Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Biometric Template Security

R. S. Pranitha, N. Radha

Abstract


Biometric authentication is a technology that measure and analyzes human physical and behavioral characteristics for recognition and authentication to provide security. The main benefit of the biometric technology is that, it is more safe and comfortable than the traditional systems like password and tokens such as smart cards, magnetic stripe cards, photo ID cards, physical keys and can be lost, stolen, duplicated, or left at home. Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. The security of cancelable biometrics lies on noninvertibility of the transformed templates. So the transforms should be noninvertible and the original template cannot be recovered. In this paper, fuzzy vault scheme, Fuzzy Vault with Minutiae Descriptors, Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates, steganography, cancelable iris biometrics, Palm print based Cancelable Biometric, mobile fingerprint template protection, secure authentication for fingerprint and face are reviewed.


Keywords


Cancelable Biometrics, Fuzzy Vault Scheme, Irrevocable Cryptographic Key Generation, Steganography, and Secure Authentication.

Full Text:

PDF

References


Abhishek Nagar, Santanu Chaudhury, ” Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme”

Anil K. Jain Arun Ross Umut Uludag, “Biometric template security challenges and solutions”

Abhishek Nagar, Karthik Nandakumar, and Anil K. Jain “Securing Fingerprint Template: Fuzzy Vault with Minutiae descriptors”

J. Hu “Mobile Fingerprint Template Protection: Progress and Open issues”, 978-1-4244-1718-6/08/$25. 00, 2008 IEEE

A. K. Jain, K. Nandakumar and A. Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, Special Issue on ASPPRMB, vol. 2008, pp. 1-17, Jan. 2008

Jinyu Zuo, Nalini K. Ratha, and Jonathan H. Connell IBM Watson Research Center, “Cancelable Iris Biometric”

Karthik Nandakumar, Anil K. Jain, and Sharath Pankanti, "Fingerprint-Based Fuzzy Vault: Implementation and Performance", IEEE Transactions on Information Forensics and Security, VOL. 2, NO. 4,744-757, Dec. 2007

Karthik Nandakumar, Abhishek Nagar and Anil K. Jain “Hardening Fingerprint Fuzzy Vault Using password “

N. Lalithamani, K. P. SOMAN, Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme European Journal of Scientific Research ISSN 1450-216X Vol. 31 No. 3 (2009), pp. 372-387, Euro Journals Publishing, Inc.2009 “

B. Prasana Lakshmi & A. Kannammal, ”Secured Authentication of Space Specified Token with Biometric Traits Face and Fingerprint”JCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 7, July 2009

Ying-Han Pang, Andrew Teoh Beng Jin, and David Ngo Chek Ling, ”Palmprint based Cancelable Biometric Authentication System”International Journal of Signal Processing Indawi Publishing Corporation Volume 2008, Article ID 579416

http://encyclopedia. jrank. org/articles/pages/6557/ Biometrics-Security.html

Chu-Hsing Lin*, Yi-Yi Lai, “flexible biometrics remote user authentication scheme “Received 2 December 2003; received in revised form 6 March 2004; accepted 10 March 2004 Available online 2 April 2004

M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, “Cancelable biometric filters for face recognition”, ICPR, 23-26 Aug. 2004, pp. 922-925 Vol. 3.

A. Juels, and M. Sudan, “A Fuzzy Vault Scheme”, Proc. IEEE Int’l.Symp. Information Theory, 2002, pp. 408.

Tiago Santos†, Gonçalo Lourenço¥, Luís Ducla Soares†, Paulo Lobato Correia, Enhancing Biometrics Security

Umut Uludag and Anil K. Jain “Fuzzy Fingerprint Vault”

G. I. Davida, Y. Frankel, and B. J. Matt, “On Enabling Secure Applications Through Off-Line Biometric Identification, ” in Proceedings of IEEE Symposium on Security and Privacy, Oakland,USA, May 1998, pp. 148–157.

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar,“Biometric Encryption, ” in ICSA Guide to Cryptography, R. K.Nichols, Ed. McGraw Hill, 1999.

F. Monrose, M. Reiter, Q. Li, and S. Wetzel, “Cryptographic Key Generation from Voice, ” in Proceedings of IEEE Symposium on Security and Privacy, Oakland, USA, May 2001, pp. 202–213.

A. Juels and M. Wattenberg, “A Fuzzy Commitment Scheme, ” in Proceedings of Sixth ACM Conference on Computer and Communications Security, Singapore, November 1999, pp. 28–36.

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data, ”Cryptology ePrint Archive, Tech. Rep. 235, February 2006.

F. Hao, R. Anderson, and J. Daugman, “Combining Crypto with Biometrics Effectively, ” IEEE Transactions on Computers, Vol. 55, no.9, pp. 1081–1088, September 2006.

P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M.Bazen, and R. N. J. Veldhuis, “Practical Biometric Authentication with Template Protection, ” in Proceedings of AVBPA, Rye Town, USA,July 2005, pp. 436–446.

E. Martinian, S. Yekhanin, and J. Yedidia, “Secure Biometrics Via Syndromes, ” Mitsubishi Electric Research Laboratories, Tech. Rep.TR2005-112, December 2005.

N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing Security and Privacy in Biometric Authentication Systems, ” IBM Systems Journal,vol. 40, no. 3, pp. 614–634, 2001.


Refbacks

  • There are currently no refbacks.