Skip to main content

Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities

  • Chapter
  • First Online:

Part of the book series: Signal Processing for Security Technologies ((SPST))

Abstract

With the emergence of biometric authentication systems, template protection for biometrics captured attention in the recent years. The privacy concern arises due to storage and misuse of biometric data in various applications. This chapter systematically reviews the published literature on Biometric Template Protection (BTP) during 2005–2016 and covers the methods described in more than hundred articles. It aims to present the current status of BTP schemes by a methodical analysis and taxonomy of BTP approaches, modalities, the fusion of modalities (multi-modal), and hybrid methods. It also presents research implications and extraction outcomes of Systematic Literature Review conducted on BTP schemes. This research work helps researchers and practitioners to find relevant information on BTP methods thereby reducing time and complexity in searching the appropriate studies.

This is a preview of subscription content, log in via an institution.

References

  1. A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal Process. 2008, 579416 (2008)

    Google Scholar 

  2. A. Jain, A. Ross, S. Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004)

    Google Scholar 

  3. A Jain, A.A. Ross, K. Nandakumar, Introduction to Biometrics (Springer, Berlin, 2011)

    Google Scholar 

  4. D.C.L. Ngo, A.B.J. Teoh, J. Hu, Biometric Security (Cambridge Scholars Publishing, Newcastle upon Tyne, 2015)

    Google Scholar 

  5. W.J. Wong, A.B. Teoh, Y.H. Kho, M.D. Wong, Kernel PCA enabled bit-string representation for minutiae-based cancelable fingerprint template. Pattern Recogn. 51, 197–208 (2016)

    Google Scholar 

  6. K. Nandakumar, A. Jain, Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process. Mag. 32 (5), 88–100 (2015)

    Google Scholar 

  7. G.J. Tomko, C. Soutar, G.J. Schmidt, Fingerprint controlled public key cryptographic system. US Patent 5832091 A (1996). http://www.google.co.in/patents/US5832091

  8. C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B. Vijaya Kumar, Biometric encryption: enrollment and verification procedures, in Proceedings of SPIE: Optical Pattern Recognition (1998), pp. 24–35

    Google Scholar 

  9. A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Proceedings of the 6th ACM Conference on Computer and Communications Security (1999), pp. 28–36

    Google Scholar 

  10. N.K. Ratha, J.H. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 (3), 614–634 (2001)

    Google Scholar 

  11. A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of IEEE International Symposium on Information Theory (2002)

    Google Scholar 

  12. H. Feng, C.C. Wah, Private key generation from online handwritten signatures. Inf. Manage. Comput. Secur. 10 (4), 159–164 (2002)

    Google Scholar 

  13. A. Goh, D. Ngo, Computation of cryptographic keys from face biometrics, in Communications and Multimedia Security. Advanced Techniques for Network and Data Protection (Springer, Berlin, 2003), pp. 1–13

    Google Scholar 

  14. Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT (2004), pp. 523–540

    Google Scholar 

  15. Y. Sutcu, Q. Li, N. Memon, Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2 (3), 503–512 (2007)

    Google Scholar 

  16. T. Boult, Robust distance measures for face-recognition supporting revocable biometric tokens, in 7th International Conference on Automatic Face and Gesture Recognition (FGR) (2006), pp. 560–566

    Google Scholar 

  17. T. Boult, W. Scheirer, R. Woodworth, Revocable fingerprint biotokens: accuracy and security analysis, in Conference on Computer Vision and Pattern Recognition (CVPR) (2007), pp. 1–8

    Google Scholar 

  18. S. Ye, Y. Luo, J. Zhao, S.C.S. Cheung, Anonymous biometric access control. EURASIP J. Inf. Secur. 2009, 2:1–2:17 (2009)

    Google Scholar 

  19. U. Uludag, S. Pankanti, S. Prabhakar, A. Jain, Biometric cryptosystems: issues and challenges. Proc. IEEE 92 (6), 948–960 (2004)

    Google Scholar 

  20. C. Rathgeb, A. Uhl, A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011 (1), 3 (2011)

    Google Scholar 

  21. S. Rane, Y. Wang, S.C. Draper, P. Ishwar, Secure biometrics: concepts, authentication architectures, and challenges. IEEE Signal Process. Mag. 30 (5), 51–64 (2013)

    Google Scholar 

  22. V. Patel, N. Ratha, R. Chellappa, Cancelable biometrics: a review. IEEE Signal Process. Mag. 32 (5), 54–65 (2015)

    Google Scholar 

  23. I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, J. Yearwood, Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)

