Skip to main content
Log in

Biometric template protection using cancelable biometrics and visual cryptography techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual cryptography are two recent technologies introduced to address the concerns regarding privacy of biometric data, and to improve public confidence and acceptance of biometric systems. Cancelable biometrics is an important technique that allows generation of revocable biometric templates. As the number of biometric instances are limited and once compromised they are lost forever. Cancelable biometrics allows templates to be cancelled and revoked like passwords innumerable times. Recently, various approaches that utilize visual cryptography to secure the stored template and impart privacy to the central databases have been introduced. This work attempts to summarize the existing approaches in literature making use of these two technologies to protect biometric templates.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Information Security and Privacy. Springer, pp 242–252

  2. Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161

    Article  MathSciNet  MATH  Google Scholar 

  3. Belguechi R, Cherrier E, El Abed M, Rosenberger C (2011) Evaluation of cancelable biometric systems: Application to finger-knuckle-prints. In: 2011 International Conference on Hand-Based Biometrics (ICHB). IEEE, pp 1–6

  4. Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 196– 201

  5. Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recog 35(12):2727–2738

    Article  MATH  Google Scholar 

  6. Boult T Vision and Security Technology Lab. http://www.vast.uccs.edu

  7. Boult TE, Scheirer WJ, Woodworth R (2007) Revocable fingerprint biotokens: Accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–8

  8. Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2007) Optimal iris fuzzy sketches. In: First IEEE international conference on biometrics: theory, applications, and systems, 2007. BTAS 2007. IEEE, pp 1–6

  9. Bringer J, Chabanne H, Kindarji B (2008) The best of both worlds: Applying secure sketches to cancelable biometrics. Sci Comput Program 74(1):43–51

    Article  MathSciNet  MATH  Google Scholar 

  10. Bringer J, Chabanne H, Kindarji B (2009) Anonymous identification with cancelable biometrics. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009. IEEE, pp 494–499

  11. Chen X, Bai X, Tao X, Pan X (2013) Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering. Springer, pp 605–612

  12. Cheung KH, Kong A, Zhang D, Kamel M, You JT, Lam HW (2005a) An analysis on accuracy of cancelable biometrics based on biohashing. In: Knowledge-Based Intelligent Information and Engineering Systems. Springer, pp 1168–1172

  13. Cheung KH, Kong AWK, You J, Zhang D (2005b) An analysis on invertibility of cancelable biometrics based on biohashing. In: CISST, vol 2005, pp 40–45

  14. Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcard based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM, pp 45–52

  15. Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5

    Article  MathSciNet  Google Scholar 

  16. de Paula Canuto AM, Fairhurst MC, Pintro F (2013) Ensemble systems and cancellable transformations for multibiometric-based identification. IET Biom 3 (1):29–40

    Article  Google Scholar 

  17. Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) Biohash code generation from electrocardiogram features. In: 2013 IEEE 3rd International Advance Computing Conference (IACC). IEEE, pp 732–735

  18. Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. International Journal of Emerging Technology and Advanced Engineering 2(12):2250–2459

    Google Scholar 

  19. Fan TY, Chieu BC, Chao HC (2012) Robust copyright-protection scheme based on visual secret sharing and bose–chaudhuri–hocquenghem code techniques. Journal of Electronic Imaging 21(4):043,018–043,018

    Article  Google Scholar 

  20. Farooq F, Bolle RM, Jea TY, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–7

  21. Feng H, Choong Wah C (2002) Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(4):159–164

    Google Scholar 

  22. Feng Q, Xiao Y, Su F, An CAI (2008) Cancelable fingerprint fuzzy vault scheme. J Comput Appl 7 :060

    MATH  Google Scholar 

  23. Feng Y, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. In: SPIE Defense and Security Symposium, International Society for Optics and Photonics, pp 694,408–694,408

  24. Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5(1):103–117

    Article  Google Scholar 

  25. Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw. Secur 11(2):61–69

    Google Scholar 

  26. Genkey. http://www.priv-id.com

  27. Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics. In: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer, pp 1– 13

