Skip to main content
Log in

Biometric cryptosystems: a comprehensive survey

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and cryptosystem, where biometric provides authentication and cryptosystem imparts security. Any biometric system is prone to attacks/security threats and BCS is an attempt to enhance system security without compromising its performance. BCS is surrounded by the concept of key; whereby key needs to be secured along with biometric signals using particular technique. In this work, a survey of 150 such techniques is presented. Furthermore, a separate section is dedicated to analyze the performance of these techniques. BCS is prone to various attacks and this study covers 30 such attacks, its countermeasures to thwart these attacks. In order to simulate BCS, a list of generic/attack type databases is also provided covering various physiological and behavioral biometrics. A brief discussion is presented on challenges and recommendations in BCS. Finally, several research directions are provided for the researchers working in this fascinating area.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study. The datasets analyzed here are publicly available and corresponding references have been given in the text.

References

  1. Abikoye OC, Ojo UA, Awotunde JB, Ogundokun RO (2020) A safe and secured iris template using steganography and cryptography. Multimed Tools Appl 79(31):23483–23506

    Article  Google Scholar 

  2. Al-Saggaf AA (2017) Key binding biometrics-based remote user authentication scheme using smart cards. IET Biometrics 7(3):278–284

    Article  Google Scholar 

  3. Albakri A, Mokbel C (2019) Convolutional neural network biometric cryptosystem for the protection of the blockchain’s private key. Procedia Comput Sci 160:235–240

    Article  Google Scholar 

  4. Ăilescu P M (2009) The fuzzy vault for fingerprints is vulnerable to brute force attack. In: BIOSIG’09, volume 155 of LNI, pp 43–55

  5. Amirthalingam G, Radhamani G (2016) New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization. J King Saud Univ Comput Inf Sci. 28(4):381–394

    Google Scholar 

  6. Anees A, Chen YPP (2018) Discriminative binary feature learning and quantization in biometric key generation. Pattern Recogn 77:289–305

    Article  Google Scholar 

  7. Anjos A, Chingovska I, Marcel S (2014) Anti-spoofing: Face databases. Tech. rep., Springer US

  8. Ao M, Li SZ (2009) Near infrared face based biometric key binding. In: International Conference on Biometrics, Springer, pp 376–385

  9. Apon D, Cho C, Eldefrawy K, Katz J (2017) Efficient, reusable fuzzy extractors from lwe. In: International conference on cyber security cryptography and machine learning. Springer, pp 1–18

  10. Asthana R, Walia GS, Gupta A (2021) A novel biometric crypto system based on cryptographic key binding with user biometrics. Multimedia Syst, 1–15

  11. Azzaz MS, Tanougast C, Maali A, Benssalah M (2020) An efficient and lightweight multi-scroll chaos-based hardware solution for protecting fingerprint biometric templates. Int J Commun Syst 33(10):e4211

    Article  Google Scholar 

  12. Bajwa G, Dantu R (2016) Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. Comput Secur 62:95–113

    Article  Google Scholar 

  13. Ballard L, Kamara S, Reiter MK (2008) The practical subtleties of biometric key generation. In: USENIX security symposium, pp 61–74

  14. Bardou R, Focardi R, Kawamoto Y, Simionato L, Steel G, Tsay JK (2012) Efficient padding oracle attacks on cryptographic hardware. In: Annual cryptology conference. Springer, pp 608–625

  15. Barman S, Samanta D, Chattopadhyay S (2015) Fingerprint-based crypto-biometric system for network security. EURASIP J Inf Secur 2015 (1):3

    Article  Google Scholar 

  16. Baur S, Boche H, Cai N (2019) Secret key generation from a biometric source with an eavesdropping jammer. In: IEEE INFOCOM 2019-IEEE Conference on computer communications workshops, INFOCOM WKSHPS, IEEE, 1–6

  17. Beng A, Teoh J, Toh KA (2008) Secure biometric-key generation with biometric helper. In: 2008 3rd IEEE conference on industrial electronics and applications. IEEE, pp 2145–2150

  18. Bhatnagar G, Wu QJ, Atrey PK (2014) Robust logo watermarking using biometrics inspired key generation. Expert Syst Appl 41(10):4563–4578

    Article  Google Scholar 

  19. Billeb S, Rathgeb C, Reininger H, Kasper K, Busch C (2015) Biometric template protection for speaker recognition based on universal background models. IET Biometrics 4(2):116–126

    Article  Google Scholar 

  20. Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A (2005) Secure remote authentication using biometric data. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 147–163

  21. Buhan I, Doumen J, Hartel P, Tang Q, Veldhuis R (2010) Embedding renewable cryptographic keys into noisy data. Int J Inform Security 9 (3):193–208

    Article  Google Scholar 

  22. Buhan I, Doumen J, Hartel P, Veldhuis R (2007) Constructing practical fuzzy extractors using qim. Centre for Telematics and Information Technology, University of Twente, Enschede, Tech Rep TR-CTIT-07-52

  23. Campisi P, Maiorana E, Neri A (2008) On-line signature based authentication: Template security issues and countermeasures. Biometrics: Theory, Methods, and Applications NV Boulgouris, KN Plataniotis, and E Micheli-Tzanakou, editors, Wiley/IEEE, (in print)

  24. Canetti R, Fuller B, Paneth O, Reyzin L, Smith A (2016) Reusable fuzzy extractors for low-entropy distributions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 117–146

  25. Cappelli R, Lumini A, Maio D, Maltoni D (2007) Evaluating minutiae template vulnerability to masquerade attack. In: 2007 IEEE workshop on automatic identification advanced technologies. IEEE, pp 174–179

  26. Catuogno L, Galdi C, Riccio D (2019) Off-line enterprise rights management leveraging biometric key binding and secure hardware. J Ambient Intell Human Comput 10(7):2883–2894