    Google Scholar 

  24. B. Kitchenham, S. Charters, Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint Report (2007)

    Google Scholar 

  25. B. Kitchenham, Procedures for performing systematic reviews, Joint Technical Report (Keele University Technical Report TR/SE-0401 and National ICT Australia Ltd. NICTA Technical Report 0400011T.1) (2004)

    Google Scholar 

  26. ISO/IEC JTC1 SC27 24745, Biometric information protection (2011)

    Google Scholar 

  27. K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, B. Preneel Criteria towards metrics for benchmarking template protection algorithms, in 5th IAPR International Conference on Biometrics (ICB) (2012), pp. 498–505

    Google Scholar 

  28. A. Cavoukian, A. Stoianov, in ed. by S. Li, A. Jain, Encyclopedia of Biometrics (Springer, New York, 2009), pp. 260–269

    Google Scholar 

  29. F. Hao, R. Anderson, J. Daugman, Combining cryptography with biometrics effectively. IEEE Trans. Comput. 55 (9), 1081–1088 (2006)

    Google Scholar 

  30. M. VanderVeen, T. Kevenaar, G.J. Schrijen, T.H. Akkermans, F. Zuo, Face biometrics with renewable templates, in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents, vol. 6072 (2006)

    Google Scholar 

  31. G. Zheng, W. Li, C. Zhan, Cryptographic key generation from biometric data using lattice mapping, in 18th International Conference on Pattern Recognition (ICPR), vol. 4 (2006), pp. 513–516

    Google Scholar 

  32. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Optimal iris fuzzy sketches, in First International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2007), pp. 1–6

    Google Scholar 

  33. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Theoretical and practical boundaries of binary secure sketches. IEEE Trans. Inf. Forensics Secur. 3 (4), 673–683 (2008)

    Google Scholar 

  34. A.B.J. Teoh, J. Kim, Secure biometric template protection in fuzzy commitment scheme. IEICE Electron. Expr. 4 (23), 724–730 (2007)

    Google Scholar 

  35. E. Maiorana, P. Campisi, A. Neri, User adaptive fuzzy commitment for signature template protection and renewability. J. Electron. Imaging 17 (1), 011011 (2008)

    Google Scholar 

  36. M. Ao, S. Li, Near infrared face based biometric key binding, in Advances in Biometrics (Springer, Berlin, 2009), pp. 376–385

    Google Scholar 

  37. C. Rathgeb, A. Uhl, Systematic construction of iris-based fuzzy commitment schemes, in 3rd International Conference on Biometrics (ICB) (2009), pp. 940–949

    Google Scholar 

  38. H. Lu, K. Martin, F. Bui, K.N. Plataniotis, D. Hatzinakos, Face recognition with biometric encryption for privacy-enhancing self-exclusion, in Proceedings of the 16th International Conference on Digital Signal Processing (2009), pp. 625–632

    Google Scholar 

  39. E. Maiorana, P. Campisi, Fuzzy commitment for function based signature template protection. IEEE Signal Process Lett. 17 (3), 249–252 (2010)

    Google Scholar 

  40. K. Nandakumar, A fingerprint cryptosystem based on minutiae phase spectrum, in IEEE International Workshop on Information Forensics and Security (WIFS) (2010), pp. 1–6

    Google Scholar 

  41. C. Rathgeb, A. Uhl, Adaptive fuzzy commitment scheme based on iris-code error analysis, in European Workshop on Visual Information Processing (EUVIP) (2010), pp. 41–44

    Google Scholar 

  42. C. Rathgeb, A. Uhl, P. Wild, Reliability-balanced feature level fusion for fuzzy commitment scheme, in International Joint Conference on Biometrics (IJCB), pp 1–7 (2011)

    Google Scholar 

  43. P. Li, X. Yang, H. Qiao, K. Cao, E. Liu, J. Tian, An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst. Appl. 39 (7), 6562–6574 (2012)

    Google Scholar 

  44. Y. Imamverdiyev, A.B.J. Teoh, J. Kim, Biometric cryptosystem based on discretized fingerprint texture descriptors. Expert Syst. Appl. 40 (5), 1888–1901 (2013)

    Google Scholar 

  45. L. Yuan, Multimodal cryptosystem based on fuzzy commitment, in 17th International Conference on Computational Science and Engineering (CSE) (2014), pp. 1545–1549

    Google Scholar 

  46. S. Billeb, C. Rathgeb, H. Reininger, K. Kasper, C. Busch, Biometric template protection for speaker recognition based on universal background models. IET Biom. 4 (2), 116–126 (2015)

