Template Protection for On-Line Signature-Based Recognition Systems

  • Emanuele Maiorana
  • Patrizio Campisi
  • Alessandro Neri
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5372)


Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two different approaches for the protection of on-line signature biometric templates. In the first one, cryptographic techniques are employed to protect signature features, making impossible to derive the original biometrics from the stored templates. In the second one, data hiding techniques are used to design a security scalable authentication system, embedding some dynamic signature features into a static representation of the signature itself. Extensive experimental results are provided to show the effectiveness of the presented protection methods.


Equal Error Rate False Acceptance Rate False Rejection Rate Biometric Template Error Correction Capability 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine 1, 33–42 (2003)CrossRefGoogle Scholar
  2. 2.
    Ratha, N., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proc. Int. Conf. Audio and Video-based Biometric Person Authentication (2001)Google Scholar
  3. 3.
    Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)CrossRefGoogle Scholar
  4. 4.
    Maiorana, E., Campisi, P., Neri, A.: Biometric Signature Authentication Using Radon Transform-Based watermarking Techniques. In: IEEE Biometric Symposium, Baltimore, MD, USA (2007)Google Scholar
  5. 5.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. In: EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics (2008)Google Scholar
  6. 6.
    Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Trans. on Inf. Forensics and Security 2(3) (2007)Google Scholar
  7. 7.
    Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: 6th ACM Conf. Computer and Communication Security, Singapore, pp. 28–36 (1999)Google Scholar
  8. 8.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings IEEE on International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)Google Scholar
  9. 9.
    Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. on Pattern Analysis and Machine Intelligence 28(12) (2006)Google Scholar
  10. 10.
    Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on PAMI 29(4) (2007)Google Scholar
  11. 11.
    Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric Hash based on statistical Features of online Signatures. In: Int. Conf. on Pattern Recognition, vol. 1 (2002)Google Scholar
  12. 12.
    Feng, H., Chan, C.W.: Private Key Generation from On-line Handwritten Signatures. In: Information Management and Computer Security, pp. 159–164 (2002)Google Scholar
  13. 13.
    Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic key generation using handwritten signature. In: SPIE, Defense and Security Symposium, Biometric Technologies for Human Identification, vol. 6202, pp. 225–231 (2006)Google Scholar
  14. 14.
    Van der Veen, M., Kevenaar, T., Schrijen, G.-J., Akkermans, T.H., Zuo, F.: Face biometrics with renewable templates. In: SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents, vol. 6072 (2006)Google Scholar
  15. 15.
    Maiorana, E., Campisi, P., Neri, A.: User Adaptive Fuzzy Commitment for Signature Templates Protection and Renewability. SPIE Journal of Electronic Imaging, Special Issue on Biometrics (2008)Google Scholar
  16. 16.
    Campisi, P., Maiorana, E., Neri, A.: On-line signature based authentication: template security issues and countermeasures. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications. Wiley/IEEE (in print, May 2008)Google Scholar
  17. 17.
    Maiorana, E., Campisi, P., Neri, A.: On-line signature authentication: user adaptive template protection and renewability. In: SPIE Defense and Security, Mobile Multimedia/Image Processing, Security, and Applications, Orlando, vol. 6982 (2008)Google Scholar
  18. 18.
    Purser, M.: Introduction to Error-Correcting Codes. Artech House, Boston (1995)zbMATHGoogle Scholar
  19. 19.
    Vielhauer, C., Steinmetz, R.: Handwriting: Feature Correlation Analysis for Biometric Hashes. EURASIP Journal on Applied Signal Processing, Special Issue on Biometric 4, 542–558 (2004)CrossRefGoogle Scholar
  20. 20.
    Do, M.N., Vetterli, M.: The Finite Ridgelet Transform for Image Representation. IEEE Transactions on Image Processing 12(1), 16–28 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Methods for Digital Watermarking and Information embedding. IEEE Transactions on Information Theory 47 (2001)Google Scholar
  22. 22.
    Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Emanuele Maiorana
    • 1
  • Patrizio Campisi
    • 1
  • Alessandro Neri
    • 1
  1. 1.Dip. Elettronica ApplicataUniversità degli Studi Roma TreRomaItaly

Personalised recommendations