5 CONCLUSION
We presented a method to create secure biometric
templates from real-valued feature vectors. We ver-
ified our theoretical findings by implementing a re-
cently proposed secure biometric template generation
algorithm over face and keystroke public data sets.
We expect that our new construction and its explicit
accuracy analysis will enable known cryptographic
techniques to protect biometric templates at a larger
scale.
ACKNOWLEDGEMENTS
This work was supported by the U.S. National Sci-
ence Foundation (award number 1718109). The state-
ments made herein are solely the responsibility of the
authors.
REFERENCES
Banerjee, S. P. and Woodard, D. L. (2012). Biometric au-
thentication and identification using keystroke dynam-
ics: A survey. Journal of Pattern Recognition Re-
search, 7(1):116–139.
Barbulescu, R., Gaudry, P., Joux, A., and Thom
´
e, E. (2014).
A heuristic quasi-polynomial algorithm for discrete
logarithm in finite fields of small characteristic. In
Advances in Cryptology – EUROCRYPT 2014, pages
1–16.
Blanton, M. and Gasti, P. (2011). Secure and effi-
cient protocols for iris and fingerprint identification.
ESORICS’11, European Symposium on Research in
Computer Security, pages 190–209.
Bodo, A. (1994). Method for producing a digital signature
with aid of a biometric feature. German patent DE,
42(43):908.
Bours, P. and Barghouthi, H. (2009). Continuous authen-
tication using biometric keystroke dynamics. In The
Norwegian Information Security Conference (NISK),
volume 1, pages 1–12.
Fairhurst, M. and Da Costa-Abreu, M. (2011). Using
keystroke dynamics for gender identification in social
network environment. In 4th International Conference
on Imaging for Crime Detection and Prevention 2011
(ICDP 2011), pages 1–6.
Feng, Y. C., Yuen, P. C., and Jain, A. K. (2010). A hy-
brid approach for generating secure and discriminat-
ing face template. IEEE Transactions on Information
Forensics and Security, 5(1):103–117.
Geitgey, A. (2017). Face recognition. https://github.
com/ageitgey/face recognition, last accessed: May
18, 2020.
Huang, G. B., Ramesh, M., Berg, T., and Learned-Miller,
E. (2007). Labeled faces in the wild: A database for
studying face recognition in unconstrained environ-
ments. Technical Report 07-49, University of Mas-
sachusetts, Amherst. http://vis-www.cs.umass.edu/
lfw/, last accessed: May 18, 2020.
Jindal, A. K., Chalamala, S. R., and Jami, S. K. (2019). Se-
curing face templates using deep convolutional neu-
ral network and random projection. In IEEE Inter-
national Conference on Consumer Electronics, ICCE
2019, pages 1–6.
Kanade, S., Petrovska-Delacr
´
etaz, D., and Dorizzi, B.
(2009). Cancelable iris biometrics and using error cor-
recting codes to reduce variability in biometric data.
In IEEE Conference on Computer Vision and Pattern
Recognition, CVPR 2009, pages 120–127.
Karabina, K. and Canpolat, O. (2016). A new cryptographic
primitive for noise tolerant template security. Pattern
Recognition Letters, 80:70 – 75.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly-detection algorithms for keystroke dynam-
ics. In IEEE/IFIP International Conference on De-
pendable Systems & Networks, 2009, DSN’09, pages
125–134.
King, D. E. (2011). Dlib library. http://dlib.net/, last ac-
cessed: May 18, 2020.
King, D. E. (2017). High quality face recognition with
deep metric learning. http://blog.dlib.net/2017/02/
high-quality-face-recognition-with-deep.html, last
accessed: May 18, 2020.
Naresh Boddeti, V. (2018). Secure face matching using
fully homomorphic encryption. In 2018 IEEE 9th In-
ternational Conference on Biometrics Theory, Appli-
cations and Systems (BTAS), pages 1–10.
Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G.,
and Yearwood, J. (2016). Protection of privacy in bio-
metric data. IEEE Access, 4:880–892.
Pandey, R. K., Zhou, Y., Kota, B. U., and Govindaraju, V.
(2016). Deep secure encoding for face template pro-
tection. In 2016 IEEE Conference on Computer Vision
and Pattern Recognition Workshops (CVPRW), pages
77–83.
Rathgeb, C., Breitinger, F., Busch, C., and Baier, H. (2014).
On application of bloom filters to iris biometrics. IET
Biometrics, 3(4):207–218.
Schmidt, G., Soutar, C., and Tomko, G. (1996). Fingerprint
controlled public key cryptographic system (1996).
US Patent, 5541994.
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G.-J.,
Bazen, A., and Veldhuis, R. (2005). Practical bio-
metric authentication with template protection. Audio-
and Video-Based Biometric Person Authentication,
Lecture Notes in Computer Science, 3546:436–446.
SECRYPT 2020 - 17th International Conference on Security and Cryptography
496