  28. Hämmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Information Security. Springer, pp 135–142

  29. Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081–1088. IEEE

    Article  Google Scholar 

  30. Hirano T, Hattori M, Ito T, Matsuda N, Mori T (2012) Homomorphic encryption based cancelable biometrics secure against replay and its related attack. In: 2012 International Symposium on Information Theory and its Applications (ISITA), IEEE, pp 421–425

  31. Hirata S, Takahashi K (2009) Cancelable biometrics with perfect secrecy for correlation-based matching. Springer, pp 868–878

  32. Hu CM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45

  33. Ilavarsan K, Malvika R (2012) A multiple level visual cryptography scheme for biometric privacy without pixel expansion. International Journal of Communications and Engineering 4(4):59–63

    Google Scholar 

  34. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE 14:4–20

    Google Scholar 

  35. Jain AK, Nandakumar K, Nagar A, et al. (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008

  36. Jeong M, Lee C, Kim J, Choi JY, Toh KA, Kim J (2006) Changeable biometrics for appearance based face recognition. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, pp 1–5

  37. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28–36

  38. Kanak A, Sogukpınar I (2009) Classification based revocable biometric identity code generation. In: Biometric ID Management and Multimodal Communication. Springer, pp 276–284

  39. Kim Y, Toh KA (2007) A method to enhance face biometric security. In: Biometrics: 2007 First IEEE International Conference on Theory, Applications, and Systems, BTAS 2007. IEEE, pp 1–6

  40. Kuan YW, Teoh AB, Ngo DC (2007) Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2 n discretization. EURASIP Journal on Applied Signal Processing 2007(1):32–32

    MathSciNet  MATH  Google Scholar 

  41. Kümmel K, Vielhauer C (2010) Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting. In: Proceedings of the 12th ACM workshop on Multimedia and security. ACM, pp 67– 72

  42. Lacharme P, Cherrier E, Rosenberger C, et al. (2013) Preimage attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT)

  43. Lalithamani N, Soman S (2009) An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom’09. IEEE, pp 47–52

  44. Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246

    Article  Google Scholar 

  45. Lee Y, Lee Y, Chung Y, Moon K (2007) One-time templates for face authentication. In: 2007 International Conference on Convergence Information Technology. IEEE, pp 1818–1823

  46. Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: Computational Intelligence in Biometrics: 2009 IEEE Workshop on Theory, Algorithms, and Applications, CIB 2009. IEEE, pp 92–97

  47. Leng L, Zhang J, Khan M, Bi X, Ji M (2010) Cancelable palmcode generated from randomized gabor filters for palmprint protection. In: 2010 25th International Conference of Image and Vision Computing New Zealand (IVCNZ). IEEE, pp 1–6

  48. Li C, Hu J (2013) Attacks via record multiplicity on cancelable biometrics templates. Concurrency and Computation: Practice and Experience

  49. Li H, Wang L (2012) Chaos-based cancelable palmprint authentication system. Procedia Engineering 29(0):1239–1245

    Article  Google Scholar 

  50. Li Q, Chang EC (2006) Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th workshop on Multimedia and security. ACM, pp 56–61

  51. Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recognit 40(3):1057–1065

    Article  MATH  Google Scholar 

  52. Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40(3):525–538

    Article  Google Scholar 

  53. Maiorana E, Campisi P, Neri A (2011a) Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system. In: 2011 IEEE International Systems Conference (SysCon). IEEE, pp 495–500

  54. Maiorana E, Campisi P, Neri A (2011b) Cancellable biometrics for on-line signature recognition. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, p 290

  55. Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-Garcia J, Siguenza J (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings 2006 40th Annual IEEE International Carnahan Conferences Security Technology. IEEE, pp 151–159

  56. Monoth T, Anto PB (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Computer Science 2:143–148

    Article  Google Scholar 

  57. Muhammed RP (2011) A secured approach to visual cryptographic biometric template. International Journal on Information Technology 1(2)

  58. Nagar A, Jain AK (2009) On the security of non-invertible fingerprint template transforms. IEEE, pp 81–85

  59. Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images

  60. Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4):744–757

    Article  Google Scholar 

  61. Nanni L, Lumini A (2006) Empirical tests on biohashing. Neurocomputing 69(16):2390–2395

    Article  Google Scholar 

  62. Nanni L, Lumini A (2010) Cancellable biometrics: problems and solutions for improving accuracy. Biometrics: Methods, Applications and Analyses

  63. Naor M, Shamir A (1995) Visual cryptography. In: Advances in CryptologyEUROCRYPT’94. Springer, pp 1–12

  64. Othman A, Ross A (2011) Mixing fingerprints for generating virtual identities. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6

  65. Pabitha M, Latha L (2013) Efficient approach for retinal biometric template security and person authentication using noninvertible constructions. Int J Comput Appl 69(4)

  66. Patel VM, Chellappa R, Tistarelli M (2010) Sparse representations and random projections for robust and cancelable biometrics. In: 2010 11th International Conference on Control Automation Robotics & Vision (ICARCV). IEEE, pp 1–6

  67. Paul PP, Gavrilova M (2012a) Multimodal biometric approach for cancelable face template generation. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 84,070H–84,070H

  68. Paul PP, Gavrilova ML (2012b) A novel cross folding algorithm for multimodal cancelable biometrics. International Journal of Software Science and Computational Intelligence (IJSSCI) 4(3):20–37

    Article  Google Scholar 

  69. Paul PP, Gavrilova M, Klimenko S (2013) Situation awareness of cancelable biometric system. Vis Comput:1–9

  70. Persay. http://www.persay.com

  71. Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology, ISCSCT’08, vol 2. IEEE, pp 572–575

  72. Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 2006 18th International Conference on Pattern Recognition, ICPR 2006, vol 4. IEEE, pp 370– 373

  73. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

  74. Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561–572

    Article  Google Scholar 

  75. Rathgeb C, Busch C (2014) Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. Computers & Security

  76. Revenkar P, Anjum A, Gandhare W (2010) Secure iris authentication using visual cryptography. arXiv preprint arXiv: http://arxiv.org/abs/10041748

  77. Roberts C (2007) Biometric attack vectors and defences. Computers & Security 26(1):14–25

    Article  Google Scholar 

  78. Ross A, Othman A (2011a) Mixing fingerprints for template security and privacy. In: Proceedings of the 19th Eur. Sign. Proc. Conf.(EUSIPCO)

  79. Ross A, Othman A (2011b) Visual cryptography for biometric privacy. IEEE transactions on information forensics and security 6(1):70–81

    Article  Google Scholar 

  80. Ross A, Othman AA (2010) Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 76,670B–76,670B

  81. Rust C (2009) Turbine: Trusted revocable biometric identities. Biometric Technology Today 17(2):8–10

    Article  Google Scholar 

  82. Savvides M, Kumar BV, Khosla PK (2004) Cancelable biometric filters for face recognition. In: 2004 Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol 3. IEEE, pp 922–925

  83. Schneier B (1999) Biometrics: uses and abuses. Commun ACM 42(8):58

    Article  Google Scholar 

  84. SECURICS INC Colorado springs, co. http://www.securics.com

  85. Shin SW, Lee MK, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI j 31(5)

  86. Siew Chin C, Beng Jin AT, Chek Ling DN (2006) High security iris verification system based on random secret integration. Comp Vision Image Underst 102(2):169–177

    Article  Google Scholar 

  87. Simoens K, Yang B, Zhou X, Beato F, Busch C, Newton EM, Preneel B (2012) Criteria towards metrics for benchmarking template protection algorithms. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 498–505

  88. Sinduja R, Sathiya R, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp 650–655

  89. Sohn H, Ro YM, Plataniotis KN (2009) Biometric authentication using augmented face and random projection. In: 2009 Biometrics: IEEE 3rd International Conference on Theory, Applications, and Systems BTAS’09. IEEE, pp 1–6

