 0 0.99 0.46 0 0
32 1 0 0 0 0 0.99 0.46 0 0
512 1 0 0 0 0 1 0.62 0 0
256 1 0 0 0 0 1 0.62 0 0
128 1 0 0 0 0 0.99 0.62 0 0
64 1 0 0 0 0 0.99 0.62 0 0
32 1 0 0 0 0 0.99 0.62 0 0
When the BioCode size is low, the BioHashing can be
attacked with different scenarios. That is not the case
for the the BioPhasor algorithm that is much more
robust. The big problem is related to the A
6
metric
for the worst case scenario. In this context, the im-
postor has obtained the K
z
(transformation parame-
ters) for user z to impersonate and used his/her own
biometric data (zero effort attack). These two algo-
rithms are not robust to this attack (it is known but the
proposed methodology permits to valuate it). When
the BioCode size is low and for the BioHashing algo-
rithm, this probability is not exactly 1. This can be ex-
plained by the fact the performance as mentioned ear-
lier is not perfect. The main benefit of these metrics is
to have quantitative and objective measures to assess
and compare template protection schemes based on a
transformation. If we want a more detail on attacks,
we can consider some curves describing the evolution
of the probability of successful attack for each sce-
nario related to the decision threshold value. Figures
2 and 3 present these curves for the two considered
algorithms for two BioCodes sizes (32 and 512 bits)
for the first dataset (others are similar). These curves
allow us to compare the efficiency of attacks from
the most efficient (worst case) to the less one (brute
force). We show the value of the ε
EER
T
by a black dot
line. The value of the metrics corresponds to the prob-
ability of successful attack for this point. This eval-
uation methodology has been implemented in Mat-
lab in order to automatically compute these metrics
and curves. The computation time to generate these 9
metrics depends on the BioCode size. For 32 bits, it
takes less one minute but for 512 bits, computations
take approximatively 3 hours using Matlab on a com-
puter (I7 with 2.4GHz).
6 CONCLUSION AND
PERSPECTIVES
The protection of biometric data is a crucial trend in
computer security as it becomes a classical tool for
authentication. We proposed in this paper an evalu-
ation methodology to estimate the performance and
robustness of template protection schemes based on
the transformation of biometric raw data. The benefit
of this solution is to measure with quantitative met-
rics the efficiency of well known attacks on these pro-
tection schemes. With this methodology, we are able
to compare objectively different transformations. The
proposed solution is also very important for the de-
signing of such protection schemes. Perspectives of
this study is first a comparative study of the main pro-
tection schemes based on biometric transformation.
Many such transformations have been proposed in the
last decade, as it represents an efficient way to pro-
tect biometric raw data (even in embedded devices).
Second, we intend to design our own transformation
minimizing the proposed metrics.
REFERENCES
Belguechi, R., Hafiane, A., Cherrier, E., and Rosenberger,
C. (2016). Comparative study on texture features for
fingerprint recognition: application to the biohashing
template protection scheme. Journal of Electronic
Imaging, 25(1):013033–013033.
Belguechi, R., Rosenberger, C., and Aoudia, S. (2010).
Biohashing for securing minutiae template. In Pro-
ceedings of the 20th International Conference on Pat-
tern Recognition, pages 1168–1171, Washington, DC,
USA.
Bolle, R., Connell, J., and Ratha, N. (2002). Biometric per-
ils and patches. Pattern Recognition, 35(12):2727–
2738.
Bringer, J., Chabanne, H., Favre, M., Patey, A., Schneider,
T., and Zohner, M. (2014). Gshade: faster privacy-
preserving distance computation and biometric iden-
tification. In Proceedings of the 2nd ACM workshop
on Information hiding and multimedia security, pages
187–198. ACM.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
222