Privacy and Identity 2014: Privacy and Identity Management for the Future Internet in the Age of Globalisation pp 169-184 | Cite as
A Survey on Multimodal Biometrics and the Protection of Their Templates
Abstract
In order to guarantee better user-friendliness and higher accuracy, beyond the existing traditional single-factor biometric systems, the multimodal ones appear to be more promising. Two or more biometric measurements for the same identity are extracted, stored and compared during the enrollment, authentication and identification processes. Deployed multimodal biometric systems also referred to as multibiometrics or even as multimodalities are commonly found and used in electronic chips, embedded in travel documents. The widespread use of such systems, the nature of the shared data and the importance of applications introduce privacy risks. A significant number of approaches and very recent advances to the relevant protection technologies have been published. This paper illustrates a comprehensive overview of research in multibiometrics, the protection of their templates and the privacy issues that arise. Up-to-date review of the existing literature revealing the current state-of-art suggestions is provided, based on the different levels of fusion and the employed protection algorithms, while an outlook to future prospects is also discussed.
Keywords
Multimodal biometric systems Multibiometrics Multimodalities Levels of fusion Biometric template protection scheme Biometric cryptosystem Privacy Security CryptographyNotes
Acknowledgments
This research will contribute to FIDELITY (Fast and trustworthy Identity Delivery and check with ePassports leveraging Traveler privacy), project funded by the European Commission, under the Security theme of the Seventh Framework Programme (Grant agreement no: 284862).
The authors would like to thank the reviewers for their ideas and support, regarding improvements for this survey.
References
- 1.Abaza, A., Ross, A., Hebert, C., Harrison, M.A.F., Nixon, M.S.: A survey on ear biometrics. ACM Comput. Surv. 45(2), 22 (2013)CrossRefGoogle Scholar
- 2.Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A: Syst. Humans 40(3), 525–538 (2010)CrossRefGoogle Scholar
- 3.Adams, C.: Achieving non-transferability in credential systems using hidden biometrics. Secur. Commun. Netw. 4(2), 195–206 (2011)CrossRefGoogle Scholar
- 4.Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)CrossRefMATHMathSciNetGoogle Scholar
- 5.Nagar, A., Nandakumar, K., Jain, A.K.: Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7(1), 255–268 (2012)CrossRefGoogle Scholar
- 6.Sim, H.M., Asmuni, H., Hassan, R., Othman, R.M.: Multimodal biometrics: weighted score level fusion based on non-ideal iris and face images. Expert Syst. Appl. 41(11), 5390–5404 (2014)CrossRefGoogle Scholar
- 7.Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)CrossRefGoogle Scholar
- 8.Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113 (2008)CrossRefGoogle Scholar
- 9.Rathgeb, C., Busch, C.: Multi-biometric template protection: Issues and challenges. In: New Trends and Developments in Biometrics, pp. 173–190 (2012)Google Scholar
- 10.Argones Rua, E., Maiorana, E., Alba Castro, J.L., Campisi, P.: Biometric template protection using universal background models: an application to online signature. IEEE Trans. Inf. Forensics Secur. 7(1), 269–282 (2012)CrossRefGoogle Scholar
- 11.Isobe, Y., Ohki, T., Komatsu, N.: Security performance evaluation for biometric template protection techniques. Int. J. Biometrics 5(1), 53–72 (2013)CrossRefGoogle Scholar
- 12.Simoens, K.: Security and privacy challenges with biometric solutions. LSEC Biometrics (2011)Google Scholar
- 13.Lu, L., Peng, J.: Finger multi-biometric cryptosystem using feature-level fusion (2014)Google Scholar
- 14.Hoang, T., Choi, D.: Secure and privacy enhanced gait authentication on smart phone. Sci. World J. Article ID 438254, 8 p. (2014). doi: 10.1155/2014/438254
