Abstract
With the emergence of biometric authentication systems, template protection for biometrics captured attention in the recent years. The privacy concern arises due to storage and misuse of biometric data in various applications. This chapter systematically reviews the published literature on Biometric Template Protection (BTP) during 2005–2016 and covers the methods described in more than hundred articles. It aims to present the current status of BTP schemes by a methodical analysis and taxonomy of BTP approaches, modalities, the fusion of modalities (multi-modal), and hybrid methods. It also presents research implications and extraction outcomes of Systematic Literature Review conducted on BTP schemes. This research work helps researchers and practitioners to find relevant information on BTP methods thereby reducing time and complexity in searching the appropriate studies.
This is a preview of subscription content, log in via an institution.
References
A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal Process. 2008, 579416 (2008)
A. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)
A Jain, A.A. Ross, K. Nandakumar, Introduction to Biometrics (Springer, Berlin, 2011)
D.C.L. Ngo, A.B.J. Teoh, J. Hu, Biometric Security (Cambridge Scholars Publishing, Newcastle upon Tyne, 2015)
W.J. Wong, A.B. Teoh, Y.H. Kho, M.D. Wong, Kernel PCA enabled bit-string representation for minutiae-based cancelable fingerprint template. Pattern Recogn. 51, 197–208 (2016)
K. Nandakumar, A. Jain, Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32 (5), 88–100 (2015)
G.J. Tomko, C. Soutar, G.J. Schmidt, Fingerprint controlled public key cryptographic system. US Patent 5832091 A (1996). http://www.google.co.in/patents/US5832091
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, Biometric encryption: enrollment and verification procedures, in Proceedings of SPIE: Optical Pattern Recognition (1998), pp. 24–35
A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Proceedings of the 6th ACM Conference on Computer and Communications Security (1999), pp. 28–36
N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 (3), 614–634 (2001)
A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory (2002)
H. Feng, C.C. Wah, Private key generation from online handwritten signatures. Inf. Manage. Comput. Secur. 10 (4), 159–164 (2002)
A. Goh, D. Ngo, Computation of cryptographic keys from face biometrics, in Communications and Multimedia Security. Advanced Techniques for Network and Data Protection (Springer, Berlin, 2003), pp. 1–13
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT (2004), pp. 523–540
Y. Sutcu, Q. Li, N. Memon, Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2 (3), 503–512 (2007)
T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens, in 7th International Conference on Automatic Face and Gesture Recognition (FGR) (2006), pp. 560–566
T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis, in Conference on Computer Vision and Pattern Recognition (CVPR) (2007), pp. 1–8
S. Ye, Y. Luo, J. Zhao, S.C.S. Cheung, Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 2:1–2:17 (2009)
U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92 (6), 948–960 (2004)
C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011 (1), 3 (2011)
S. Rane, Y. Wang, S.C. Draper, P. Ishwar, Secure biometrics: concepts, authentication architectures, and challenges. IEEE Signal Process. Mag. 30 (5), 51–64 (2013)
V. Patel, N. Ratha, R. Chellappa, Cancelable biometrics: a review. IEEE Signal Process. Mag. 32 (5), 54–65 (2015)
I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, J. Yearwood, Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)
B. Kitchenham, S. Charters, Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint Report (2007)
B. Kitchenham, Procedures for performing systematic reviews, Joint Technical Report (Keele University Technical Report TR/SE-0401 and National ICT Australia Ltd. NICTA Technical Report 0400011T.1) (2004)
ISO/IEC JTC1 SC27 24745, Biometric information protection (2011)