    Google Scholar 

  47. N. Wang, Q. Li, A.A.A. El-Latif, J. Peng, X. Yan, X. Niu, A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9, 1–11 (2015)

    Google Scholar 

  48. T. Ignatenko, F. Willems, Information leakage in fuzzy commitment schemes. IEEE Trans. Inf. Forensics Secur. 5(2), 337–348 (2010)

    Google Scholar 

  49. C. Rathgeb, A. Uhl, Statistical attack against iris-biometric fuzzy commitment schemes, in Computer Vision and Pattern Recognition Workshops (CVPRW) (2011), pp. 23–30

    Google Scholar 

  50. C. Rathgeb, A. Uhl, Statistical attack against fuzzy commitment scheme. IET Biom. 1 (2), 94–104 (2012)

    Google Scholar 

  51. C. Rathgeb, A. Uhl Iris-biometric fuzzy commitment schemes under signal degradation, in International Conference on Image and Signal Processing (ICISP) (2012), pp. 217–225

    Google Scholar 

  52. X. Zhou, A. Kuijper, R. Veldhuis, C. Busch, Quantifying privacy and security of biometric fuzzy commitment, in International Joint Conference on Biometrics (IJCB) (2011), pp. 1–8

    Google Scholar 

  53. X. Zhou, A. Kuijper, C. Busch, Retrieving secrets from iris fuzzy commitment, in 5th IAPR International Conference on Biometrics (ICB) (2012), pp. 238–244

    Google Scholar 

  54. X. Zhou, C. Busch, Measuring privacy and security of iris fuzzy commitment, in IEEE International Carnahan Conference on Security Technology (ICCST) (2012), pp. 168–173

    Google Scholar 

  55. E. Kelkboom, J. Breebaart, I. Buhan, R. Veldhuis, Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources. IEEE Trans. Inf. Forensics Secur. 7 (4), 1225–1241 (2012)

    Google Scholar 

  56. M. Sandhya, M.V. Prasad, A bio-cryptosystem for fingerprints using delaunay neighbor structures (DNS) and fuzzy commitment scheme, in Advances in Signal Processing and Intelligent Recognition Systems (2016), pp. 159–171

    Google Scholar 

  57. U. Uludag, S. Pankanti, A.K. Jain, Fuzzy vault for fingerprints, in Proceedings of 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AVBPA 2005, Hilton Rye Town, NY, USA, 20–22 July 2005

    Google Scholar 

  58. U. Uludag, A. Jain, Securing fingerprint template: fuzzy vault with helper data, in Conference on Computer Vision and Pattern Recognition Workshop (CVPRW) (2006), pp. 163–163

    Google Scholar 

  59. K. Nandakumar, A. Jain, S. Pankanti, Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2 (4), 744–757 (2007)

    Google Scholar 

  60. K. Nandakumar, A. Nagar, A.K. Jain, Hardening fingerprint fuzzy vault using password, in International Conference on Biometrics (ICB) (2007), pp. 927–937

    Google Scholar 

  61. A. Nagar, K. Nandakumar, A.K. Jain, Securing fingerprint template: fuzzy vault with minutiae descriptors, in 19th International Conference on Pattern Recognition (ICPR) (2008), pp. 1–4

    Google Scholar 

  62. D. Nyang, K. Lee, Fuzzy face vault: how to implement fuzzy vault with weighted features, in 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI (2007), pp. 491–496

    Google Scholar 

  63. Y.J. Lee, K.R. Park, S.J. Lee, K. Bae, J. Kim, A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Trans. Syst. Man Cybern. B Cybern. 38 (5), 1302–1313 (2008)

    Google Scholar 

  64. E. Kelkboom, X. Zhou, J. Breebaart, R. Veldhuis, C. Busch, Multi-algorithm fusion with template protection, in 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2009), pp. 1–8

    Google Scholar 

  65. X. Zhou, A. Opel, J. Merkle, U. Korte, C. Busch, Enhanced template protection with passwords for fingerprint recognition, in Third International Workshop on Security and Communication Networks (IWSCN) (2011), pp. 67–74

    Google Scholar 

  66. A, Nagar, K. Nandakumar, A. Jain, Multibiometric cryptosystems based on feature-level fusion. IEEE Trans. Inf. Forensics Secur. 7 (1), 255–268 (2012)

    Google Scholar 

  67. L. Hong-wei, W. Yao, A new fuzzy fingerprint vault using multivariable linear function based on lorenz chaotic system, in International Conference on Computer Science and Automation Engineering (CSAE), vol. 1 (2012), pp. 531–534