- 15.Peng, J., Li, Q., El-Latif, A.A.A., Niu, X.: Finger multibiometric cryptosystems: fusion strategy and template security. J. Electron. Imaging 23(2), 023001–023001 (2014)CrossRefGoogle Scholar
- 16.Chin, Y., Ong, T., Teoh, A., Goh, K.: Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Inf. Fusion 18, 161–174 (2014)CrossRefGoogle Scholar
- 17.Maiorana, E.: Biometric cryptosystem using function based on-line signature recognition. Expert Syst. Appl. 37(4), 3454–3461 (2010)CrossRefGoogle Scholar
- 18.Bringer, J., Chabanne, H., Patey, A.: Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Sig. Process. Mag. 30(2), 42–52 (2013)CrossRefGoogle Scholar
- 19.Rathgeb, C., Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(1), 1–25 (2011)CrossRefGoogle Scholar
- 20.Kumar Ramachandran Nair, S., Bhanu, B., Ghosh, S., Thakoor, N.S.: Predictive models for multibiometric systems. Pattern Recogn. 47(12), 3779–3792 (2014)CrossRefGoogle Scholar
- 21.Simoens, K., Bringer, J., Chabanne, H., Seys, S.: A framework for analyzing template security and privacy in biometric authentication systems. IEEE Trans. Inf. Forensics Secur. 7(2), 833–841 (2012)CrossRefGoogle Scholar
- 22.Cavoukian, A., Stoianov, A.: Privacy by design solutions for biometric one-to-many identification systems (2014)Google Scholar
- 23.Rathgeb, C., Busch, C.: Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters. Comput. Secur. 42, 1–12 (2014)CrossRefGoogle Scholar
- 24.Cavoukian, A., Stoianov, A.: Biometric encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 90–98. Springer, US (2011)Google Scholar
- 25.Sutcu, Y., Li, Q., Memon, N.: Secure sketches for protecting biometric templates. In: Campisi, P. (ed.) Security and Privacy in Biometrics, pp. 69–104. Springer, London (2013)CrossRefGoogle Scholar
- 26.Breebaart, J., Yang, B., Buhan-Dulman, I., Busch, C.: Biometric template protection. Datenschutz und Datensicherheit-DuD 33(5), 299–304 (2009)CrossRefGoogle Scholar
- 27.Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436–446. Springer, Heidelberg (2005) CrossRefGoogle Scholar
- 28.Lee, D.G., Hussain, S., Roussos, G., Zhang, Y.: Editorial: special issue on security and multimodality in pervasive environments. Wireless Pers. Commun. 55(1), 1–4 (2010)CrossRefGoogle Scholar
- 29.Butt, M., Henniger, O., Nouak, A., Kuijper, A.: Privacy protection of biometric templates. In: Stephanidis, C. (ed.) HCI 2014, Part I. CCIS, vol. 434, pp. 153–158. Springer, Heidelberg (2014) CrossRefGoogle Scholar
- 30.Wang, N., Li, Q., Ahmed, A., El-Latif, Abd., Peng, J., Yan, X., Niu, X.: A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Sig. Image Video Process., 1–11 (2014). doi: 10.1007/s11760-014-0663-2
- 31.Buchmann, N., Rathgeb, C., Baier, H., Busch, C.: Towards electronic identification and trusted services for biometric authenticated transactions in the single euro payments area. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 172–190. Springer, Heidelberg (2014) CrossRefGoogle Scholar
- 32.Connaughton, R., Bowyer, K.W., Flynn, P.J.: Fusion of face and iris biometrics. In: Burge, M.J., Bowyer, K.W. (eds.) Handbook of Iris Recognition, pp. 219–237. Springer, London (2013) CrossRefGoogle Scholar
- 33.Awad, A.I., Hassanien, A.E.: Impact of some biometric modalities on forensic science. In: Muda, A.K., Choo, Y.-H., Abraham, A., Srihari, S.N. (eds.) Computational Intelligence in Digital Forensics: Forensic Investigationand Applications, pp. 47–62. Springer, Switzerland (2014)CrossRefGoogle Scholar
- 34.Campisi, P.: Security and Privacy in Biometrics. Springer, London (2013) CrossRefGoogle Scholar
- 35.Jillela, R.R., Ross, A.A., Boddeti, V.N., Kumar, B.V.K.V., Hu, X., Plemmons, R.J., Pauca, P.: Iris segmentation for challenging periocular images. In: Burge and Bowyer [11], pp. 281–308Google Scholar
- 36.Burge, M.J., Bowyer, K.W. (eds.): Handbook of Iris Recognition. Advances in Computer Vision and Pattern Recognition. Springer, London (2013)Google Scholar
