Privacy Protection of Biometric Templates

  • Moazzam Butt
  • Olaf Henniger
  • Alexander Nouak
  • Arjan Kuijper
Part of the Communications in Computer and Information Science book series (CCIS, volume 434)

Abstract

Although many biometric characteristics are not secrets, biometric reference data (also known as biometric templates) need to be stored securely and to be protected against unauthorized use. For this purpose, biometric template protection techniques have been developed that do not only prevent privacy leakage and provide confidentiality of the stored biometric templates, but address also problems like identity theft and cross-matching of biometric templates stored in different systems. This paper describes the security and privacy risks associated with storing biometric data and highlights the necessity of using biometric template protection as a potential remedy to these risks. Privacy considerations are discussed with respect to using fingerprint verification for access control to a public outdoor swimming pool.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Unique Identification Authority of India. AADHAR, http://uidai.gov/in
  2. 2.
    US Department of Homeland Security, http://www.dhs.gov/us-visit-traveler-information
  3. 3.
    European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (october 1995), http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML
  4. 4.
    European Convention on Human Rights (December 1950), http://www.echr.coe.int/Pages/home.aspx?p=press/factsheets&c=
  5. 5.
    Hill, C.: Risk of masquerade arising from the storage of biometrics, B.S. thesis, Australian National Univ., Canberra, Australia (2013), http://chris.fornax.net/biometrics.html
  6. 6.
    Adler, A.: Vulnerabilities in biometric encryption systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Mohanty, P., Sarkar, S., Kasturi, R.: Privacy and security issues related to match scores. In: Proc. Conf. Computer Vision and Pattern Recognition Workshop, pp. 162–165 (2006)Google Scholar
  8. 8.
    Jain, A.K., Bolle, R., Pankanti, S. (eds.): Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers (1999)Google Scholar
  9. 9.
    ISO/IEC, ISO/IEC 24745 Information technology - Security techniques - Biometric information protection, ISO/IEC JTC 1/SC 27 (2010)Google Scholar
  10. 10.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics, 1–20 (January 2008)Google Scholar
  11. 11.
    Hall, J.I.: Generalized Reed-Solomon codes. Notes on Coding Theory, 63–76 (2003)Google Scholar
  12. 12.
    Ratha, N., Connell, J., Bolle, R.: Enhancing security and privacy in biometric-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)CrossRefGoogle Scholar
  13. 13.
    Teoh, A., Goh, A., Ngo, D.: Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12), 1892–1901 (2006)CrossRefGoogle Scholar
  14. 14.
    Ngo, D., Teoh, A., Goh, A.: Biometric hash: High-confidence face recognition. IEEE Trans. Circuits Syst. Video Technol. 16(6), 771–775 (2006)CrossRefGoogle Scholar
  15. 15.
    Sutcu, Y., Sencar, H., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: Proc. Seventh Workshop Multimedia and Security, pp. 111–116 (2005)Google Scholar
  16. 16.
    Teoh, A.B.J., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Inf. Process. Lett. 100(4), 145–150 (2006)CrossRefMATHMathSciNetGoogle Scholar
  17. 17.
    Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recognition 40(3), 1057–1065 (2007)CrossRefMATHGoogle Scholar
  18. 18.
    Ronellenfitsch, M.: 40. Tätigkeitsbericht des Hessischen Datenschutzbeauftragten (2011)Google Scholar
  19. 19.
    Eurosmart, Smart biometrics for trust and convenience – Analysis of use cases and best practice recommendations, Eurosmart Reference Paper (April 2012)Google Scholar
  20. 20.
    Zhou, X.: Privacy and security assessment of biometric template protection, PhD thesis, TU Darmstadt (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Moazzam Butt
    • 1
  • Olaf Henniger
    • 1
  • Alexander Nouak
    • 1
  • Arjan Kuijper
    • 1
  1. 1.Fraunhofer Institute for Computer Graphics Research IGDDarmstadtGermany

Personalised recommendations