    Google Scholar 

  68. A. Bhateja, S. Chaudhury, P. Saxena, A robust online signature based cryptosystem, in 14th International Conference on Frontiers in Handwriting Recognition (ICFHR) (2014), pp. 79–84

    Google Scholar 

  69. H. Liu, D. Sun, K. Xiong, Z. Qiu, Palmprint based multidimensional fuzzy vault scheme. Sci. World J. 2014, 8p. (2014)

    Google Scholar 

  70. C. Rathgeb, J. Wagner, B. Tams, C. Busch, Preventing the cross-matching attack in bloom filter-based cancelable biometrics, in International Workshop on Biometrics and Forensics (IWBF) (2015), pp. 1–6

    Google Scholar 

  71. T.H. Nguyen, Y. Wang, Y. Ha, R. Li, Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints. IET Biom. 4 (1), 29–39 (2015)

    Google Scholar 

  72. B. Tams, J. Merkle, C. Rathgeb, J. Wagner, U. Korte, C. Busch, Improved fuzzy vault scheme for alignment-free fingerprint features, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2015), pp. 1–12

    Google Scholar 

  73. D. Bansal, S. Sofat, M. Kaur, Fingerprint fuzzy vault using Hadamard transformation, in International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2015), pp. 1830–1834

    Google Scholar 

  74. C. Li, J. Hu, A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures. IEEE Trans. Inf. Forensics Secur. 11 (3), 543–555 (2016)

    Google Scholar 

  75. T.H. Nguyen, Y. Wang, Y. Ha, R. Li, Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biom. 2 (2), 48–55 (2013)

    Google Scholar 

  76. G. Eskander, R. Sabourin, E. Granger, Improving signature-based biometric cryptosystems using cascaded signature verification-fuzzy vault (SV-FV) approach, in 2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR) (2014), pp. 187–192

    Google Scholar 

  77. G. Eskander, R. Sabourin, E. Granger, Offline signature-based fuzzy vault: a review and new results, in IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM) (2014), pp. 45–52

    Google Scholar 

  78. B. Tams, P. Mihailescu, A. Munk, Security considerations in minutiae-based fuzzy vaults. IEEE Trans. Inf. Forensics Secur. 10 (5), 985–998 (2015)

    Google Scholar 

  79. M. Lafkih, P. Lacharme, C. Rosenberger, M. Mikram, S. Ghouzali, M. El Haziti, D. Aboutajdine, Vulnerabilities of fuzzy vault schemes using biometric data with traces, in International Wireless Communications and Mobile Computing Conference (IWCMC) (2015), pp. 822–827

    Google Scholar 

  80. L. Leng, A.B.J. Teoh, Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48 (7), 2290–2303 (2015)

    Google Scholar 

  81. S. Hoque, M. Fairhurst, G. Howells, Evaluating biometric encryption key generation using handwritten signatures, in Symposium on Bio-inspired Learning and Intelligent Systems for Security (BLISS’08) (2008), pp. 17–22

    Google Scholar 

  82. C. Rathgeb, A. Uhl, An iris-based interval-mapping scheme for biometric key generation, in Proceedings of 6th International Symposium on Image and Signal Processing and Analysis (2009), pp. 511–516

    Google Scholar 

  83. B. Carrara, C. Adams, You are the key: generating cryptographic keys from voice biometrics, in Eighth Annual International Conference on Privacy Security and Trust (PST) (2010), pp. 213–222

    Google Scholar 

  84. L. Wu, X. Liu, S. Yuan, P. Xiao, A novel key generation cryptosystem based on face features, in 10th International Conference on Signal Processing (ICSP) (2010), pp. 1675–1678

    Google Scholar 

  85. E. Liu, J. Liang, L. Pang, M. Xie, J. Tian, Minutiae and modified biocode fusion for fingerprint-based key generation. J. Netw. Comput. Appl. 33 (3), 221–235 (2010)

    Google Scholar 

  86. R. Ranjan, S. Singh, Improved and innovative key generation algorithms for biometric cryptosystems, in 3rd International Advance Computing Conference (IACC) (2013), pp. 943–946

    Google Scholar 

  87. W. Yang, J. Hu, S. Wang, M. Stojmenovic, An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures. Pattern Recogn. 47 (3), 1309–1320 (2014)

    Google Scholar 

  88. W. Yang, J. Hu, S. Wang, A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9 (7), 1179–1192 (2014)

    Google Scholar 

  89. A.B. Teoh, Y.W. Kuan, S. Lee, Cancellable biometrics and annotations on biohash. Pattern Recogn. 41 (6), 2034–2044 (2008)