    Article  Google Scholar 

  27. Cavoukian A, Stoianov A, et al. (2009) Biometric encryption chapter from the encyclopedia of biometrics. Office of the Information and Privacy Commissioner, 1–14

  28. Chang D, Garg S, Ghosh M, Hasan M (2021) Biofuse: a framework for multi-biometric fusion on biocryptosystem level. Inf Sci 546:481–511

    Article  MathSciNet  Google Scholar 

  29. Chanukya PS, Thivakaran T (2020) Multimodal biometric cryptosystem for human authentication using fingerprint and ear. Multimed Tools Appl 79(1-2):659–673

    Article  Google Scholar 

  30. Cheval V, Cortier V (2015) Timing attacks in security protocols: symbolic framework and proof techniques. In: International conference on principles of security and trust. Springer, pp 280–299

  31. Chmora AL (2011) Key masking using biometry. Probl Inf Transm 47(2):201–215

    Article  MathSciNet  MATH  Google Scholar 

  32. Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, pp 45–52

  33. Connie T, Teoh A, Goh M, Ngo D (2004) Palmhashing: a novel approach for dual-factor authentication. Pattern Anal Applic 7(3):255–268

    Article  MathSciNet  Google Scholar 

  34. Coron JS (1999) Resistance against differential power analysis for elliptic curve cryptosystems. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 292–302

  35. Daugman J (2000) Biometric decision landscapes. Tech rep. University of Cambridge, Computer Laboratory

  36. Davida GI, Frankel Y, Matt BJ (1998) On enabling secure applications through off-line biometric identification. In: Proceedings. 1998 IEEE symposium on security and privacy (Cat. No. 98CB36186). IEEE, pp 148–157

  37. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 523–540

  38. Draper SC, Khisti A, Martinian E, Vetro A, Yedidia J (2007) Secure storage of fingerprint biometrics using slepian-wolf codes. In: Information theory and applications workshop, pp 1–5

  39. Duong-Ngoc P, Tan TN, Lee H (2020) Efficient newhope cryptography based facial security system on a gpu, vol 8

  40. Dwivedi R, Dey S, Sharma MA, Goel A (2019) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Human Comput, 1–15

  41. Elrefaei LA, Al-Mohammadi AM (2019) Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme. J King Saud University-Comput Inf Sci 34(2):204–217

    Google Scholar 

  42. Emeršič ž, Peer P (2015) Ear biometric database in the wild. In: 2015 4Th international work conference on bioinspired intelligence (IWOBI), IEEE, pp 27–32

  43. Failla P, Sutcu Y, Barni M (2010) Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics. In: Proceedings of the 12th ACM Workshop on Multimedia and Security, pp 241–246

  44. Feng YC, Yuen PC (2011) Binary discriminant analysis for generating binary face template. IEEE Trans Inf Forensics Secur 7(2):613–624

    Article  Google Scholar 

  45. Feng YC, Yuen PC, Jain AK (2009) A hybrid approach for generating secure and discriminating face template. IEEE Trans Inf Forensics Secur 5(1):103–117

    Article  Google Scholar 

  46. Fierrez J, Galbally J, Ortega-Garcia J, Freire MR, Alonso-Fernandez F, Ramos D, Toledano DT, Gonzalez-Rodriguez J, Siguenza JA, Garrido-Salas J et al (2010) Biosecurid: a multimodal biometric database. Pattern Anal Applic 13(2):235–246

    Article  MathSciNet  Google Scholar 

  47. Freire MR, Fierrez J, Galbally J, Ortega-Garcia J (2007) Biometric hashing based on genetic selection and its application to on-line signatures. In: International conference on biometrics. Springer, pp 1134–1143

  48. Fu B, Yang SX, Li J, Hu D (2009) Multibiometric cryptosystem: Model structure and performance analysis. IEEE Trans Inf Forensics Secur 4 (4):867–882

    Article  Google Scholar 

  49. Galbally J (2020) A new foe in biometrics: a narrative review of side-channel attacks. Computers & Security, 101902

  50. Garcia-Baleon H, Alarcon-Aquino V (2009) Cryptographic key generation from biometric data using wavelets. In: 2009 Electronics, Robotics and Automotive Mechanics Conference (CERMA). IEEE, pp 15-20

  51. Garofolo JS (1993) Timit acoustic phonetic continuous speech corpus. Linguistic Data Consortium, 1993

  52. Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics. In: IFIP International conference on communications and multimedia security. Springer, pp 1–13

  53. Golic JD, Baltatu M (2008) Entropy analysis and new constructions of biometric key generation systems. IEEE Trans Inf Theory 54(5):2026–2040

    Article  MathSciNet  MATH  Google Scholar 

  54. Gomez-Barrero M, Galbally J (2020) Reversing the irreversible: a survey on inverse biometrics. Comput Secur 90:101700

    Article  Google Scholar 

  55. Gong Y, Deng K, Shi P (2008) Pki key generation based on iris features. In: 2008 International conference on computer science and software engineering. IEEE, vol 6, pp 166–169

  56. Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press. http://www.deeplearningbook.org. Accessed: 22 July 2021

  57. Gross R, Matthews I, Cohn J, Kanade T, Baker S (2007) The cmu multi-pose, illumination, and expression (multi-pie) face database. CMU Robotics Institute TR-07-08, Tech Rep

  58. Gross R, Shi J (2001) The cmu motion of body (mobo) database. Tech. Rep. CMU-RI-TR-01-18, Carnegie Mellon University, Pittsburgh, PA

  59. Hadid A, Evans N, Marcel S, Fierrez J (2015) Biometrics systems under spoofing attack: an evaluation methodology and lessons learned. IEEE Signal Proc Mag 32(5):20–30