K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, B. Preneel Criteria towards metrics for benchmarking template protection algorithms, in 5th IAPR International Conference on Biometrics (ICB) (2012), pp. 498–505
A. Cavoukian, A. Stoianov, in ed. by S. Li, A. Jain, Encyclopedia of Biometrics (Springer, New York, 2009), pp. 260–269
F. Hao, R. Anderson, J. Daugman, Combining cryptography with biometrics effectively. IEEE Trans. Comput. 55 (9), 1081–1088 (2006)
M. VanderVeen, T. Kevenaar, G.J. Schrijen, T.H. Akkermans, F. Zuo, Face biometrics with renewable templates, in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6072 (2006)
G. Zheng, W. Li, C. Zhan, Cryptographic key generation from biometric data using lattice mapping, in 18th International Conference on Pattern Recognition (ICPR), vol. 4 (2006), pp. 513–516
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Optimal iris fuzzy sketches, in First International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2007), pp. 1–6
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Theoretical and practical boundaries of binary secure sketches. IEEE Trans. Inf. Forensics Secur. 3 (4), 673–683 (2008)
A.B.J. Teoh, J. Kim, Secure biometric template protection in fuzzy commitment scheme. IEICE Electron. Expr. 4 (23), 724–730 (2007)
E. Maiorana, P. Campisi, A. Neri, User adaptive fuzzy commitment for signature template protection and renewability. J. Electron. Imaging 17 (1), 011011 (2008)
M. Ao, S. Li, Near infrared face based biometric key binding, in Advances in Biometrics (Springer, Berlin, 2009), pp. 376–385
C. Rathgeb, A. Uhl, Systematic construction of iris-based fuzzy commitment schemes, in 3rd International Conference on Biometrics (ICB) (2009), pp. 940–949
H. Lu, K. Martin, F. Bui, K.N. Plataniotis, D. Hatzinakos, Face recognition with biometric encryption for privacy-enhancing self-exclusion, in Proceedings of the 16th International Conference on Digital Signal Processing (2009), pp. 625–632
E. Maiorana, P. Campisi, Fuzzy commitment for function based signature template protection. IEEE Signal Process Lett. 17 (3), 249–252 (2010)
K. Nandakumar, A fingerprint cryptosystem based on minutiae phase spectrum, in IEEE International Workshop on Information Forensics and Security (WIFS) (2010), pp. 1–6
C. Rathgeb, A. Uhl, Adaptive fuzzy commitment scheme based on iris-code error analysis, in European Workshop on Visual Information Processing (EUVIP) (2010), pp. 41–44
C. Rathgeb, A. Uhl, P. Wild, Reliability-balanced feature level fusion for fuzzy commitment scheme, in International Joint Conference on Biometrics (IJCB), pp 1–7 (2011)
P. Li, X. Yang, H. Qiao, K. Cao, E. Liu, J. Tian, An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst. Appl. 39 (7), 6562–6574 (2012)
Y. Imamverdiyev, A.B.J. Teoh, J. Kim, Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst. Appl. 40 (5), 1888–1901 (2013)
L. Yuan, Multimodal cryptosystem based on fuzzy commitment, in 17th International Conference on Computational Science and Engineering (CSE) (2014), pp. 1545–1549
S. Billeb, C. Rathgeb, H. Reininger, K. Kasper, C. Busch, Biometric template protection for speaker recognition based on universal background models. IET Biom. 4 (2), 116–126 (2015)
N. Wang, Q. Li, A.A.A. El-Latif, J. Peng, X. Yan, X. Niu, A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9, 1–11 (2015)
T. Ignatenko, F. Willems, Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 5(2), 337–348 (2010)
C. Rathgeb, A. Uhl, Statistical attack against iris-biometric fuzzy commitment schemes, in Computer Vision and Pattern Recognition Workshops (CVPRW) (2011), pp. 23–30
C. Rathgeb, A. Uhl, Statistical attack against fuzzy commitment scheme. IET Biom. 1 (2), 94–104 (2012)
C. Rathgeb, A. Uhl Iris-biometric fuzzy commitment schemes under signal degradation, in International Conference on Image and Signal Processing (ICISP) (2012), pp. 217–225
X. Zhou, A. Kuijper, R. Veldhuis, C. Busch, Quantifying privacy and security of biometric fuzzy commitment, in International Joint Conference on Biometrics (IJCB) (2011), pp. 1–8