    MATH  Google Scholar 

  90. T. Connie, A. Teoh, M. Goh, D. Ngo, Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93 (1), 1–5 (2005)

    MathSciNet  Google Scholar 

  91. A. Teoh, D. Ngo, Biophasor: token supplemented cancellable biometrics, in 9th International Conference on Control, Automation, Robotics and Vision (ICARCV) (2006), pp. 1–5

    Google Scholar 

  92. A. Teoh, A. Goh, D. Ngo, Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28 (12), 1892–1901 (2006)

    Google Scholar 

  93. C.S. Chin, A.T.B. Jin, D.N.C. Ling, High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102 (2), 169–177 (2006)

    Google Scholar 

  94. W.K. Yip, A.B.J. Teoh, D.C.L. Ngo, Replaceable and securely hashed keys from online signatures. IEICE Electron. Expr. 3 (18), 410–416 (2006)

    Google Scholar 

  95. M. Jeong, C. Lee, J. Kim, J.Y. Choi, K.A. Toh, J. Kim, Changeable biometrics for appearance based face recognition, in 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference (2006), pp. 1–5

    Google Scholar 

  96. A. Teoh, C.T. Yuang, Cancelable biometrics realization with multispace random projections. IEEE Trans. Syst. Man Cybern. 37 (5)1096–1106 (2007)

    Google Scholar 

  97. Y.W. Kuan, A.B. Teoh, D.C. Ngo, Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2N discretization. EURASIP J. Appl. Signal Process. 2007 (1), 32 (2007)

    Google Scholar 

  98. Y. Kim, K.A. Toh, A method to enhance face biometric security, in First International Conference on Biometrics: Theory, Applications, and Systems (BTAS) (2007), pp. 1–6

    Google Scholar 

  99. Y. Wang, K. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in Biometrics Symposium (2007), pp. 1–6

    Google Scholar 

  100. A.B. Teoh, Y.W. Kuan, S Lee, Cancellable biometrics and annotations on biohash. Pattern Recogn. 41 (6), 2034–2044 (2008)

    MATH  Google Scholar 

  101. J. Zuo, N. Ratha, J. Connell, Cancelable iris biometric, in 19th International Conference on Pattern Recognition (ICPR) (2008), pp. 1–4

    Google Scholar 

  102. S. Hirata, K. Takahashi, Cancelable biometrics with perfect secrecy for correlation-based matching, in Advances in Biometrics (Springer, Berlin, 2009), pp. 868–878

    Google Scholar 

  103. A.B.J. Teoh, L.Y. Chong, Secure speech template protection in speaker verification system. Speech Comm. 52 (2), 150–163 (2010)

    Google Scholar 

  104. O. Osama, N. Tsumura, T. Nakaguchi, Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iris codes. IEICE Trans. Inf. Syst. 93 (7), 1878–1888 (2010)

    Google Scholar 

  105. O. Ouda, N. Tsumura, T. Nakaguchi, Tokenless cancelable biometrics scheme for protecting iris codes, in 20th International Conference on Pattern Recognition (ICPR) (2010), pp. 882–885

    Google Scholar 

  106. J. Pillai, V. Patel, R. Chellappa, N. Ratha, Sectored random projections for cancelable iris biometrics, in International Conference on Acoustics Speech and Signal Processing (ICASSP) (2010), pp. 1838–1841

    Google Scholar 

  107. L. Leng, J. Zhang, Palmhash code vs. palmphasor code. Neurocomputing 108, 1–12 (2013)

    Google Scholar 

  108. L. Leng, A.B.J. Teoh, M. Li, M.K. Khan, Analysis of correlation of 2d palmhash code and orientation range suitable for transposition. Neurocomputing 131, 377–387 (2014)

    Google Scholar 

  109. A. Kong, K.H. Cheung, D. Zhang, M. Kamel, J. You, An analysis of biohashing and its variants. Pattern Recogn. 39 (7), 1359–1368 (2006)

    MATH  Google Scholar 

  110. O. Osama, N. Tsumura, T. Nakaguchi, On the security of bioencoding based cancelable biometrics. IEICE Trans. Inf. Syst. 94 (9), 1768–1777 (2011)

    Google Scholar 

  111. N.K. Ratha, S. Chikkerur, J.H. Connell, R.M. Bolle, Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29 (4), 561–572 (2007)

    Google Scholar 

  112. S. Chikkerur, N.K. Ratha, J.H. Connell, R.M. Bolle, Generating registration-free cancelable fingerprint templates, in 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2008), pp. 1–6

    Google Scholar 

  113. E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, A. Neri, Template protection for hmm-based on-line signature authentication, in Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW’08) (2008), pp. 1–6

