stored and analyzed during the verification process
resulting the most likely codeword.
3.2.12 Key Generation Attack
In this attack the attacker can inject a generated series
as secret key so that he can gain access to the systems.
The key generation module can be also changed by
the attacker using another one that makes the
illegitimate access easier.
4 CONCLUSIONS
Biometric cryptosystems are proposed as secure
technologies for protecting biometric template.
However, these systems stay vulnerable to several
attacks. Despite active research in recent years in the
evaluation of biometric cryptosystems, very few
studies have focused on the security and robustness
of these systems. Most of proposed biometric
cryptosystems evaluation studies are based on
information theory such as entropy, mutual
information etc, these measures are difficult to be
estimated when the distribution of biometric features
is unknown ( do the intra-class and inter-class
variability). On other hand, many studies consider the
false acceptance rate FAR to evaluate the security
when this criterion is considered as performance
measure and can’t be sufficient to measure the
security. Consequently, the proposed studies to
analyze the security of biometric cryptosystems are
very limited. In order to present a generalized study
to evaluate the security of biometric cryptosystems,
we proposed in this work a generalized conception
framework. This framework takes in into account all
the modules threats.
REFERENCES
A. K. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics:
Personal Identification in Networked Society. Norwell,
MA: Kluwer, 1999.
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V.
K. Vijaya Kumar, “Biometric encryption using image
processing,” in Proc. SPIE, Optical Security and
Counterfeit Deterrence Techniques II, vol. 3314, 1998,
pp. 178–188.
K. Nandakumar, A. Nagar, and A. K Jain. Hardening
fingerprint fuzzy vault using password. In Advances in
biometrics, pages 927-937.Springer, 2007.
Ari Juels and Martin Wattenberg. A fuzzy commitment
scheme. In Proceedings of the 6th ACM conference on
Computer and communications security, pages 28-36.
ACM, 1999.
Yongjin Wang and KN Plataniotis. Fuzzy vault for face
based cryptographic key generation. In Biometrics
Symposium, pages 1-6. IEEE, 2007.
Ross, A., Jain, A. (2003). Information fusion in biometrics.
Pattern Recognition Letters, 24 (13) 2115–2125
Ratha, N., Connell, J., Bolle, R. (2001). An analysis of
minutiae matching strength. In: Audio-and Video-
Based Biometric Person Authentication, p. 223–228.
Springer.
Hao, F., Anderson, R., Daugman, J. (2006). Combining
crypto with biometrics effectively, IEEE Transactions
on Computers, 55 (9) 1081–1088.
Li, Q., Sutcu, Y., Memon, N. (2006). Secure sketch for
biometric templates. Advances in Cryptology–
ASIACRYPT 2006, p. 99–113.
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A. K. (2004).
Biometric cryptosystems: issues and challenges. In:
Proceedings of the IEEE, 92 (6) 948–960.
Juels, A., Wattenberg, M. (1999). A fuzzy commitment
scheme. In: Proceedings of the 6th ACM conference on
Computer and communications security, p. 28–36.
ACM
Juels, A., Sudan, M. (2006). A fuzzy vault scheme.
Designs, Codes and Cryptography, 38 (2) 237–257.
Scheirer, W. J., Boult, T. E. (2007). Cracking fuzzy vaults
and biometric encryption. In: Biometrics Symposium,
p. 1–6.IEEE.
Xuebing Zhou, Arjan Kuijper, Raymond Veldhuis, and
Christoph Busch. Quantifying privacy and security of
biometric fuzzy commitment. In International Joint
Conference on Biometrics (IJCB), pages 1-8. IEEE,
2011.
Abhishek Nagar, Karthik Nandakumar, and Anil K Jain.
Multibiometric cryptosystems based on feature-level
fusion. IEEE Transactions on Information Forensics
and Security, 7(1) :255-268, 2012.
Ye Wang, Shantanu Rane, Stark C Draper, and Prakash
Ishwar. An information-theoretic analysis of
revocability and reusability in secure biometrics. In
Information Theory and Applications Workshop (ITA),
pages 1-10. IEEE, 2011. (Cité en pages 45 et 50.)
Seira Hidano, Tetsushi Ohki, and Kenta Takahashi.
Evaluation of security for biometric guessing attacks in
biometric cryptosystem using fuzzy commitment
scheme. In BIOSIG-Proceedings of the International
Conference of the Biometrics Special Interest Group
(BIOSIG), pages 1-6. IEEE, 2012.
VS Meenakshi and G Padmavathi. Security analysis of
password hardened multimodal biometric fuzzy vault.
World Acad. Sci. Eng. Tech, 56 :312-320,2009.
Hisham Al-Assam and Sabah Jassim. Security evaluation
of biometric keys.computers & security, 31(2) :151-
163, 2012.
Andy Adler. Sample images can be independently restored
from face recognition templates. In CCECE Canadian
Conference on Electrical and Computer Engineering,
volume 2, pages 1163-1166. IEEE, 2003