X. Zhou, A. Kuijper, C. Busch, Retrieving secrets from iris fuzzy commitment, in 5th IAPR International Conference on Biometrics (ICB) (2012), pp. 238–244
X. Zhou, C. Busch, Measuring privacy and security of iris fuzzy commitment, in IEEE International Carnahan Conference on Security Technology (ICCST) (2012), pp. 168–173
E. Kelkboom, J. Breebaart, I. Buhan, R. Veldhuis, Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources. IEEE Trans. Inf. Forensics Secur. 7 (4), 1225–1241 (2012)
M. Sandhya, M.V. Prasad, A bio-cryptosystem for fingerprints using delaunay neighbor structures (DNS) and fuzzy commitment scheme, in Advances in Signal Processing and Intelligent Recognition Systems (2016), pp. 159–171
U. Uludag, S. Pankanti, A.K. Jain, Fuzzy vault for fingerprints, in Proceedings of 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, Hilton Rye Town, NY, USA, 20–22 July 2005
U. Uludag, A. Jain, Securing fingerprint template: fuzzy vault with helper data, in Conference on Computer Vision and Pattern Recognition Workshop (CVPRW) (2006), pp. 163–163
K. Nandakumar, A. Jain, S. Pankanti, Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2 (4), 744–757 (2007)
K. Nandakumar, A. Nagar, A.K. Jain, Hardening fingerprint fuzzy vault using password, in International Conference on Biometrics (ICB) (2007), pp. 927–937
A. Nagar, K. Nandakumar, A.K. Jain, Securing fingerprint template: fuzzy vault with minutiae descriptors, in 19th International Conference on Pattern Recognition (ICPR) (2008), pp. 1–4
D. Nyang, K. Lee, Fuzzy face vault: how to implement fuzzy vault with weighted features, in 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI (2007), pp. 491–496
Y.J. Lee, K.R. Park, S.J. Lee, K. Bae, J. Kim, A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans. Syst. Man Cybern. B Cybern. 38 (5), 1302–1313 (2008)
E. Kelkboom, X. Zhou, J. Breebaart, R. Veldhuis, C. Busch, Multi-algorithm fusion with template protection, in 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2009), pp. 1–8
X. Zhou, A. Opel, J. Merkle, U. Korte, C. Busch, Enhanced template protection with passwords for fingerprint recognition, in Third International Workshop on Security and Communication Networks (IWSCN) (2011), pp. 67–74
A, Nagar, K. Nandakumar, A. Jain, Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7 (1), 255–268 (2012)
L. Hong-wei, W. Yao, A new fuzzy fingerprint vault using multivariable linear function based on lorenz chaotic system, in International Conference on Computer Science and Automation Engineering (CSAE), vol. 1 (2012), pp. 531–534
A. Bhateja, S. Chaudhury, P. Saxena, A robust online signature based cryptosystem, in 14th International Conference on Frontiers in Handwriting Recognition (ICFHR) (2014), pp. 79–84
H. Liu, D. Sun, K. Xiong, Z. Qiu, Palmprint based multidimensional fuzzy vault scheme. Sci. World J. 2014, 8p. (2014)
C. Rathgeb, J. Wagner, B. Tams, C. Busch, Preventing the cross-matching attack in bloom filter-based cancelable biometrics, in International Workshop on Biometrics and Forensics (IWBF) (2015), pp. 1–6
T.H. Nguyen, Y. Wang, Y. Ha, R. Li, Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints. IET Biom. 4 (1), 29–39 (2015)
B. Tams, J. Merkle, C. Rathgeb, J. Wagner, U. Korte, C. Busch, Improved fuzzy vault scheme for alignment-free fingerprint features, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2015), pp. 1–12
D. Bansal, S. Sofat, M. Kaur, Fingerprint fuzzy vault using Hadamard transformation, in International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2015), pp. 1830–1834
C. Li, J. Hu, A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11 (3), 543–555 (2016)
T.H. Nguyen, Y. Wang, Y. Ha, R. Li, Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biom. 2 (2), 48–55 (2013)
G. Eskander, R. Sabourin, E. Granger, Improving signature-based biometric cryptosystems using cascaded signature verification-fuzzy vault (SV-FV) approach, in 2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR) (2014), pp. 187–192