    Google Scholar 

  114. E. Maiorana, P. Campisi, J. Ortega-Garcia, A. Neri, Cancelable biometrics for hmm-based signature recognition, in 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS) (2008), pp. 1–6

    Google Scholar 

  115. W. Xu, Q. He, Y. Li, T. Li, Cancelable voiceprint templates based on knowledge signatures, in 2008 International Symposium on Electronic Commerce and Security (2008), pp. 412–415

    Google Scholar 

  116. J. Hämmerle-Uhl, E. Pschernig, A. Uhl, Cancelable iris biometrics using block re-mapping and image warping, in Information Security (Springer, Berlin, 2009), pp. 135–142

    Google Scholar 

  117. H. Yang, X. Jiang, A. Kot, Generating secure cancelable fingerprint templates using local and global features, in 2nd International Conference on Computer Science and Information Technology ICCSIT (2009), pp. 645–649

    Google Scholar 

  118. C. Rathgeb, A. Uhl, Secure iris recognition based on local intensity variations, in Image Analysis and Recognition (Springer, Berlin, 2010), pp. 266–275

    Google Scholar 

  119. P. Farberbock, J. Hämmerle-Uhl, D. Kaaser, E. Pschernig, A. Uhl, Transforming rectangular and polar iris images to enable cancelable biometrics, in Image Analysis and Recognition (Springer, Berlin, 2010), pp. 276–286

    Google Scholar 

  120. E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, A. Neri, Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 40 (3), 525–538 (2010)

    Google Scholar 

  121. C. Lee, J. Kim, Cancelable fingerprint templates using minutiae-based bit-strings. J. Netw. Comput. Appl. 33 (3), 236–246 (2010)

    Google Scholar 

  122. L. Nanni, E. Maiorana, A. Lumini, P. Campisi, Combining local, regional and global matchers for a template protected on-line signature verification system. Expert Syst. Appl. 37 (5), 3676–3684 (2010)

    Google Scholar 

  123. J. Zhe, A. Jin, Fingerprint template protection with minutia vicinity decomposition, in International Joint Conference on Biometrics (IJCB) (2011), pp. 1–7

    Google Scholar 

  124. J. Pillai, V. Patel, R. Chellappa, N. Ratha, Secure and robust iris recognition using random projections and sparse representations. IEEE Trans. Pattern Anal. Mach. Intell. 33 (9), 1877–1893 (2011)

    Google Scholar 

  125. T. Ahmad, J. Hu, S. Wang, Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn. 44 (10–11), 2555–2564 (2011)

    Google Scholar 

  126. K. Takahashi, S. Hirata, Cancelable biometrics with provable security and its application to fingerprint verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94 (1), 233–244 (2011)

    Google Scholar 

  127. S. Wang, J. Hu, Alignment-free cancelable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach. Pattern Recogn. 45 (12), 4129–4137 (2012)

    Google Scholar 

  128. P. Das, K. Karthik, B.C. Garai, A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs. Pattern Recogn. 45 (9), 3373–3388 (2012)

    Google Scholar 

  129. C. Moujahdi, S. Ghouzali, M. Mikram, M. Rziza, G. Bebis, Spiral cube for biometric template protection, in Image and Signal Processing (Springer, Berlin, 2012), pp. 235–244

    Google Scholar 

  130. M. Ferrara, D. Maltoni, R. Cappelli, Noninvertible minutia cylinder-code representation. IEEE Trans. Inf. Forensics Secur. 7 (6), 1727–1737 (2012)

    Google Scholar 

  131. W.J. Wong, M.L.D. Wong, Y.H. Kho, Multi-line code: a low complexity revocable fingerprint template for cancelable biometrics. J. Cent. South Univ. 20 (5), 1292–1297 (2013)

    Google Scholar 

  132. W.J. Wong, A.B. Teoh, M.D. Wong, Y.H. Kho, Enhanced multi-line code for minutiae-based fingerprint template protection. Pattern Recogn. Lett. 34 (11), 1221–1229 (2013)

    Google Scholar 

  133. W. Yang, J. Hu, S. Wang, J. Yang, Cancelable fingerprint templates with delaunay triangle-based local structures, in Proceedings of Cyberspace Safety and Security (2013), pp. 81–91

    Google Scholar 

  134. C. Rathgeb, F. Breitinger, C. Busch, Alignment-free cancelable iris biometric templates based on adaptive bloom filters, in International Conference on Biometrics (ICB) (2013), pp. 1–8

    Google Scholar 

  135. C. Rathgeb, F. Breitinger, C Busch, H Baier, On application of bloom filters to iris biometrics. IET Biom. 3 (4), 207–218 (2014)

