Advertisement

Multi-biometric Template Protection: An Overview

  • Fatima BedadEmail author
  • Réda Adjoudj
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 62)

Abstract

Today, biometrics is a research field in full expansion, several identification and verification systems are now being developed, however their performance is inadequate to meet the growing needs of security. The use of a single biometric modality decreases, in most cases, the reliability of these systems, which prompted us to combine several modality. This article provides a complementary aspect to the improved performance of biometric systems namely the protection of privacy. Techniques have been proposed in the last decade on the biometric template protection. Include BioHashing that wants a generalization of biometrics a hash function to protect the biometric data. The main objective is the protection of privacy. This paper presents state of the art specific algorithms, which are illustrated with recent work by researchers in this field.

Keywords

Multi-biometrics Protection of privacy Biometric cryptosystems Revocable biometrics BioHashing 

References

  1. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113 (2008)CrossRefGoogle Scholar
  2. Wanjare, M.P.A., Tagalpallewar, M.M.H.: Secure internet verification base on multibiometric system. Int. J. Res. Emerg. Sci. Technol. 2(1) (2015)Google Scholar
  3. Argyropoulos, S., Tzovaras, D., Ioannidis, D., Damousis, Y., Strintzis, M.G., Braun, M., Boverie, S.: Biometric template protection in multimodal authentication systems based on error correcting codes. J. Comput. Secur. 18(1), 161–185 (2010)CrossRefGoogle Scholar
  4. Damasceno, M., Canuto, A.M., Poh, N.:Multi-privacy biometric protection scheme using ensemble systems. In: 2015 International Joint Conference on Neural Networks (IJCNN), pp. 1–8. IEEE (2015)Google Scholar
  5. Feng, H., Choong Wah, C.: Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Secur. 10(4), 159–164 (2002)CrossRefGoogle Scholar
  6. Goh, A., Ngo, D.C.: Computation of cryptographic keys from face biometrics. In: IFIP International Conference on Communications and Multimedia Security pp. 1–13. Springer, Berlin (2003)Google Scholar
  7. Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: Cancelable iris biometrics using block re-mapping and image warping. In: International Conference on Information Security, pp. 135–142. Springer, Berlin (2009)Google Scholar
  8. Kanade, S., Petrovska-Delacrétaz, D., Dorizzi, B.: Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 138–145. IEEE (2010)Google Scholar
  9. Karthi, G., Azhilarasan, M.: Hybrid multimodal template protection technique using fuzzy extractor and random projection. IJRCCT 2(7), 381–386 (2013)Google Scholar
  10. Kelkboom, E.J.C., Zhou, X., Breebaart, J., Veldhuis, R.N., Busch, C.: Multi-algorithm fusion with template protection. In: IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, BTAS 2009, pp. 1–8. IEEE (2009)Google Scholar
  11. Rathgeb, C., Busch, C.: Multi-biometric template protection: Issues and challenges. In New trends and developments in biometrics. InTech, Rijeka (2012)Google Scholar
  12. Chavan, K.P., Gawande, S.: Fingerprint Combination for Privacy Protection. ISSN 2321-8665 03(02), 0114–0123 (2015)Google Scholar
  13. Ramachandra R., Sigaard, M.K., Raja K., Gomez-Barrero, M., Stokkenes, M., Busch, C.: Multi biometric template protection a security analysis of binarized statistical features for bloom filters on smartphones. In: 2016 6th International Conference on Image Processing Theory Tools and Applications (IPTA), pp. 1–6. IEEE (2016)Google Scholar
  14. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRefGoogle Scholar
  15. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)CrossRefGoogle Scholar
  16. Rathgeb, C., Busch, C.: Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters. Comput. Secur. 42, 1–12 (2014)CrossRefGoogle Scholar
  17. Rathgeb, C., Gomez-Barreroy, M., Busch, C., Galballyy, J., Fierrezy, J.: «Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris»; (tec2012-34881) from Spanish Mineco, Fidelity (fp7-sec-284862) and beat (fp7-sec-284989) (2015)Google Scholar
  18. Shanthini, B., Swamynathan, S.: Multimodal biometric-based secured authentication system using steganography. J. Comput. Sci. 8(7), 1012 (2012)CrossRefGoogle Scholar
  19. Yildiz, M., Yanikoğlu, B., Kholmatov, A., Kanak, A., Uludağ, U., Erdoğan, H.: Biometric layering with fingerprints: template security and privacy through multi-biometric template fusion. Comput. J. 60(4), 573–587 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Evolutionary Engineering and Distributed Information Systems Laboratory, EEDIS–Computer Science DepartmentUniversity of Sidi Bel-AbbèsSidi Bel-AbbèsAlgeria

Personalised recommendations