G. Eskander, R. Sabourin, E. Granger, Offline signature-based fuzzy vault: a review and new results, in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM) (2014), pp. 45–52
B. Tams, P. Mihailescu, A. Munk, Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10 (5), 985–998 (2015)
M. Lafkih, P. Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, M. El Haziti, D. Aboutajdine, Vulnerabilities of fuzzy vault schemes using biometric data with traces, in International Wireless Communications and Mobile Computing Conference (IWCMC) (2015), pp. 822–827
L. Leng, A.B.J. Teoh, Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48 (7), 2290–2303 (2015)
S. Hoque, M. Fairhurst, G. Howells, Evaluating biometric encryption key generation using handwritten signatures, in Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS’08) (2008), pp. 17–22
C. Rathgeb, A. Uhl, An iris-based interval-mapping scheme for biometric key generation, in Proceedings of 6th International Symposium on Image and Signal Processing and Analysis (2009), pp. 511–516
B. Carrara, C. Adams, You are the key: generating cryptographic keys from voice biometrics, in Eighth Annual International Conference on Privacy Security and Trust (PST) (2010), pp. 213–222
L. Wu, X. Liu, S. Yuan, P. Xiao, A novel key generation cryptosystem based on face features, in 10th International Conference on Signal Processing (ICSP) (2010), pp. 1675–1678
E. Liu, J. Liang, L. Pang, M. Xie, J. Tian, Minutiae and modified biocode fusion for fingerprint-based key generation. J. Netw. Comput. Appl. 33 (3), 221–235 (2010)
R. Ranjan, S. Singh, Improved and innovative key generation algorithms for biometric cryptosystems, in 3rd International Advance Computing Conference (IACC) (2013), pp. 943–946
W. Yang, J. Hu, S. Wang, M. Stojmenovic, An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn. 47 (3), 1309–1320 (2014)
W. Yang, J. Hu, S. Wang, A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9 (7), 1179–1192 (2014)
A.B. Teoh, Y.W. Kuan, S. Lee, Cancellable biometrics and annotations on biohash. Pattern Recogn. 41 (6), 2034–2044 (2008)
T. Connie, A. Teoh, M. Goh, D. Ngo, Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93 (1), 1–5 (2005)
A. Teoh, D. Ngo, Biophasor: token supplemented cancellable biometrics, in 9th International Conference on Control, Automation, Robotics and Vision (ICARCV) (2006), pp. 1–5
A. Teoh, A. Goh, D. Ngo, Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28 (12), 1892–1901 (2006)
C.S. Chin, A.T.B. Jin, D.N.C. Ling, High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102 (2), 169–177 (2006)
W.K. Yip, A.B.J. Teoh, D.C.L. Ngo, Replaceable and securely hashed keys from online signatures. IEICE Electron. Expr. 3 (18), 410–416 (2006)
M. Jeong, C. Lee, J. Kim, J.Y. Choi, K.A. Toh, J. Kim, Changeable biometrics for appearance based face recognition, in 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference (2006), pp. 1–5
A. Teoh, C.T. Yuang, Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. 37 (5)1096–1106 (2007)
Y.W. Kuan, A.B. Teoh, D.C. Ngo, Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2N discretization. EURASIP J. Appl. Signal Process. 2007 (1), 32 (2007)
Y. Kim, K.A. Toh, A method to enhance face biometric security, in First International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2007), pp. 1–6
Y. Wang, K. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in Biometrics Symposium (2007), pp. 1–6
A.B. Teoh, Y.W. Kuan, S Lee, Cancellable biometrics and annotations on biohash. Pattern Recogn. 41 (6), 2034–2044 (2008)
J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric, in 19th International Conference on Pattern Recognition (ICPR) (2008), pp. 1–4
S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching, in Advances in Biometrics (Springer, Berlin, 2009), pp. 868–878
A.B.J. Teoh, L.Y. Chong, Secure speech template protection in speaker verification system. Speech Comm. 52 (2), 150–163 (2010)