    Google Scholar 

  136. M. Ferrara, D. Maltoni, R. Cappelli, A two-factor protection scheme for MCC fingerprint templates, in International Conference of the Biometrics Special Interest Group (BIOSIG) (2014), pp. 1–8

    Google Scholar 

  137. C. Rathgeb, C. Busch, Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters. Comput. Secur. 42, 1–12 (2014)

    Google Scholar 

  138. Z. Jin, M.H. Lim, A.B.J. Teoh, B.M. Goi, A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template. Pattern Recogn. Lett. 42, 137–147 (2014)

    Google Scholar 

  139. M.V. Prasad, C.S. Kumar, Fingerprint template protection using multiline neighboring relation. Expert Syst. Appl. 41 (14), 6114–6122 (2014)

    Google Scholar 

  140. Z. Jin, B.M. Goi, A. Teoh, Y.H. Tay, A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Netw. 7 (11), 1691–1701 (2014)

    Google Scholar 

  141. M.V. Prasad, P. Swathi, C. Rao, B. Deekshatulu, Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates. Int. J. Pattern Recognit. Artif. Intell. 28 (06), 1456,013 (2014)

    Google Scholar 

  142. C. Moujahdi, G. Bebis, S. Ghouzali, M. Rziza, Fingerprint shell: secure representation of fingerprint template. Pattern Recogn. Lett. 45, 189–196 (2014)

    Google Scholar 

  143. L. Leng, A.B.J. Teoh, M. Li, M.K. Khan, A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7 (11), 1860–1871 (2014)

    Google Scholar 

  144. Murillo-Escobar M, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez R (2015) A robust embedded biometric authentication system based on fingerprint and chaotic encryption. Expert Syst. Appl. 42 (21), 8198–8211

    Google Scholar 

  145. M. Sandhya, M.V. Prasad, k-nearest neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection, in International Conference on Biometrics (ICB) (2015), pp. 386–393

    Google Scholar 

  146. M. Sandhya, M.V. Prasad, R.R. Chillarige, Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biom. 5 (2), 131–139 (2016)

    Google Scholar 

  147. M. Prasad, J. Anugu, C. Rao, Fingerprint template protection using multiple spiral curves, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics (2016), pp. 593–601

    Google Scholar 

  148. S. Wang, J. Hu, A blind system identification approach to cancelable fingerprint templates. Pattern Recogn. 54, 14–22 (2016)

    Google Scholar 

  149. R.M. Bolle, J.H. Connell, N.K. Ratha, Biometric perils and patches. Pattern Recogn. 35 (12), 2727–2738 (2002)

    MATH  Google Scholar 

  150. N. Ratha, J. Connell, R.M. Bolle, S. Chikkerur, Cancelable biometrics: a case study in fingerprints, in 18th International Conference on Pattern Recognition, vol. 4 (2006), pp. 370–373

    Google Scholar 

  151. J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, in Advances in Cryptology – CRYPTO’97 (1997), pp. 410–424

    Google Scholar 

  152. R. Cappelli, M. Ferrara, D. Maltoni, Minutia cylinder-code: a new representation and matching technique for fingerprint recognition. IEEE Trans. Pattern Anal. Mach. Intell. 32 (12), 2128–2141 (2010)

    Google Scholar 

  153. J. Bringer, C. Morel, C. Rathgeb, Security analysis of bloom filter-based iris biometric template protection, in 8th IAPR International Conference on Biometrics (ICB) (2015), pp. 527–534

    Google Scholar 

  154. Y.C. Feng, P.C. Yuen, A.K. Jain, A hybrid approach for generating secure and discriminating face template. IEEE Trans. Inf. Forensics Secur. 5 (1), 103–117 (2010)

    Google Scholar 

  155. A. Nagar, K. Nandakumar, A.K. Jain, A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recogn. Lett. 31 (8), 733–741 (2010)

    Google Scholar 

  156. H. Liu, D. Sun, K. Xiong, Z. Qiu, A hybrid approach to protect palmprint templates. Sci. World J. 2014, 686754 (2014)

    Google Scholar 

  157. Y. Chin, T. Ong, A. Teoh, K. Goh, Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion. Inf. Fusion 18, 161–174 (2014)

    Google Scholar 

  158. A. Kumar, A. Kumar, A cell-array based multibiometric cryptosystem. IEEE Access 4, 15–25 (2016)

    Google Scholar 

  159. M. Sandhya, M.V.N.K. Prasad, Cancelable fingerprint cryptosystem based on convolution coding, in Advances in Signal Processing and Intelligent Recognition Systems: Proceedings of Second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS) (2016), pp. 145–157