  90. Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV (1998) Biometric encryption using image processing. In: Photonics West’98 Electronic Imaging, International Society for Optics and Photonics, pp 178–188

  91. Soutar C et al (2002) Biometric system security. White Paper, Bioscrypt, http://www.bioscrypt.com

  92. Suryadevara S, Naaz R, Kapoor S, Sharma A, et al. (2011) Visual cryptography improvises the security of tongue as a biometric in banking system. In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, pp 412–415

  93. Sutcu Y, Sencar HT, Memon N (2005) A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th workshop on Multimedia and security. ACM, pp 111– 116

  94. Sutcu Y, Li Q, Memon N (2007) Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security 2(3):503–512

    Article  Google Scholar 

  95. Takahashi K, Hirata S (2011) Parameter management schemes for cancelable biometrics. In: 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM). IEEE, pp 145–151

  96. Takur V, Jaiswal R, Sonawane S, Nalavade R, et al. (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32–36

  97. Teoh ABJ, Ngo DCL (2006) Biophasor: Token supplemented cancellable biometrics. In: 2006 9th International Conference on Control, Automation, Robotics and Vision, ICARCV’06. IEEE, pp 1–5

  98. Teoh A, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37(5):1096–1106

    Article  Google Scholar 

  99. Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recog 41(6):2034–2044

    Article  MATH  Google Scholar 

  100. Teoh ABJ, Ngo DCL, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog 37(11):2245–2255

  101. Teoh A, Jin B, Connie T, Ngo D, Ling C (2006) Remarks on biohash and its mathematical foundation. Inf Process Lett 100(4):145–150

    Article  MathSciNet  MATH  Google Scholar 

  102. Tulyakov S, Farooq F, Govindaraju V (2005) Symmetric hash functions for fingerprint minutiae. In: Pattern Recognition and Image Analysis. Springer, pp 30–38

  103. Tuyls P, Hollmann HD, Van Lint JH, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186

    Article  MathSciNet  MATH  Google Scholar 

  104. Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960

    Article  Google Scholar 

  105. Vielhauer C, Steinmetz R, Mayerhöfer A (2002) Biometric hash based on statistical features of online signatures. In: Proceedings of the 16th international conference on pattern recognition, 2002, vol 1. IEEE, pp 123–126

  106. VeinID Hitachi. http://www.hitachi.eu

  107. Wang Y, Plataniotis K (2007) Face based biometric authentication with changeable and privacy preservable templates. In: 2007 Biometrics Symposium. IEEE, pp 1–6

  108. Wu X, Qi N, Wang K, Zhang D (2008) An iris cryptosystem for information security. In: IIHMSP’08 international conference on intelligent information hiding and multimedia signal processing, 2008. IEEE, pp 1533–1536

  109. Xu D, Wang X (2010) A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence. In: 2010 International Conference on Mechatronics and Automation (ICMA). IEEE, pp 329–332

  110. Xu W, Cheng M (2008) Cancelable voiceprint template based on chaff-points-mixture method. In: Proceedings of the 2008 International Conference on Computational Intelligence and Security-Volume 02, IEEE Computer Society, pp 263–266

  111. Xu W, He Q, Li Y, Li T (2008) Cancelable voiceprint templates based on knowledge signatures. In: 2008 International Symposium on Electronic Commerce and Security. IEEE, pp 412–415

  112. Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81–91

  113. Zhu HH, He QH, Li YX (2012) A two -step hybrid approach for voiceprint-biometric template protection. In: 2012 International Conference on Machine Learning and Cybernetics (ICMLC), vol 2, pp 560–565. 10.1109/ICMLC.2012.6358984

  114. Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008. IEEE, pp 1–4

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pritee Khanna.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, H., Khanna, P. Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75, 16333–16361 (2016). https://doi.org/10.1007/s11042-015-2933-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2933-6

Keywords

Navigation