O. Osama, N. Tsumura, T. Nakaguchi, Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iris codes. IEICE Trans. Inf. Syst. 93 (7), 1878–1888 (2010)
O. Ouda, N. Tsumura, T. Nakaguchi, Tokenless cancelable biometrics scheme for protecting iris codes, in 20th International Conference on Pattern Recognition (ICPR) (2010), pp. 882–885
J. Pillai, V. Patel, R. Chellappa, N. Ratha, Sectored random projections for cancelable iris biometrics, in International Conference on Acoustics Speech and Signal Processing (ICASSP) (2010), pp. 1838–1841
L. Leng, J. Zhang, Palmhash code vs. palmphasor code. Neurocomputing 108, 1–12 (2013)
L. Leng, A.B.J. Teoh, M. Li, M.K. Khan, Analysis of correlation of 2d palmhash code and orientation range suitable for transposition. Neurocomputing 131, 377–387 (2014)
A. Kong, K.H. Cheung, D. Zhang, M. Kamel, J. You, An analysis of biohashing and its variants. Pattern Recogn. 39 (7), 1359–1368 (2006)
O. Osama, N. Tsumura, T. Nakaguchi, On the security of bioencoding based cancelable biometrics. IEICE Trans. Inf. Syst. 94 (9), 1768–1777 (2011)
N.K. Ratha, S. Chikkerur, J.H. Connell, R.M. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29 (4), 561–572 (2007)
S. Chikkerur, N.K. Ratha, J.H. Connell, R.M. Bolle, Generating registration-free cancelable fingerprint templates, in 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2008), pp. 1–6
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, A. Neri, Template protection for hmm-based on-line signature authentication, in Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’08) (2008), pp. 1–6
E. Maiorana, P. Campisi, J. Ortega-Garcia, A. Neri, Cancelable biometrics for hmm-based signature recognition, in 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2008), pp. 1–6
W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in 2008 International Symposium on Electronic Commerce and Security (2008), pp. 412–415
J. Hämmerle-Uhl, E. Pschernig, A. Uhl, Cancelable iris biometrics using block re-mapping and image warping, in Information Security (Springer, Berlin, 2009), pp. 135–142
H. Yang, X. Jiang, A. Kot, Generating secure cancelable fingerprint templates using local and global features, in 2nd International Conference on Computer Science and Information Technology ICCSIT (2009), pp. 645–649
C. Rathgeb, A. Uhl, Secure iris recognition based on local intensity variations, in Image Analysis and Recognition (Springer, Berlin, 2010), pp. 266–275
P. Farberbock, J. Hämmerle-Uhl, D. Kaaser, E. Pschernig, A. Uhl, Transforming rectangular and polar iris images to enable cancelable biometrics, in Image Analysis and Recognition (Springer, Berlin, 2010), pp. 276–286
E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, A. Neri, Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 40 (3), 525–538 (2010)
C. Lee, J. Kim, Cancelable fingerprint templates using minutiae-based bit-strings. J. Netw. Comput. Appl. 33 (3), 236–246 (2010)
L. Nanni, E. Maiorana, A. Lumini, P. Campisi, Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Syst. Appl. 37 (5), 3676–3684 (2010)
J. Zhe, A. Jin, Fingerprint template protection with minutia vicinity decomposition, in International Joint Conference on Biometrics (IJCB) (2011), pp. 1–7
J. Pillai, V. Patel, R. Chellappa, N. Ratha, Secure and robust iris recognition using random projections and sparse representations. IEEE Trans. Pattern Anal. Mach. Intell. 33 (9), 1877–1893 (2011)
T. Ahmad, J. Hu, S. Wang, Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn. 44 (10–11), 2555–2564 (2011)
K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94 (1), 233–244 (2011)
S. Wang, J. Hu, Alignment-free cancelable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn. 45 (12), 4129–4137 (2012)
P. Das, K. Karthik, B.C. Garai, A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs. Pattern Recogn. 45 (9), 3373–3388 (2012)
C. Moujahdi, S. Ghouzali, M. Mikram, M. Rziza, G. Bebis, Spiral cube for biometric template protection, in Image and Signal Processing (Springer, Berlin, 2012), pp. 235–244