    Google Scholar 

  160. Z. Jin, A.B.J. Teoh, B.M. Goi, Y.H. Tay, Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)

    Google Scholar 

  161. Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, T. Toft, Privacy-preserving face recognition, in Privacy Enhancing Technologies (Springer, Berlin, 2009), pp. 235–253

    Google Scholar 

  162. A.R. Sadeghi, T. Schneider, I. Wehrenberg, Efficient privacy-preserving face recognition, in Information, Security and Cryptology (Springer, Berlin, 2009), pp. 229–244

    Google Scholar 

  163. S.D. Rane, W. Sun, A. Vetro, Secure distortion computation among untrusting parties using homomorphic encryption, in 16th International Conference on Image Processing (ICIP) (2009), pp. 1485–1488

    Google Scholar 

  164. M. Barni, T. Bianchi, D. Catalano, M.D. Raimondo, R.D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, F. Scotti, A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates, in International Conference on Biometrics: Theory Applications and Systems (BTAS) (2010), pp. 1–7

    Google Scholar 

  165. M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Donida Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti et al., Privacy-preserving fingercode authentication, in Proceedings of the 12th ACM Workshop on Multimedia and Security (2010), pp. 231–240

    Google Scholar 

  166. M. Osadchy, B. Pinkas, A. Jarrous, B. Moskovich, SCiFi-a system for secure face identification, in Symposium on Security and Privacy (SP) (2010), pp. 239–254

    Google Scholar 

  167. R. Kulkarni, A. Namboodiri, Secure hamming distance based biometric authentication, in International Conference on Biometrics (ICB) (2013), pp. 1–6

    Google Scholar 

  168. C. Karabat, M.S. Kiraz, H. Erdogan, E. Savas, Thrive: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J. Adv. Signal Process. 2015 (1), 1–18 (2015)

    Google Scholar 

  169. M. Gomez-Barrero, J. Fierrez, J. Galbally, Variable-length template protection based on homomorphic encryption with application to signature biometrics, in 4th International Conference on Biometrics and Forensics (IWBF) (2016), pp. 1–6

    Google Scholar 

  170. A. Nagar, A. Jain, On the security of non-invertible fingerprint template transforms, in First International Workshop on Information Forensics and Security (WIFS) (2009), pp. 81–85

    Google Scholar 

  171. A. Nagar, K. Nandakumar, A.K. Jain, Biometric template transformation: a security analysis, in IS&T/SPIE Electronic Imaging, vol. 7541 (2010), p. 15

    Google Scholar 

  172. K. Takahashi, T. Matsuda, T. Murakami, G. Hanaoka, M. Nishigaki, A signature scheme with a fuzzy private key, in 13th International Conference on Applied Cryptography and Network Security (ACNS) (2015), pp. 105–126

    Google Scholar 

  173. K. Takahashi, T. Murakami, Optimal sequential fusion for multi-biometric cryptosystems. Inf. Fusion 32, 93–108 (2016)

    Google Scholar 

  174. C. Li, J. Hu, J. Pieprzyk, W. Susilo, A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans. Inf. Forensics Secur. 10 (6), 1193–1206 (2015)

    Google Scholar 

  175. A. Adler, R. Cappelli, Template security. Encyclopedia of Biometrics (Springer, New York, 2009), pp. 1322–1327

    Google Scholar 

  176. M. Savvides, B. Kumar, P. Khosla, Cancelable biometric filters for face recognition, in 17th International Conference on Pattern Recognition (ICPR), vol. 3 (2004), pp. 922–925

    Google Scholar 

  177. J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.J. Igarza, C. Vivaracho, D. Escudero, Q.I. Moro, MCYT baseline corpus: a bimodal biometric database. IEE Proc. Vision Image Signal Process. 150 (6), 395–401 (2003)

    Google Scholar 

  178. M. Sandhya, M.V. Prasad, Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern. Anal. Appl. (2016). doi:10.1007/s10044-016-0584-5

    Book  Google Scholar 

  179. M. Sandhya, M.V. Prasad, Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. Int. J. Pattern Recognit. Artif. Intell. (2016). doi:10.1142/S0218001417560043

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mulagala Sandhya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Sandhya, M., Prasad, M.V.N.K. (2017). Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities. In: Jiang, R., Al-maadeed, S., Bouridane, A., Crookes, P.D., Beghdadi, A. (eds) Biometric Security and Privacy. Signal Processing for Security Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-47301-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47301-7_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47300-0

  • Online ISBN: 978-3-319-47301-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics