Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Biometric Template Protection Using Hybrid Approaches

V.S. Meenakshi, Dr.G. Padmavathi

Abstract


Biometric authentication due to its merits compared to traditional authentication methods like password finds its application in several crucial applications like border security, military, network security and forensic applications. However, biometric authentication systems are subjected to several attacks. Providing security to biometric template is an important issue in any biometric authentication system. Different biometric template protection mechanisms are in practice. Anyhow, no single method provides all the required properties of a biometric template. Hybrid template protection mechanisms are better compared to single biometric template protection mechanism. This paper presents a survey of different works that provides hybrid biometric template security.

Keywords


Biometric Template Security, Biometric Template Protection Schemes, Hybrid Approach, Attacks

Full Text:

PDF

References


Abishek Nagar, Karthick Nanda Kumar, Anil K.Jain , Hybrid Biometric Cryptosystem For Securing Fingerprint Minutiae Templates, Pattern Recognition Letters Volume 31 , Issue 8, June 2010, Pages: 733-741 ,2010 , ISSN:0167-8655

Anil. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, June 2006.

Anil K. Jain, Karthik Nanda Kumar and Abhishek Nagar, “Biometric Template Security” EURASIP Journal on Advancing Signal Processing, special issue on Biometrics, January 2008.

Julien Bringer, Herve Chabanne, Bruno Kindarji, and The best of both worlds: Applying secure sketches to cancelable biometrics, Science of Computer Programming V.74 n. 1- p.43-51, December, 2008.

Karthik Nandakumar, Abhishek Nagar and Anil K.Jain, “Hardening Fingerprint Fuzzy Vault using Password”, International conference on Biometrics, 2007.

K.NandaKumar, “Multibiometric Systems: Fusion Strategies and Template Security”, PhD Thesis, Department of Computer Science and Engineering, Michigan State University, January 2008.

L. Nanni, E. Maiorana, A. Lumini and P. Campisi, "Combining local, regional and global matchers for a template protected on-line signature verification system", Expert Systems With Applications, vol.37, no.5, pp.3676-3684, May 2010.

L. Nanni and A. Lumini, "A multi-modal method based on the competitors of FVC2004 and on Palm data combined with tokenised random numbers", Pattern Recognition Letters, vol.29, no.9, pp.1344-1350, July 2008

N. Ratha, J. Connell, and R. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Syst. J., vol. 40, no. 3 pp. 614–634, 2001.

A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc.SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005.

O. T. Song, A. B. J. Teoh, and D. C. L. Ngo, "Application-specific key release scheme from biometrics," International Journal of Network Security, vol. 6, no. 2, pp. 127-133, 2008.

E.Srinivasa Reddy, I. Ramesh Babu, “Performance of Iris Based Hard Fuzzy Vault”, Proceedings of IEEE 8th International conference on computers and Information technology workshops, pp. 248 – 253, 2008

Yi C. Feng , Pong C. Yuen , Anil K. Jain, A hybrid approach for generating secure and discriminating face template, IEEE Transactions on Information Forensics and Security, v.5 n.1, p.103-117, March 2010

F. Monrose, M. K. Reiter, and S. Wetzel, Password Hardening Based on Keystroke Dynamics. In Proceedings of Sixth ACM Conference on Computer and Communications Security, pages 73 - 82, 1999.

F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel. Cryptographic Key Generation from Voice. In Proceedings of IEEE Symposium on Security and Privacy, pages 202 - 213, Oakland, USA, May 2001.

Boult, T.E., Scheirer, W.J., Woodworth, R., 2007. Fingerprint revocable biotokens: Accuracy and security analysis. In: Proc. CVPR. Minneapolis, pp. 1-8.

A. Vetro and N. Memon. Biometric System Security. Tutorial presented at Second International Conference on Biometrics, Seoul, South Korea, and August 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.