- 37.Ross, A.A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics, vol. 6. Springer, New York (2006) Google Scholar
- 38.Kong, A., Zhang, D., Kamel, M.: Palmprint identification using feature-level fusion. Pattern Recogn. 39(3), 478–487 (2006)CrossRefMATHGoogle Scholar
- 39.Wouters, K., Simoens, K., Lathouwers, D., Preneel, B.: Secure and privacy-friendly logging for egovernment services. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 1091–1096. IEEE (2008)Google Scholar
- 40.Juels, A., Molnar, D., Wagner, D.: Security and privacy issues in e-passports. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 74–88. IEEE (2005)Google Scholar
- 41.Kelkboom, E.J., Breebaart, J., Buhan, I., Veldhuis, R.N.: Analytical template protection performance and maximum key size given a gaussian-modeled biometric source. In: SPIE Defense, Security, and Sensing, pp. 76670D–76670D. International Society for Optics and Photonics (2010)Google Scholar
- 42.Rathgeb, C., Uhl, A., Wild, P.: Reliability-balanced feature level fusion for fuzzy commitment scheme. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1–7. IEEE (2011)Google Scholar
- 43.Siddiqui, A.M., Telgad, R., Deshmukh, P.D.: Multimodal biometric systems. Study Improv. Accuracy Perform. 4(1), 165–171 (2014)Google Scholar
- 44.Nandakumar, K., Jain, A.K.: Multibiometric template security using fuzzy vault. In: 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems, BTAS 2008, pp. 1–6. IEEE (2008)Google Scholar
- 45.Kelkboom, E., Zhou, X., Breebaart, J., Veldhuis, R., Busch, C.: Multi-algorithm fusion with template protection. In: IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems, BTAS 2009, pp. 1–8. IEEE (2009)Google Scholar
- 46.Sutcu, Y., Li, Q., Memon, N.: Secure biometric templates from fingerprint-face features. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2007, pp. 1–6. IEEE (2007)Google Scholar
- 47.Radhika, K., Sekhar, G., Venkatesha, M.: Pattern recognition techniques in on-line hand written signature verification-a survey. In: International Conference on Multimedia Computing and Systems, ICMCS 2009, pp. 216–221. IEEE (2009)Google Scholar
- 48.Rajibul Islam, M., Shohel Sayeed, M., Samraj, A.: Multimodality to improve security and privacy in fingerprint authentication system. In: International Conference on Intelligent and Advanced Systems, ICIAS 2007, pp. 753–757. IEEE (2007)Google Scholar
- 49.Yang, B., Hartung, D., Simoens, K., Busch, C.: Dynamic random projection for biometric template protection. In: 2010 Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pp. 1–7. IEEE (2010)Google Scholar
- 50.Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E.M., Preneel, B.: Criteria towards metrics for benchmarking template protection algorithms. In: 2012 5th IAPR International Conference on Biometrics (ICB), pp. 498–505. IEEE (2012)Google Scholar
- 51.Nandakumar, K.: A fingerprint cryptosystem based on minutiae phase spectrum. In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE (2010)Google Scholar
- 52.Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: Generation and use of a biometric key, US Patent 8,670,562, Mar 11 2014Google Scholar
- 53.Yang, B., Busch, C., Bringer, J., Kindt, E., Belser, W.R., Seidel, U., Springmann, E., Rabeler, U., Wolf, A., Aukrust, M.: Towards standardizing trusted evidence of identity. In: Proceedings of the 2013 ACM Workshop on Digital Identity Management, pp. 63–72. ACM (2013)Google Scholar
- 54.Bolle, R.M., Chikkerur, S.S., Connell, J.H., Ratha, N.K.: Methods and apparatus for generation of cancelable fingerprint template, US Patent 8,538,096, 17 September 2013Google Scholar
- 55.Cheng, W., An, G.: Face template protection using chaotic encryption (2013)Google Scholar
- 56.Abt, S.: Assessing Semantic Conformance of Minutiae-based Feature Extractors. Ph.D. thesis, M.Sc. thesis (2011)Google Scholar
- 57.
- 58.ISO/IEC 24745/2011, Information Technology - Security Techniques - Biometric Information Protection (2011)Google Scholar