M. Ferrara, D. Maltoni, R. Cappelli, Noninvertible minutia cylinder-code representation. IEEE Trans. Inf. Forensics Secur. 7 (6), 1727–1737 (2012)
W.J. Wong, M.L.D. Wong, Y.H. Kho, Multi-line code: a low complexity revocable fingerprint template for cancelable biometrics. J. Cent. South Univ. 20 (5), 1292–1297 (2013)
W.J. Wong, A.B. Teoh, M.D. Wong, Y.H. Kho, Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn. Lett. 34 (11), 1221–1229 (2013)
W. Yang, J. Hu, S. Wang, J. Yang, Cancelable fingerprint templates with delaunay triangle-based local structures, in Proceedings of Cyberspace Safety and Security (2013), pp. 81–91
C. Rathgeb, F. Breitinger, C. Busch, Alignment-free cancelable iris biometric templates based on adaptive bloom filters, in International Conference on Biometrics (ICB) (2013), pp. 1–8
C. Rathgeb, F. Breitinger, C Busch, H Baier, On application of bloom filters to iris biometrics. IET Biom. 3 (4), 207–218 (2014)
M. Ferrara, D. Maltoni, R. Cappelli, A two-factor protection scheme for MCC fingerprint templates, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2014), pp. 1–8
C. Rathgeb, C. Busch, Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters. Comput. Secur. 42, 1–12 (2014)
Z. Jin, M.H. Lim, A.B.J. Teoh, B.M. Goi, A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn. Lett. 42, 137–147 (2014)
M.V. Prasad, C.S. Kumar, Fingerprint template protection using multiline neighboring relation. Expert Syst. Appl. 41 (14), 6114–6122 (2014)
Z. Jin, B.M. Goi, A. Teoh, Y.H. Tay, A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Netw. 7 (11), 1691–1701 (2014)
M.V. Prasad, P. Swathi, C. Rao, B. Deekshatulu, Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. Int. J. Pattern Recognit. Artif. Intell. 28 (06), 1456,013 (2014)
C. Moujahdi, G. Bebis, S. Ghouzali, M. Rziza, Fingerprint shell: secure representation of fingerprint template. Pattern Recogn. Lett. 45, 189–196 (2014)
L. Leng, A.B.J. Teoh, M. Li, M.K. Khan, A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7 (11), 1860–1871 (2014)
Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst. Appl. 42 (21), 8198–8211
M. Sandhya, M.V. Prasad, k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection, in International Conference on Biometrics (ICB) (2015), pp. 386–393
M. Sandhya, M.V. Prasad, R.R. Chillarige, Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biom. 5 (2), 131–139 (2016)
M. Prasad, J. Anugu, C. Rao, Fingerprint template protection using multiple spiral curves, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics (2016), pp. 593–601
S. Wang, J. Hu, A blind system identification approach to cancelable fingerprint templates. Pattern Recogn. 54, 14–22 (2016)
R.M. Bolle, J.H. Connell, N.K. Ratha, Biometric perils and patches. Pattern Recogn. 35 (12), 2727–2738 (2002)
N. Ratha, J. Connell, R.M. Bolle, S. Chikkerur, Cancelable biometrics: a case study in fingerprints, in 18th International Conference on Pattern Recognition, vol. 4 (2006), pp. 370–373
J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in Advances in Cryptology – CRYPTO’97 (1997), pp. 410–424
R. Cappelli, M. Ferrara, D. Maltoni, Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32 (12), 2128–2141 (2010)
J. Bringer, C. Morel, C. Rathgeb, Security analysis of bloom filter-based iris biometric template protection, in 8th IAPR International Conference on Biometrics (ICB) (2015), pp. 527–534
Y.C. Feng, P.C. Yuen, A.K. Jain, A hybrid approach for generating secure and discriminating face template. IEEE Trans. Inf. Forensics Secur. 5 (1), 103–117 (2010)
A. Nagar, K. Nandakumar, A.K. Jain, A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn. Lett. 31 (8), 733–741 (2010)
H. Liu, D. Sun, K. Xiong, Z. Qiu, A hybrid approach to protect palmprint templates. Sci. World J. 2014, 686754 (2014)
Y. Chin, T. Ong, A. Teoh, K. Goh, Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Inf. Fusion 18, 161–174 (2014)
A. Kumar, A. Kumar, A cell-array based multibiometric cryptosystem. IEEE Access 4, 15–25 (2016)
M. Sandhya, M.V.N.K. Prasad, Cancelable fingerprint cryptosystem based on convolution coding, in Advances in Signal Processing and Intelligent Recognition Systems: Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS) (2016), pp. 145–157
Z. Jin, A.B.J. Teoh, B.M. Goi, Y.H. Tay, Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, T. Toft, Privacy-preserving face recognition, in Privacy Enhancing Technologies (Springer, Berlin, 2009), pp. 235–253
A.R. Sadeghi, T. Schneider, I. Wehrenberg, Efficient privacy-preserving face recognition, in Information, Security and Cryptology (Springer, Berlin, 2009), pp. 229–244
S.D. Rane, W. Sun, A. Vetro, Secure distortion computation among untrusting parties using homomorphic encryption, in 16th International Conference on Image Processing (ICIP) (2009), pp. 1485–1488
M. Barni, T. Bianchi, D. Catalano, M.D. Raimondo, R.D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti, A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates, in International Conference on Biometrics: Theory Applications and Systems (BTAS) (2010), pp. 1–7
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti et al., Privacy-preserving fingercode authentication, in Proceedings of the 12th ACM Workshop on Multimedia and Security (2010), pp. 231–240
M. Osadchy, B. Pinkas, A. Jarrous, B. Moskovich, SCiFi-a system for secure face identification, in Symposium on Security and Privacy (SP) (2010), pp. 239–254
R. Kulkarni, A. Namboodiri, Secure hamming distance based biometric authentication, in International Conference on Biometrics (ICB) (2013), pp. 1–6
C. Karabat, M.S. Kiraz, H. Erdogan, E. Savas, Thrive: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J. Adv. Signal Process. 2015 (1), 1–18 (2015)
M. Gomez-Barrero, J. Fierrez, J. Galbally, Variable-length template protection based on homomorphic encryption with application to signature biometrics, in 4th International Conference on Biometrics and Forensics (IWBF) (2016), pp. 1–6
A. Nagar, A. Jain, On the security of non-invertible fingerprint template transforms, in First International Workshop on Information Forensics and Security (WIFS) (2009), pp. 81–85
A. Nagar, K. Nandakumar, A.K. Jain, Biometric template transformation: a security analysis, in IS&T/SPIE Electronic Imaging, vol. 7541 (2010), p. 15
K. Takahashi, T. Matsuda, T. Murakami, G. Hanaoka, M. Nishigaki, A signature scheme with a fuzzy private key, in 13th International Conference on Applied Cryptography and Network Security (ACNS) (2015), pp. 105–126
K. Takahashi, T. Murakami, Optimal sequential fusion for multi-biometric cryptosystems. Inf. Fusion 32, 93–108 (2016)
C. Li, J. Hu, J. Pieprzyk, W. Susilo, A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans. Inf. Forensics Secur. 10 (6), 1193–1206 (2015)
A. Adler, R. Cappelli, Template security. Encyclopedia of Biometrics (Springer, New York, 2009), pp. 1322–1327
M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in 17th International Conference on Pattern Recognition (ICPR), vol. 3 (2004), pp. 922–925
J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.J. Igarza, C. Vivaracho, D. Escudero, Q.I. Moro, MCYT baseline corpus: a bimodal biometric database. IEE Proc. Vision Image Signal Process. 150 (6), 395–401 (2003)
M. Sandhya, M.V. Prasad, Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern. Anal. Appl. (2016). doi:10.1007/s10044-016-0584-5
M. Sandhya, M.V. Prasad, Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. Int. J. Pattern Recognit. Artif. Intell. (2016). doi:10.1142/S0218001417560043
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Sandhya, M., Prasad, M.V.N.K. (2017). Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, P.D., Beghdadi, A. (eds) Biometric Security and Privacy. Signal Processing for Security Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-47301-7_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-47301-7_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47300-0
Online ISBN: 978-3-319-47301-7
eBook Packages: EngineeringEngineering (R0)