Abstract
Wide spread use of biometric based authentication implies the need to secure biometric reference data. Various template protection schemes have been introduced to prevent biometric forgery and identity thefts. Cancelable biometrics and visual cryptography are two recent technologies introduced to address the concerns regarding privacy of biometric data, and to improve public confidence and acceptance of biometric systems. Cancelable biometrics is an important technique that allows generation of revocable biometric templates. As the number of biometric instances are limited and once compromised they are lost forever. Cancelable biometrics allows templates to be cancelled and revoked like passwords innumerable times. Recently, various approaches that utilize visual cryptography to secure the stored template and impart privacy to the central databases have been introduced. This work attempts to summarize the existing approaches in literature making use of these two technologies to protect biometric templates.
Similar content being viewed by others
References
Ang R, Safavi-Naini R, McAven L (2005) Cancelable key-based fingerprint templates. In: Information Security and Privacy. Springer, pp 242–252
Ateniese G, Blundo C, Santis AD, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1):143–161
Belguechi R, Cherrier E, El Abed M, Rosenberger C (2011) Evaluation of cancelable biometric systems: Application to finger-knuckle-prints. In: 2011 International Conference on Hand-Based Biometrics (ICHB). IEEE, pp 1–6
Belguechi R, Cherrier E, Rosenberger C (2012) Texture based fingerprint biohashing: Attacks and robustness. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 196– 201
Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recog 35(12):2727–2738
Boult T Vision and Security Technology Lab. http://www.vast.uccs.edu
Boult TE, Scheirer WJ, Woodworth R (2007) Revocable fingerprint biotokens: Accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–8
Bringer J, Chabanne H, Cohen G, Kindarji B, Zémor G (2007) Optimal iris fuzzy sketches. In: First IEEE international conference on biometrics: theory, applications, and systems, 2007. BTAS 2007. IEEE, pp 1–6
Bringer J, Chabanne H, Kindarji B (2008) The best of both worlds: Applying secure sketches to cancelable biometrics. Sci Comput Program 74(1):43–51
Bringer J, Chabanne H, Kindarji B (2009) Anonymous identification with cancelable biometrics. In: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009. IEEE, pp 494–499
Chen X, Bai X, Tao X, Pan X (2013) Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering. Springer, pp 605–612
Cheung KH, Kong A, Zhang D, Kamel M, You JT, Lam HW (2005a) An analysis on accuracy of cancelable biometrics based on biohashing. In: Knowledge-Based Intelligent Information and Engineering Systems. Springer, pp 1168–1172
Cheung KH, Kong AWK, You J, Zhang D (2005b) An analysis on invertibility of cancelable biometrics based on biohashing. In: CISST, vol 2005, pp 40–45
Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcard based fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM, pp 45–52
Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for cancelable biometrics. Inf Process Lett 93(1):1–5
de Paula Canuto AM, Fairhurst MC, Pintro F (2013) Ensemble systems and cancellable transformations for multibiometric-based identification. IET Biom 3 (1):29–40
Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) Biohash code generation from electrocardiogram features. In: 2013 IEEE 3rd International Advance Computing Conference (IACC). IEEE, pp 732–735
Divya C, Surya E (2012) Visual cryptography using palm print based on dct algorithm. International Journal of Emerging Technology and Advanced Engineering 2(12):2250–2459
Fan TY, Chieu BC, Chao HC (2012) Robust copyright-protection scheme based on visual secret sharing and bose–chaudhuri–hocquenghem code techniques. Journal of Electronic Imaging 21(4):043,018–043,018
Farooq F, Bolle RM, Jea TY, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, CVPR’07. IEEE, pp 1–7
Feng H, Choong Wah C (2002) Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10(4):159–164
Feng Q, Xiao Y, Su F, An CAI (2008) Cancelable fingerprint fuzzy vault scheme. J Comput Appl 7 :060
Feng Y, Yuen PC, Jain AK (2008) A hybrid approach for face template protection. In: SPIE Defense and Security Symposium, International Society for Optics and Photonics, pp 694,408–694,408
Feng YC, Yuen PC, Jain AK (2010) A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security 5(1):103–117
Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw. Secur 11(2):61–69
Genkey. http://www.priv-id.com
Goh A, Ngo DC (2003) Computation of cryptographic keys from face biometrics. In: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. Springer, pp 1– 13
Hämmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Information Security. Springer, pp 135–142
Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081–1088. IEEE
Hirano T, Hattori M, Ito T, Matsuda N, Mori T (2012) Homomorphic encryption based cancelable biometrics secure against replay and its related attack. In: 2012 International Symposium on Information Theory and its Applications (ISITA), IEEE, pp 421–425
Hirata S, Takahashi K (2009) Cancelable biometrics with perfect secrecy for correlation-based matching. Springer, pp 868–878
Hu CM, Tzeng WG (2007) Cheating prevention in visual cryptography. IEEE Trans Image Process 16(1):36–45
Ilavarsan K, Malvika R (2012) A multiple level visual cryptography scheme for biometric privacy without pixel expansion. International Journal of Communications and Engineering 4(4):59–63
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE 14:4–20
Jain AK, Nandakumar K, Nagar A, et al. (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008
Jeong M, Lee C, Kim J, Choi JY, Toh KA, Kim J (2006) Changeable biometrics for appearance based face recognition. In: 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference. IEEE, pp 1–5
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security. ACM, pp 28–36
Kanak A, Sogukpınar I (2009) Classification based revocable biometric identity code generation. In: Biometric ID Management and Multimodal Communication. Springer, pp 276–284
Kim Y, Toh KA (2007) A method to enhance face biometric security. In: Biometrics: 2007 First IEEE International Conference on Theory, Applications, and Systems, BTAS 2007. IEEE, pp 1–6
Kuan YW, Teoh AB, Ngo DC (2007) Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2 n discretization. EURASIP Journal on Applied Signal Processing 2007(1):32–32
Kümmel K, Vielhauer C (2010) Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting. In: Proceedings of the 12th ACM workshop on Multimedia and security. ACM, pp 67– 72
Lacharme P, Cherrier E, Rosenberger C, et al. (2013) Preimage attack on biohashing. In: International Conference on Security and Cryptography (SECRYPT)
Lalithamani N, Soman S (2009) An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, ARTCom’09. IEEE, pp 47–52
Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246
Lee Y, Lee Y, Chung Y, Moon K (2007) One-time templates for face authentication. In: 2007 International Conference on Convergence Information Technology. IEEE, pp 1818–1823
Lee Y, Chung Y, Moon K (2009) Inverse operation and preimage attack on biohashing. In: Computational Intelligence in Biometrics: 2009 IEEE Workshop on Theory, Algorithms, and Applications, CIB 2009. IEEE, pp 92–97
Leng L, Zhang J, Khan M, Bi X, Ji M (2010) Cancelable palmcode generated from randomized gabor filters for palmprint protection. In: 2010 25th International Conference of Image and Vision Computing New Zealand (IVCNZ). IEEE, pp 1–6
Li C, Hu J (2013) Attacks via record multiplicity on cancelable biometrics templates. Concurrency and Computation: Practice and Experience
Li H, Wang L (2012) Chaos-based cancelable palmprint authentication system. Procedia Engineering 29(0):1239–1245
Li Q, Chang EC (2006) Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th workshop on Multimedia and security. ACM, pp 56–61
Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recognit 40(3):1057–1065
Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 40(3):525–538
Maiorana E, Campisi P, Neri A (2011a) Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system. In: 2011 IEEE International Systems Conference (SysCon). IEEE, pp 495–500
Maiorana E, Campisi P, Neri A (2011b) Cancellable biometrics for on-line signature recognition. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software, p 290
