Perpetuating Biometrics for Authentication

Introducing the Durable True-Neighbor Template
  • Fawaz E. Alsaadi
  • Terrance E. Boult
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 448)


The number of biometrically-enhanced authentication applications has outstripped our limited number of biometric features and controversy surrounds the actual availability of biometric information, fueling skepticism regarding their effective use for authentication. These concerns emphasize the imperative of addressing the singular nature of biometrics, motivating the need for durable biometric credentials that allow perpetual use of biometric information for authentication, even in the face of compromise. Toward this end, this paper introduces the Durable True-Neighbor Template (DTNT), a novel enhancement of our existing True-Neighbor Template (TNT) approach to fingerprint-based authentication that overcomes the singular nature of fingerprint biometrics through diversification using standard encryption. The results of a standard benchmark experiment, conducted using the FVC protocol with the FVC2006 and FVC2002 databases, are used to evaluate the effectiveness of DTNT for authentication. DTNT shows respectable authentication performance compared with TNT with a generally-negligible loss in fingerprint distinguishability.


Authentication Biometrics Durable Encryption Fingerprints Security Singular 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hackers Publish German Minister’s Fingerprint | WIRED.
  2. 2.
    VeriFinger SDK – Neurotechnology.
  3. 3.
    Hacker fakes German minister’s fingerprints using photos of her hands | Technology | The Guardian.
  4. 4.
    Alsaadi, F.E., Boult, T.E.: Furthering Fingerprint-Based Authentication: Introducing the True-Neighbor Template. UnpublishedGoogle Scholar
  5. 5.
    Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)Google Scholar
  6. 6.
    Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography 38, 237–257 (2006)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Bringer, J., Chabanne, H., Kindarji, B.: The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming 74, 43–51 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  8. 8.
    Kelkboom, E.J.C., Breebaart, J., Kevenaar, T.A.M., Buhan, I., Veldhuis, R.N.J.: Preventing the decodability attack based cross-matching in a fuzzy commitment scheme. IEEE Transactions on Information Forensics and Security 6, 107–121Google Scholar
  9. 9.
    Simoens, K., Tuyls, P., Preneel, B.: Privacy weaknesses in biometric sketches. In: 30th IEEE Symposium on Security and Privacy, 2009, pp. 188–203. IEEE (2009)Google Scholar
  10. 10.
    Tams, B.: Decodability attack against the fuzzy commitment scheme with public feature transforms. arXiv preprint arXiv:1406.1154
  11. 11.
    Kaizhi, C., Aiqun, H.: An enhancing fingerprint template protection method. In: 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 275–279. IEEE (2013)Google Scholar
  12. 12.
    Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: a filterbank for fingerprint representation and matching. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1999, vol. 2. IEEE (1999)Google Scholar
  13. 13.
    Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37, 2245–2255 (2004)CrossRefGoogle Scholar
  14. 14.
    Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., You, J.: An analysis of BioHashing and its variants. Pattern Recognition 39, 1359–1368 (2006)CrossRefzbMATHGoogle Scholar
  15. 15.
    Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing 69, 2390–2395 (2006)CrossRefGoogle Scholar
  16. 16.
    Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, 2007, pp. 1–6. IEEE (2007)Google Scholar
  17. 17.
    Nagar, A., Nandakumar, K., Jain, A.K.: Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th International Conference on Pattern Recognition, ICPR 2008, pp. 1–4. IEEE (2008)Google Scholar
  18. 18.
    Nagar, A., Nandakumar, K., Jain, A.K.: A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters 31, 733–741Google Scholar
  19. 19.
    Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Transactions on Information Forensics and Security 2, 744–757 (2007)CrossRefGoogle Scholar
  20. 20.
    Hartloff, J., Dobler, J., Tulyakov, S., Rudra, A., Govindaraju, V.: Towards fingerprints as strings: secure indexing for fingerprint matching. In: 2013 International Conference on Biometrics (ICB), pp. 1–6. IEEE (2013)Google Scholar
  21. 21.
    Nagar, A.: Biometric template security. Michigan State UniversityGoogle Scholar
  22. 22.
    Cappelli, R., Ferrara, M., Maltoni, D.: Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 2128–2141Google Scholar
  23. 23.
    Ferrara, M., Maltoni, D., Cappelli, R.: Noninvertible minutia cylinder-code representation. IEEE Transactions on Information Forensics and Security 7, 1727–1737Google Scholar
  24. 24.
    Fukunaga, K.: Statistical pattern recognition. Academic Press (1990)Google Scholar
  25. 25.
    Ferrara, M., Maltoni, D., Cappelli, R.: A two-factor protection scheme for MCC fingerprint templates. In: 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–8. IEEE (2014)Google Scholar
  26. 26.
    Cappelli, R., Ferrara, M., Franco, A., Maltoni, D.: Fingerprint verification competition 2006. Biometric Technology Today 15, 7–9 (2007)CrossRefGoogle Scholar
  27. 27.
    Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2002: second fingerprint verification competition. In: Proceedings of 16th International Conference on Pattern Recognition, 2002, vol. 3, pp. 811–814. IEEE (2002)Google Scholar
  28. 28.
    Cappelli, R., Ferrara, M., Maltoni, D.: Fingerprint indexing based on minutia cylinder-code. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 1051–1057Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of Colorado at Colorado SpringsColorado SpringsUSA

Personalised recommendations