    Article  Google Scholar 

  60. Hamouda E, Ouda O, Yuan X, Hamza T (2016) Optimizing discriminability of globally binarized face templates. Arab J Sci Eng 41(8):2837–2846

    Article  Google Scholar 

  61. Handschuh H, Heys HM (1998) A timing attack on rc5, International workshop on selected areas in cryptography. Springer, pp 306–318

  62. Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081–1088

    Article  Google Scholar 

  63. Hao Y, Sun Z, Tan T (2007) Comparative studies on multispectral palm image fusion for biometrics. In: Asian conference on computer vision, Springer, pp 12–21

  64. Hao Y, Sun Z, Tan T, Ren C (2008) Multispectral palm image fusion for accurate contact-free palmprint recognition. In: 2008 15th IEEE International conference on image processing. IEEE, pp 281–284

  65. Hine GE, Maiorana E, Campisi P (2017) A zero-leakage fuzzy embedder from the theoretical formulation to real data. IEEE Trans Inf Forensics Secur 12(7):1724–1734

    Article  Google Scholar 

  66. Hoang T, Choi D, Nguyen T (2015) Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme. Int J Inf Secur 14(6):549–560

    Article  Google Scholar 

  67. Hogo MA (2012) Biometrie keys based on pseudorandom sequences. In: 2012 IEEE international carnahan conference on security technology (ICCST). IEEE, pp 110–118

  68. Hoque S, Fairhurst M, Howells G (2008) Evaluating biometric encryption key generation using handwritten signatures. In: 2008 Bio-inspired, learning and intelligent systems for security. IEEE, pp 17–22

  69. Huang GB, Mattar M, Berg T, Learned-Miller E (2008) Labeled faces in the wild: A database forstudying face recognition in unconstrained environments. In: Labeled faces in the wild: A database forstudying face recognition in unconstrained environments

  70. Huixian L, Man W, Liaojun P, Weidong Z (2009) Key binding based on biometric shielding functions. In: 2009 Fifth international conference on information assurance and security. IEEE, vol 1, pp 19–22

  71. Imamverdiev YN, Sukhostat LV (2012) A method for cryptographic key generation from fingerprints. Autom Control Comput Sci 46(2):66–75

    Article  Google Scholar 

  72. Imamverdiyev Y, Teoh ABJ, Kim J (2013) Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst Appl 40 (5):1888–1901

    Article  Google Scholar 

  73. Inthavisas K, Lopresti D (2012) Secure speech biometric templates for user authentication. IET Biometrics 1(1):46–54

    Article  Google Scholar 

  74. Itakura Y, Tsujii S (2005) Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int J Inf Secur 4(4):288–296

    Article  Google Scholar 

  75. Jain AK, Hong L, Pankanti S, Bolle R (1997) An identity-authentication system using fingerprints. Proc IEEE 85(9):1365–1388

    Article  Google Scholar 

  76. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP J Adv Signal Process 2008:1–17

    Article  Google Scholar 

  77. Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125–143

    Article  Google Scholar 

  78. Jin Z, Lim MH, Teoh ABJ, Goi BM, Tay YH (2016) Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication. IEEE Trans Syst Man Cybern Syst 46(10):1415–1428

    Article  Google Scholar 

  79. Jin Z, Teoh ABJ, Goi BM, Tay YH (2016) Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn 56:50–62

    Article  Google Scholar 

  80. Jindal AK, Chalamala SR, Jami SK (2019) Securing face templates using deep convolutional neural network and random projection. In: 2019 IEEE International conference on consumer electronics, ICCE, IEEE, pp 1–6

  81. Juels A, Sudan M (2002) A fuzzy vault scheme. in proc. ieee int.. In: Symp. Inf. Theory, Switzerland, p 408

  82. Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237–257

    Article  MathSciNet  MATH  Google Scholar 

  83. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on computer and communications security, pp 28–36

  84. Kanade S, Camara D, Petrovska-Delacrtaz D, Dorizzi B (2009) Application of biometrics to obtain high entropy cryptographic keys. World Acad Sci Eng Tech 52:330

    Google Scholar 

  85. Kanade S, Petrovska-Delacrétaz D, Dorizzi B (2011) Multi-biometrics based crypto-biometric session key generation and sharing protocol

  86. Kang J, Nyang D, Lee K (2014) Two-factor face authentication using matrix permutation transformation and a user password. Inf Sci 269:1–20

    Article  MathSciNet  Google Scholar 

  87. Kanhangad V, Kumar A, Zhang D (2010) Contactless and pose invariant biometric identification using hand surface. IEEE Trans Image Process 20(5):1415–1424

    Article  MathSciNet  MATH  Google Scholar 

  88. Kanhangad V, Kumar A, Zhang D (2011) A unified framework for contactless hand verification. IEEE Trans Inf Forensics Secur 6(3):1014–1027

    Article  Google Scholar 

  89. Karabat C, Kiraz MS, Erdogan H, Savas E (2015) Thrive: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J Adv Signal Process 2015(1):71

    Article  Google Scholar 

  90. Karimian N, Guo Z, Tehranipoor M, Forte D (2016) Highly reliable key generation from electrocardiogram (ecg). IEEE Trans Biomed Eng 64 (6):1400–1411

    Article  Google Scholar 

  91. Karimian N, Tehranipoor M, Woodard D, Forte D (2019) Unlock your heart: Next generation biometric in resource-constrained healthcare systems and iot. IEEE Access 7:49135–49149

    Article  Google Scholar 

  92. Kaur P, Bijalwan A, Joshi R, Awasthi A (2018a) Network forensic process model and framework: an alternative scenario. In: Intelligent Communication, Control and Devices. Springer, pp 493–502

  93. Kaur T, Kaur M (2017) Cryptographic key generation from multimodal template using fuzzy extractor. In: 2017 Tenth international conference on contemporary computing (IC3). IEEE, pp 1–6

  94. Kaur P, Chaudhary P, Bijalwan A, Awasthi A (2018b) Network traffic classification using multiclass classifier. In: International conference on advances in computing and data sciences. Springer, pp 208–217

  95. Khokher R, Singh RC (2015) Generation of security key using ecg signal. In: International conference on computing, communication & automation, IEEE, pp 895–900

  96. Kholmatov A, Yanikoglu B (2006) Biometric cryptosystem using online signatures. In: International symposium on computer and information sciences. Springer, pp 981–990

  97. Kholmatov A, Yanikoglu B (2008) Realization of correlation attack against the fuzzy vault scheme. In: Security, forensics, steganography, and watermarking of multimedia contents X, International Society for Optics and Photonics, vol 6819, p 68190O

  98. Kocher PC (1995) Cryptanalysis of diffie-hellman, rsa, dss, and other systems using timing attacks. In: Advances in cryptology, crypto ’95: 15th annual international cryptology conference. Springer-Verlag, pp 27–31

  99. Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1(1):5–27

    Article  Google Scholar 

  100. Komulainen J (2015) Software-based countermeasures to 2d facial spoofing attacks PhD thesis. PhD dissertation, University of Oulu, faculty of information technology

  101. Komulainen J, Hadid A, Pietikäinen M, Anjos A, Marcel S (2013) Complementary countermeasures for detecting scenic face spoofing attacks. In: 2013 International conference on biometrics (ICB). IEEE, pp 1–7

  102. Kong A, Cheung KH, Zhang D, Kamel M, You J (2006) An analysis of biohashing and its variants. Pattern Recogn 39(7):1359–1368

    Article  MATH  Google Scholar 

  103. Kumar JA, Chalamala S, Kumar JS (2018) Face template protection using deep convolutional neural network. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 462–470

  104. Kumar A, Kumar A (2009) Development of a new cryptographic construct using palmprint-based fuzzy vault. EURASIP J Adv Signal Process 2009:1–11

    Article  MATH  Google Scholar 

  105. Kumar A, Kumar A (2015) A cell-array-based multibiometric cryptosystem. IEEE Access 4:15–25

    Article  Google Scholar 

  106. Kumar A, Passi A (2010) Comparison and combination of iris matchers for reliable personal authentication. Pattern Recogn 43(3):1016–1026

    Article  MATH  Google Scholar 

  107. Kumar A, Wu C (2012) Automated human identification using ear imaging. Pattern Recogn 45(3):956–968

    Article  Google Scholar 

  108. Kumar A, Xu Z (2016) Personal identification using minor knuckle patterns from palm dorsal surface. IEEE Trans Inf Forensics Secur 11(10):2338–2348

    Article  Google Scholar 

  109. Kumar A, Zhou Y (2011) Human identification using finger images. IEEE Trans Image Process 21(4):2228–2244

    Article  MathSciNet  MATH  Google Scholar 

  110. Kumar N, et al. (2019) Cancelable biometrics: a comprehensive survey. Artif Intell Rev 53(5):3403–3446

    Google Scholar 

  111. Lai YL, Hwang JY, Jin Z, Kim S, Cho S, Teoh ABJ (2018) Secure secret sharing enabled b-band mini vaults bio-cryptosystem for vectorial biometrics. IEEE Trans Dependable Secure Comput 18(1):58–71

    Article  Google Scholar 

  112. Lai YL, Hwang JY, Jin Z, Kim S, Cho S, Teoh ABJ (2019) Symmetric keyring encryption scheme for biometric cryptosystem. Inf Sci 502:492–509

    Article  MathSciNet  Google Scholar 

  113. Lee YJ, Park KR, Lee SJ, Bae K, Kim J (2008) A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans Syst Man, Cybern Part B (Cybernetics) 38(5):1302–1313

    Article  Google Scholar 

  114. Lee H, Teoh ABJ, Kim J (2011) Biometric bits extraction through phase quantization based on feature level fusion. Telecommun Syst 47 (3-4):255–273

    Article  Google Scholar 

  115. Lee YJ, Bae K, Lee SJ, Park KR, Kim J (2007) Biometric key binding: Fuzzy vault based on iris images. In: International Conference on Biometrics. Springer, pp 800–808

  116. Lei Z, Lili Y, Bin W, Xingchao B (2019) A novel privacy protection scheme for iris identification. Wirel Pers Commun 109(4):2411–2425

    Article  Google Scholar 

  117. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989

    Article  Google Scholar 

  118. Li C, Hu J, Pieprzyk J, Susilo W (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans Inform Forens Secur 10(6):1193–1206

    Article  Google Scholar 

  119. Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574

    Article  Google Scholar 

  120. Li Y, Zhang B, Cao Y, Zhao S, Gao Y, Liu J (2011) Study on the beihang keystroke dynamics database. In: 2011 International joint conference on biometrics (IJCB). IEEE, pp 1–5

  121. Linnartz JP, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, pp 393–402

  122. Loukhaoukha K, Refaey A, Zebbiche K, Shami A (2018) Efficient and secure cryptosystem for fingerprint images in wavelet domain. Multimed Tools Appl 77(8):9325–9339

    Article  Google Scholar 

  123. Lu Y, Xie SJ, Yoon S, Yang J, Park DS (2013) Robust finger vein roi localization based on flexible segmentation. Sensors 13(11):14339–14366

    Article  Google Scholar 

  124. Ma Y, Wu L, Gu X, He J, Yang Z (2017) A secure face-verification scheme based on homomorphic encryption and deep neural networks. IEEE Access 5:16532–16538

    Article  Google Scholar 

  125. Mai G, Lim MH, Yuen PC (2017) Binary feature fusion for discriminative and secure multi-biometric cryptosystems. Image Vis Comput 58:254–265

    Article  Google Scholar 

  126. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) FVC2004: third fingerprint verification competition. In: Zhang D, Jain AK (eds) Biometric authentication. ICBA 2004. Lecture notes in computer science, vol 3072. Springer, Berlin, pp 1–7

  127. Maiorana E (2010) Biometric cryptosystem using function based on-line signature recognition. Expert Syst Appl 37(4):3454–3461

    Article  Google Scholar 

  128. Maiorana E, Campisi P (2009) Fuzzy commitment for function based signature template protection. IEEE Signal Process Lett 17(3):249–252

    Article  Google Scholar 

  129. Maiorana E, Campisi P, Neri A (2008) User adaptive fuzzy commitment for signature template protection and renewability. J Electron Imaging 17 (1):011011

    Article  Google Scholar 

  130. Maiorana E, Ercole C (2007) Secure biometric authentication system architecture using error correcting codes and distributed cryptography. In: Proceedings of Gruppo nazionale Telecomunicazioni e Teoria dell’Informazione, pp 1–12

  131. Maiorana E, Hine GE, Campisi P (2014) Hill-climbing attacks on multibiometrics recognition systems. IEEE Trans Inf Forensics Secur 10 (5):900–915

    Article  Google Scholar 

  132. Martinez AM, Benavente R (1998) The AR face database. CVC Technical Report, 24, pp 1–8

  133. Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-garcía J, Siguenza J (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings 40th annual 2006 international carnahan conference on security technology. IEEE, pp 151–159

  134. Martinian E, Yekhanin S, Yedidia JS (2005) Secure biometrics via syndromes

  135. Merkle J, Kevenaar T, Korte U (2012) Multi-modal and multi-instance fusion for biometric cryptosystems. In: 2012 BIOSIG-proceedings of the international conference of biometrics special interest group. BIOSIG, IEEE, pp 1–6

  136. Monrose F, Reiter MK, Li Q, Wetzel S (2000) Cryptographic key generation from voice. In: Proceedings 2001 IEEE symposium on security and privacy. S&P 2001, IEEE, pp 202–213

  137. Monrose F, Reiter MK, Wetzel S (1999) Password hardening based on keystroke dynamics. Int J Inf Secur 1(2):69–83

    Article  MATH  Google Scholar 

  138. Moon D, Choi WY, Moon K, Chung Y (2009) Fuzzy fingerprint vault using multiple polynomials. In: 2009 IEEE 13th International symposium on consumer electronics. IEEE, pp 290–293

  139. Murakami T, Ohki T, Takahashi K (2016) Optimal sequential fusion for multibiometric cryptosystems. Inf Fusion 32:93–108

    Article  Google Scholar 

  140. Nagakrishnan R, Revathi A (2020) A robust cryptosystem to enhance the security in speech based person authentication. Multimedia tools and applications

  141. Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 2008 19th International conference on pattern recognition. IEEE, pp 1–4

  142. Nagar A, Nandakumar K, Jain AK (2010) A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn Lett 31 (8):733–741

    Article  Google Scholar 

  143. Nagar A, Nandakumar K, Jain AK (2011) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forensics Secur 7(1):255–268

    Article  Google Scholar 

  144. Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: Implementation and performance. IEEE Trans Inf Forensics Secur 2(4):744–757

    Article  Google Scholar 

  145. Narayanan A, Shmatikov V (2005) Fast dictionary attacks on passwords using time-space tradeoff. In: Proceedings of the 12th ACM conference on computer and communications security, pp 364–372

  146. Natgunanathan I, Mehmood A, Xiang Y, Beliakov G, Yearwood J (2016) Protection of privacy in biometric data. IEEE Access 4:880–892

    Article  Google Scholar 

  147. Nazari S, Moin MS, Kanan HR (2016) A face template protection approach using chaos and grp permutation. Secur Commun Netw 9(18):4957–4972

    Article  Google Scholar 

  148. Ngo DC, Teoh AB, Goh A (2004) Eigenspace-based face hashing. In: International Conference on Biometric Authentication. Springer, pp 195–199

  149. Nguyen D, Tran D, Sharma D, Ma W (2017) On the study of eeg-based cryptographic key generation. Procedia Comput Sci 112:936–945

    Article  Google Scholar 

  150. Nguyen TH, Wang Y, Ha Y, Li R (2013) Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrics 2(2):48–55

    Article  Google Scholar 

  151. Nivedetha B, Vennila I (2020) Ffbks: Fuzzy fingerprint biometric key based security schema for wireless sensor networks. Comput Commun 150:94–102

    Article  Google Scholar 

  152. Ogiela MR, Ogiela L (2011) Image based crypto-biometric key generation. In: 2011 Third international conference on intelligent networking and collaborative systems. IEEE, pp 673–678

  153. Ong TS, Jin ATB, Ngo DCL (2008) Application-specific key release scheme from biometrics. IJ Netw Secur 6(2):127–133

    Google Scholar 

  154. Ortega-Garcia J, Fierrez J, Alonso-Fernandez F, Galbally J, Freire MR, Gonzalez-Rodriguez J, Garcia-Mateo C, Alba-Castro JL, Gonzalez-Agulla E, Otero-Muras E et al (2009) The multiscenario multienvironment biosecure multimodal database (bmdb). IEEE Trans Pattern Anal Mach Intell 32(6):1097–1111

    Article  Google Scholar 

  155. Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-Zanuy M, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C et al (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proceedings-Vision Image and Signal Processing 150(6):395–401

    Article  Google Scholar 

  156. Panchal G, Samanta D (2018) A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput Electrical Eng 69:461–478

    Article  Google Scholar 

  157. Panchal G, Samanta D, Barman S (2019) Biometric-based cryptography for digital content protection without any key storage. Multimed Tools Appl, 1–22