Martinez-Diaz M, Fierrez-Aguilar J, Alonso-Fernandez F, Ortega-Garcia J, Siguenza J (2006) Hill-climbing and brute-force attacks on biometric systems: A case study in match-on-card fingerprint verification. In: Proceedings 2006 40th Annual IEEE International Carnahan Conferences Security Technology. IEEE, pp 151–159
Monoth T, Anto PB (2010) Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Computer Science 2:143–148
Muhammed RP (2011) A secured approach to visual cryptographic biometric template. International Journal on Information Technology 1(2)
Nagar A, Jain AK (2009) On the security of non-invertible fingerprint template transforms. IEEE, pp 81–85
Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images
Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: Implementation and performance. IEEE Transactions on Information Forensics and Security 2(4):744–757
Nanni L, Lumini A (2006) Empirical tests on biohashing. Neurocomputing 69(16):2390–2395
Nanni L, Lumini A (2010) Cancellable biometrics: problems and solutions for improving accuracy. Biometrics: Methods, Applications and Analyses
Naor M, Shamir A (1995) Visual cryptography. In: Advances in CryptologyEUROCRYPT’94. Springer, pp 1–12
Othman A, Ross A (2011) Mixing fingerprints for generating virtual identities. In: 2011 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 1–6
Pabitha M, Latha L (2013) Efficient approach for retinal biometric template security and person authentication using noninvertible constructions. Int J Comput Appl 69(4)
Patel VM, Chellappa R, Tistarelli M (2010) Sparse representations and random projections for robust and cancelable biometrics. In: 2010 11th International Conference on Control Automation Robotics & Vision (ICARCV). IEEE, pp 1–6
Paul PP, Gavrilova M (2012a) Multimodal biometric approach for cancelable face template generation. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 84,070H–84,070H
Paul PP, Gavrilova ML (2012b) A novel cross folding algorithm for multimodal cancelable biometrics. International Journal of Software Science and Computational Intelligence (IJSSCI) 4(3):20–37
Paul PP, Gavrilova M, Klimenko S (2013) Situation awareness of cancelable biometric system. Vis Comput:1–9
Persay. http://www.persay.com
Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 International Symposium on Computer Science and Computational Technology, ISCSCT’08, vol 2. IEEE, pp 572–575
Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: 2006 18th International Conference on Pattern Recognition, ICPR 2006, vol 4. IEEE, pp 370– 373
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4):561–572
Rathgeb C, Busch C (2014) Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. Computers & Security
Revenkar P, Anjum A, Gandhare W (2010) Secure iris authentication using visual cryptography. arXiv preprint arXiv: http://arxiv.org/abs/10041748
Roberts C (2007) Biometric attack vectors and defences. Computers & Security 26(1):14–25
Ross A, Othman A (2011a) Mixing fingerprints for template security and privacy. In: Proceedings of the 19th Eur. Sign. Proc. Conf.(EUSIPCO)
Ross A, Othman A (2011b) Visual cryptography for biometric privacy. IEEE transactions on information forensics and security 6(1):70–81
Ross A, Othman AA (2010) Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, pp 76,670B–76,670B
Rust C (2009) Turbine: Trusted revocable biometric identities. Biometric Technology Today 17(2):8–10
Savvides M, Kumar BV, Khosla PK (2004) Cancelable biometric filters for face recognition. In: 2004 Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, vol 3. IEEE, pp 922–925
Schneier B (1999) Biometrics: uses and abuses. Commun ACM 42(8):58
SECURICS INC Colorado springs, co. http://www.securics.com
Shin SW, Lee MK, Moon D, Moon K (2009) Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI j 31(5)
Siew Chin C, Beng Jin AT, Chek Ling DN (2006) High security iris verification system based on random secret integration. Comp Vision Image Underst 102(2):169–177
Simoens K, Yang B, Zhou X, Beato F, Busch C, Newton EM, Preneel B (2012) Criteria towards metrics for benchmarking template protection algorithms. In: 2012 5th IAPR International Conference on Biometrics (ICB). IEEE, pp 498–505
Sinduja R, Sathiya R, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp 650–655
Sohn H, Ro YM, Plataniotis KN (2009) Biometric authentication using augmented face and random projection. In: 2009 Biometrics: IEEE 3rd International Conference on Theory, Applications, and Systems BTAS’09. IEEE, pp 1–6
Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV (1998) Biometric encryption using image processing. In: Photonics West’98 Electronic Imaging, International Society for Optics and Photonics, pp 178–188
Soutar C et al (2002) Biometric system security. White Paper, Bioscrypt, http://www.bioscrypt.com
Suryadevara S, Naaz R, Kapoor S, Sharma A, et al. (2011) Visual cryptography improvises the security of tongue as a biometric in banking system. In: 2011 2nd International Conference on Computer and Communication Technology (ICCCT). IEEE, pp 412–415
Sutcu Y, Sencar HT, Memon N (2005) A secure biometric authentication scheme based on robust hashing. In: Proceedings of the 7th workshop on Multimedia and security. ACM, pp 111– 116
Sutcu Y, Li Q, Memon N (2007) Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security 2(3):503–512
Takahashi K, Hirata S (2011) Parameter management schemes for cancelable biometrics. In: 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM). IEEE, pp 145–151
Takur V, Jaiswal R, Sonawane S, Nalavade R, et al. (2012) Biometric data security using recursive visual cryptography. In: Information and Knowledge Management, vol 2, pp 32–36
Teoh ABJ, Ngo DCL (2006) Biophasor: Token supplemented cancellable biometrics. In: 2006 9th International Conference on Control, Automation, Robotics and Vision, ICARCV’06. IEEE, pp 1–5
Teoh A, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37(5):1096–1106
Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recog 41(6):2034–2044
Teoh ABJ, Ngo DCL, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog 37(11):2245–2255
Teoh A, Jin B, Connie T, Ngo D, Ling C (2006) Remarks on biohash and its mathematical foundation. Inf Process Lett 100(4):145–150
Tulyakov S, Farooq F, Govindaraju V (2005) Symmetric hash functions for fingerprint minutiae. In: Pattern Recognition and Image Analysis. Springer, pp 30–38
Tuyls P, Hollmann HD, Van Lint JH, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186
Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92(6):948–960
Vielhauer C, Steinmetz R, Mayerhöfer A (2002) Biometric hash based on statistical features of online signatures. In: Proceedings of the 16th international conference on pattern recognition, 2002, vol 1. IEEE, pp 123–126
VeinID Hitachi. http://www.hitachi.eu
Wang Y, Plataniotis K (2007) Face based biometric authentication with changeable and privacy preservable templates. In: 2007 Biometrics Symposium. IEEE, pp 1–6
Wu X, Qi N, Wang K, Zhang D (2008) An iris cryptosystem for information security. In: IIHMSP’08 international conference on intelligent information hiding and multimedia signal processing, 2008. IEEE, pp 1533–1536
Xu D, Wang X (2010) A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence. In: 2010 International Conference on Mechatronics and Automation (ICMA). IEEE, pp 329–332
Xu W, Cheng M (2008) Cancelable voiceprint template based on chaff-points-mixture method. In: Proceedings of the 2008 International Conference on Computational Intelligence and Security-Volume 02, IEEE Computer Society, pp 263–266
Xu W, He Q, Li Y, Li T (2008) Cancelable voiceprint templates based on knowledge signatures. In: 2008 International Symposium on Electronic Commerce and Security. IEEE, pp 412–415
Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. In: Cyberspace Safety and Security. Springer, pp 81–91
Zhu HH, He QH, Li YX (2012) A two -step hybrid approach for voiceprint-biometric template protection. In: 2012 International Conference on Machine Learning and Cybernetics (ICMLC), vol 2, pp 560–565. 10.1109/ICMLC.2012.6358984
Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 19th International Conference on Pattern Recognition, ICPR 2008. IEEE, pp 1–4
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kaur, H., Khanna, P. Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75, 16333–16361 (2016). https://doi.org/10.1007/s11042-015-2933-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2933-6