  158. Patel K, Han H, Jain AK (2016) Secure face unlock: Spoof detection on smartphones. IEEE Trans Inf Forensics Secur 11(10):2268–2283

    Article  Google Scholar 

  159. Patil P, Jagtap S (2020) Multi-modal biometric system using finger knuckle image and retina image with template security using polyu and drive database. Int J Inf Technol, 1–8

  160. Peng J, Li Q, Abd El-Latif AA, Niu X (2014) Finger multibiometric cryptosystems: fusion strategy and template security. J Electronic Imaging 23(2):023001

    Article  Google Scholar 

  161. Peng J, Yang B, Gupta BB, Abd El-Latif AA (2021) A biometric cryptosystem scheme based on random projection and neural network. Soft Comput 25(11):7657–7670

    Article  Google Scholar 

  162. Petit C, Standaert FX, Pereira O, Malkin TG, Yung M (2008) A block cipher based pseudo random number generator secure against side-channel key recovery. In: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pp 56–65

  163. Phillips PJ, Moon H, Rizvi SA, Rauss PJ (2000) The feret evaluation methodology for face-recognition algorithms. IEEE Trans Pattern Anal Mach Intell 22(10):1090–1104

    Article  Google Scholar 

  164. Phillips PJ, Wechsler H, Huang J, Rauss PJ (1998) The feret database and evaluation procedure for face-recognition algorithms. Image Vision Comput 16(5):295–306

    Article  Google Scholar 

  165. Ponce-Hernandez W, Blanco-Gonzalo R, Liu-Jimenez J, Sanchez-Reillo R (2020) Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification. IEEE Access 8:11152–11164

    Article  Google Scholar 

  166. Prabhakar S, Pankanti S, Jain A (2003) Biometric recognition: Security and privacy concerns. IEEE Secur Privacy Mag 1(2):33–42

    Article  Google Scholar 

  167. Prasanalakshmi B, Kannammal A, Gomathi B, Deepa K, Sridevi R (2012) Biometric cryptosystem involving two traits and palm vein as key. Procedia Eng 30:303–310

    Article  Google Scholar 

  168. Queirolo CC, Silva L, Bellon OR, Segundo MP (2009) 3d face recognition using simulated annealing and the surface interpenetration measure, vol 32, pp 206–219

  169. Rajan RA, Kumaran P (2020) Multi-biometric cryptosystem using graph for secure cloud authentication. J Intell Fuzzy Syst, 1–8

  170. Ranjan R, Singh SK (2013) Improved and innovative key generation algorithms for biometric cryptosystems. In: 2013 3Rd IEEE international advance computing conference, IACC, IEEE, pp 943-946

  171. Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: International conference on audio-and video-based biometric person authentication. Springer, pp 223–228

  172. Rathgeb C, Tams B, Wagner J, Busch C (2016) Unlinkable improved multi-biometric iris fuzzy vault. EURASIP J Inf Secur 2016(1):26

    Article  Google Scholar 

  173. Rathgeb C, Uhl A (2009a) Context-based texture analysis for secure revocable iris-biometric key generation. In: 3rd International conference on imaging for crime detection and prevention (ICDP 2009). IET, pp 1–6

  174. Rathgeb C, Uhl A (2009b) An iris-based interval-mapping scheme for biometric key generation. In: 2009 Proceedings of 6th international symposium on image and signal processing and analysis. IEEE, pp 511–516

  175. Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):3

    Article  Google Scholar 

  176. Rathgeb C, Uhl A (2011) Context-based biometric key generation for iris. IET Comput Vision 5(6):389–397

    Article  Google Scholar 

  177. Rathgeb C, Wagner J, Tams B, Busch C (2015) Preventing the cross-matching attack in bloom filter-based cancelable biometrics. In: 3rd International workshop on biometrics and forensics (IWBF 2015). IEEE, pp 1–6

  178. Rattani A, Poh N (2013) Biometric system design under zero and non-zero effort attacks. In: 2013 International Conference on Biometrics (ICB). IEEE, pp 1–8

  179. Reddy ES, Babu IR (2008) Performance of iris based hard fuzzy vault. In: 2008 IEEE 8th International conference on computer and information technology workshops. IEEE, pp 248–253

  180. Roh J h, Cho S, Jin SH (2018) Learning based biometric key generation method using cnn and rnn. In: 2018 10Th International conference on information technology and electrical engineering (ICITEE), IEEE, pp 136–139

  181. Roy ND, Biswas A (2020) Fast and robust retinal biometric key generation using deep neural nets. Multimed Tools Appl 79(9):6823–6843

    Article  Google Scholar 

  182. Rúa E A, Preuveneers D, Joosen W, et al. (2021) On the security of biometrics and fuzzy commitment cryptosystems: A study on gait authentication. IEEE Trans Inf Forensics Secur 16:5211–5224

    Article  Google Scholar 

  183. Samaria FS, Harter AC (1994) Parameterisation of a stochastic model for human face identification. In: Proceedings of 1994 IEEE workshop on applications of computer vision. IEEE, pp 138–142

  184. Sandhya M, Dileep M, Murthy AN, Misbahuddin M (2020) Fingerprint cryptosystem using variable selection of minutiae points. In: Data Engineering and Communication Technology. Springer, pp 359–369

  185. Sarier D (2013) Biometric cryptosystems: authentication encryption and signature for biometric identities. PhD thesis, Universitäts-und Landesbibliothek Bonn

  186. Sarier ND (2021) Multimodal biometric authentication for mobile edge computing. Inf Sci 573:82–99

    Article  Google Scholar 

  187. Sasikaladevi N, Geetha K, Revathi A, Mahalakshmi N, Archana N (2019) Scan-speech biometric template protection based on genus-2 hyper elliptic curve. Multimed Tools Appl 78(13):18339–18361

    Article  Google Scholar 

  188. Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: 2007 Biometrics symposium, IEEE, pp 1–6

  189. Scherhag U, Rathgeb C, Merkle J, Breithaupt R, Busch C (2019) Face recognition systems under morphing attacks: A survey. IEEE Access 7:23012–23026

    Article  Google Scholar 

  190. Sheng W, Chen S, Xiao G, Mao J, Zheng Y (2015) A biometric key generation method based on semisupervised data clustering. IEEE Trans Syst Man Cybern Syst 45(9):1205–1217

    Article  Google Scholar 

  191. Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inform Forens Secur 3(2):183–191

    Article  Google Scholar 

  192. Sim T, Baker S, Bsat M (2002) The cmu pose, illumination, and expression (pie) database. In: Proceedings of Fifth IEEE international conference on automatic face gesture recognition. IEEE, pp 53–58

  193. Simoens K, Bringer J, Chabanne H, Seys S (2012) A framework for analyzing template security and privacy in biometric authentication systems. IEEE Trans Inf Forensics Secur 7(2):833–841

    Article  Google Scholar 

  194. Song DX, Wagner DA, Tian X (2001) Timing analysis of keystrokes and timing attacks on ssh. In: USENIX Security symposium. 2001, pp 1–17

  195. Sousedik C, Busch C (2014) Presentation attack detection methods for fingerprint recognition systems: a survey. Iet Biometrics 3(4):219–233

    Article  Google Scholar 

  196. Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV (1998) Biometric encryption using image processing. In: Optical security and counterfeit deterrence techniques II, International Society for Optics and Photonics, vol 3314, pp 178–188

  197. Soutar C, Tomko G (1996) Secure private key generation using a fingerprint. In: Cardtech/securetech conference proceedings, vol 1, pp 245–252

  198. Spadavecchia L (2006) A network-based asynchronous architecture for cryptographic devices. Edinburgh Research Archive

  199. Standaert FX, Malkin TG, Yung M (2009) A unified framework for the analysis of side-channel key recovery attacks. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 443–461

  200. Stefan D, Shu X, Yao DD (2012) Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput Secur 31(1):109–121

    Article  Google Scholar 

  201. Stoianov A (2010) Cryptographically secure biometrics. In: Biometric Technology for Human Identification VII, International Society for Optics and Photonics, vol 7667, p 76670C

  202. Sujitha V, Chitra D (2019) Highly secure palmprint based biometric template using fuzzy vault. Concurrency and Computation: Practice and Experience 31(12):e4513

    Article  Google Scholar 

  203. Sujitha V, Chitra D (2019) A novel technique for multi biometric cryptosystem using fuzzy vault. J Medical Syst 43(5):1–9

    Article  Google Scholar 

  204. Sun Y, Lo B (2018) An artificial neural network framework for gait-based biometrics. IEEE J Biomed Health Inf 23(3):987–998

    Article  Google Scholar 

  205. Sun Z, Tan T, Wang Y, Li S (2005) Ordinal palmprint representation for personal identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition. https://doi.org/10.1109/CVPR.2005.267, vol 1, pp 279–284

  206. Suresh P, Radhika K (2018) Biometric based consistent key generation for ims. In: TENCON 2018-2018 IEEE Region 10 Conference, IEEE, 2175-2180

  207. Šeděnka J, Balagani KS, Phoha V, Gasti P (2014) Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics. In: IEEE International joint conference on biometrics, IEEE, pp 1–8

  208. Tan D, Huang K, Yu S, Tan T (2006) Efficient night gait recognition based on template matching. In: 18Th International conference on pattern recognition (ICPR’06), IEEE, vol 3, pp 1000–1003

  209. Tan SY, Jin Z, Teoh ABJ, Goi BM, Heng SH (2012) On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Secur Commun Netw 5(12):1312–1324

    Article  Google Scholar 

  210. Tan TN, Lee H (2018) High-performance ring-lwe cryptography scheme for biometric data security. IEIE Trans Smart Process Comput 7(2):97–106

    Article  Google Scholar 

  211. Tang D, Huang B, Li R, Li W (2010) A person retrieval solution using finger vein patterns. In: 2010 20th International conference on pattern recognition. IEEE, pp 1306–1309

  212. Tao Z, Ming-Yu F, Bo F (2007) Side-channel attack on biometric cryptosystem based on keystroke dynamics. In: The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007). IEEE, pp 221–223

  213. Teoh AB, Ngo DC, Goh A (2004) Personalised cryptographic key generation based on facehashing. Comput Secur 23(7):606–614

    Article  Google Scholar 

  214. Thakkar D (2018) Techniques leveraged to secure biometric data. https://www.bayometric.com/techniques-secure-biometric-data/. Accessed: 01 July 2021

  215. Tome P, Marcel S (2015) On the vulnerability of palm vein recognition to spoofing attacks. In: The 8th IAPR International Conference on Biometrics (ICB). IEEE, pp 319–325

  216. Ton BT, Veldhuis RN (2013) A high quality finger vascular pattern dataset collected using a custom designed capturing device. In: 2013 International conference on biometrics (ICB). IEEE, pp 1–5

  217. Trostle JT (1998) Timing attacks against trusted path. In: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186), IEEE, pp 125–134

  218. Tuiri SE, Sabil N, Benamar N, Kerrache CA, Koziel G (2019) An eeg based key generation cryptosystem using diffie-hellman and aes. In: 2019 2Nd IEEE Middle East and North Africa Communications conference, MENACOMM, IEEE, pp 1–6

  219. Uludag U, Jain A (2006) Securing fingerprint template: Fuzzy vault with helper data. In: 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’06), IEEE, pp 163–163

  220. Upmanyu M, Namboodiri AM, Srinathan K, Jawahar C (2010) Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans Inf Forensics Secur 5(2):255–268

    Article  Google Scholar 

  221. Verbitskiy E, Tuyls P, Denteneer D, Linnartz JP (2003) Reliable biometric authentication with privacy protection. In: Proc. 24th Benelux Symposium on Information theory, pp 1–6

  222. Verma G, Liao M, Lu D, He W, Peng X, Sinha A (2019) An optical asymmetric encryption scheme with biometric keys. Opt Lasers Eng 116:32–40

    Article  Google Scholar 

  223. Voderhobli K, Pattinson C, Donelan H (2006) A schema for cryptographic keys generation using hybrid biometrics. In: 7Th annual postgraduate symposium: The convergence of telecommunications, networking and broadcasting. The Open University, pp 1–6

  224. WK Y, ABJ T, DCL N (2006) Replaceable and securely hashed keys from online signatures. IEICE Electronics Express 3(18):410–416

    Article  Google Scholar 

  225. Wang Y, Li B, Zhang Y, Wu J, Ma Q (2021) A secure biometric key generation mechanism via deep learning and its application. Appl Sci 11 (18):8497

    Article  Google Scholar 

  226. Wang L, Tan T, Ning H, Hu W (2003) Silhouette analysis-based gait recognition for human identification. IEEE Trans Pattern Anal Mach Intell 25(12):1505–1518

    Article  Google Scholar 

  227. Wen D, Han H, Jain AK (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensics Secur 10(4):746–761

    Article  Google Scholar 

  228. Wen D, Han H, Jain A (2015) Face spoof detection with image distortion analysis. IEEE Trans Inf Forensic Secur 10(4):746–761

    Article  Google Scholar 

  229. Willems FM, Ignatenko T (2010) Identification and secret-key binding in binary-symmetric template-protected biometric systems. In: 2010 IEEE International Workshop on Information Forensics and Security, IEEE, pp 1–5

  230. Wu Z, Liang B, You L, Jian Z, Li J (2016) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918

    Article  Google Scholar 

  231. Wu L, Liu X, Yuan S, Xiao P (2010) A novel key generation cryptosystem based on face features. In: IEEE 10th International conference on signal processing proceedings. IEEE, pp 1675–1678

  232. Wu X, Qi N, Wang K, Zhang D (2008a) A novel cryptosystem based on iris key generation. In: 2008 Fourth international conference on natural computation. IEEE, vol 4, pp 53–56

  233. Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2018) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433:431–447

    Article  Google Scholar 

  234. Wu X, Wang P, Wang K, Xu Y (2009) Biometric cryptographic key generation based on city block distance. In: 2009 Workshop on Applications of Computer Vision (WACV). IEEE, pp 1–5

  235. Wu X, Wang K, Zhang D (2008b) A cryptosystem based on palmprint feature. In: 2008 19th International conference on pattern recognition. IEEE, pp 1–4

  236. Wu Y, Qiu B (2010) Transforming a pattern identifier into biometric key generators. In: 2010 IEEE international conference on multimedia and expo. IEEE, pp 78–82

  237. Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi YQ (2020) A novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans Syst Man, Cybern: Syst 50(4):1526–1536. https://doi.org/10.1109/TSMC.2018.2874281

    Article  Google Scholar 

  238. Yamazaki Y, Komatsu N (2001) A secure communication system using biometric identity verification. IEICE Trans Inf Syst 84(7):879–884

    Google Scholar 

  239. Yang B, Busch C (2020) Privacy-enhanced biometrics-secret binding scheme. US Patent 10,594,688

  240. Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings.(ICASSP’05). IEEE international conference on acoustics, speech, and signal processing, 2005.,IEEE, vol 5, pp 609–612

  241. Yang W, Wang S, Hu J, Zheng G, Chaudhry J, Adi E, Valli C (2018) Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem. IEEE Access 6:36939–36947

    Article  Google Scholar 

  242. Yin Y, Liu L, Sun X (2011) Sdumla-hmt: a multimodal biometric database. In: Chinese conference on biometric recognition. Springer, pp 260–268

  243. Yoon S, Jain AK (2015) Longitudinal study of fingerprint recognition. Proc Natl Acad Sci 112(28):8555–8560

    Article  Google Scholar 

  244. Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomputing 63(1):235–255

    Article  Google Scholar 

  245. You L, Fan M, Lu J, Wang S, Li F (2012) A key sharing fuzzy vault scheme. In: International conference on information and communications security. Springer, pp 453–460

  246. You L, Zhang G, Zhang F (2010) A fingerprint and threshold scheme-based key generation method. In: 5th International conference on computer sciences and convergence information technology. IEEE, pp 615–619

  247. Yu S, Tan D, Tan T (2006) A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition. In: 18Th International conference on pattern recognition (ICPR’06), IEEE, vol 4, pp 441–444

  248. Zainon NAFM, Razak SA (2017) Master and child key generation from palm vein. In: 2017 IEEE Conference on application, information and network security (AINS). IEEE, pp 37–41

  249. Zeng Z, Watters PA (2007) A novel face hashing method with feature fusion for biometric cryptosystems. In: Fourth european conference on universal multiservice networks (ECUMN’07). IEEE, pp 439–444

  250. Zhang Z, Yan J, Liu S, Lei Z, Yi D, Li SZ (2012) A face antispoofing database with diverse attacks. In: 2012 5th IAPR international conference on Biometrics (ICB). IEEE, pp 26–31

  251. Zheng G, Li W, Zhan C (2006) Cryptographic key generation from biometric data using lattice mapping. In: 18Th International conference on pattern recognition (ICPR’06), IEEE, vol 4, pp 513–516

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Kumar.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, P., Kumar, N. & Singh, M. Biometric cryptosystems: a comprehensive survey. Multimed Tools Appl 82, 16635–16690 (2023). https://doi.org/10.1007/s11042-022-13817-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13817-9

Keywords

Navigation