International journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN:2313-626X

Frequency: 12

line decor
  
line decor

 Volume 4, Issue 11 (November 2017), Pages: 65-77

----------------------------------------------

 Review Paper

 Title: Cancelable and hybrid biometric cryptosystems: current directions and open research issues

 Author(s): Abayomi Jegede 1, 2, *, Nur Izura Udzir 1, Azizol Abdullah 1, Ramlan Mahmod 1

 Affiliation(s):

 1Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia
 2Department of Computer Science, University of Jos, Jos, Nigeria

 https://doi.org/10.21833/ijaas.2017.011.010

 Full Text - PDF          XML

Abstract:

Cancelable and hybrid biometric cryptosystems are two techniques used to offer protection against the security and privacy challenges faced by users of biometric authentication systems. The main objective of this paper is to present a critical review of current and emerging trends as well as open research issues in cancellable and hybrid biometric systems. The study examines cancelable biometrics under two main categories, namely non-invertible transformation and biometric salting. It also explores hybrid cryptosystems as means of providing improved template security and user privacy. The review focusses on the modes of operation, performance accuracy, security and privacy of various types of cancellable and hybrid biometric cryptosystems. It also provides a more comprehensive survey of latest research works in cancellable and hybrid biometric cryptosystems than existing review papers in these fields. The paper will provide readers with up-to-date information on current directions and open research issues in cancelable and hybrid biometric cryptosystems. 

 © 2017 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Biometrics, Biometric cryptosystem, Privacy, Security

 Article History: Received 28 April 2017, Received in revised form 20 September 2017, Accepted 21 September 2017

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2017.011.010

 Citation:

 Jegede A, Udzir NI, Abdullah A, and Mahmod R (2017). Cancelable and hybrid biometric cryptosystems: current directions and open research issues. International Journal of Advanced and Applied Sciences, 4(11): 65-77

 Permanent Link:

 http://www.science-gate.com/IJAAS/V4I11/Jegede.html

----------------------------------------------

 References (65)

  1. Ao M and Li SZ (2009). Near infrared face based biometric key binding. In the International Conference on Biometrics, Springer, Alghero, Italy: 376-385. https://doi.org/10.1007/978-3-642-01793-3_39 
  2. Arya KV and Singh S (2012). Generating cancelable fingerprint using drawing code. In the International Conference on Soft Computing for Problem Solving, Springer, India, 189-195. https://doi.org/10.1007/978-81-322-0491-6_18 
  3. Bringer J, Chabanne H, and Kindarji B (2008). The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming, 74(1): 43-51. https://doi.org/10.1016/j.scico.2008.09.016 
  4. Brocardo ML, Traore I, and Woungang I (2014). Toward a framework for continuous authentication using stylometry. In the IEEE 28th International Conference on Advanced Information Networking and Applications, IEEE, Victoria, BC, Canada: 106-115. https://doi.org/10.1109/AINA.2014.18 
  5. Butt M and Damer N (2014). Helper data scheme for 2D cancelable face recognition using bloom filters. In the International Conference on Systems, Signals and Image Processing, IEEE, Dubrovnik, Croatia: 271-274.     
  6. Chafia F, Salim C, and Farid B (2010). A biometric crypto-system for authentication. In the International Conference on Machine and Web Intelligence, IEEE, Algiers: 434-438. https://doi.org/10.1109/ICMWI.2010.5648101 
  7. Chen H and Chen H (2010). A hybrid scheme for securing fingerprint templates. International Journal of Information Security, 9(5): 353-361. https://doi.org/10.1007/s10207-010-0114-1 
  8. Dahake P and Nimbhorkar S (2015). Hybrid cryptosystem for maintaining image integrity using biometric fingerprint. In the International Conference on Pervasive Computing, IEEE, Pune, India: 1-5. https://doi.org/10.1109/PERVASIVE.2015.7087177 
  9. Dang TK, Truong QC, Le TTB, and Truong H (2016). Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics, 5(3): 229-235. https://doi.org/10.1049/iet-bmt.2015.0029 
  10. Farberbock P, Hämmerle-Uhl J, Kaaser D, Pschernig E, and Uhl A (2010). Transforming rectangular and polar iris images to enable cancelable biometrics. In: Campilho A and Kamel M (Eds.), Image analysis and recognition: 276-286. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-13775-4_28 
  11. Feng YC, Yuen PC, and Jain AK (2010). A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security, 5(1): 103-117. https://doi.org/10.1109/TIFS.2009.2038760 
  12. Filho OIDL, Bedregal BR, and Canuto AM (2012). An investigation of ensemble systems applied to encrypted and cancellable biometric data. In the International Conference on Artificial Neural Networks, Springer, Lausanne, Switzerland: 180-188. https://doi.org/10.1007/978-3-642-33266-1_23     
  13. Ghany KKA, Hefny HA, Hassanien AE, and Ghali NI (2012). A hybrid approach for biometric template security. In the 2012 International Conference on Advances in Social Networks Analysis and Mining, IEEE Computer Society, Washington, DC, USA: 941-942. https://doi.org/10.1109/ASONAM.2012.167 
  14. Grassi M and Faundez-Zanuy M (2009). Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: Cabestany J, Sandoval F, Prieto A, and Corchado-Rodríguez JM (Eds.), Bio-inspired systems: computational and ambient intelligence: 1216-1223. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-02478-8_152 
  15. Hammerle-Uhl J, Pschernig E, and Uhl A (2009). Cancelable iris biometrics using block re-mapping and image warping. In the 12th International Conference on Information Security, Springer, Pisa, Italy, 9: 135-142. https://doi.org/10.1007/978-3-642-04474-8_11 
  16. Jeong M and Teoh ABJ (2010). Cancellable face biometrics system by combining independent component analysis coefficients. In the International Workshop on Computational Forensics, Springer, Tokyo, Japan: 78-87. https://doi.org/10.1007/978-3-642-19376-7_7  PMid:20156484 
  17. Jin Z and Teoh ABJ (2015). Construct a new fixed-length binary fingerprint representation using kernelized local-sensitive hashing. In the 10th IEEE Conference on Industrial Electronics and Applications, IEEE, Auckland, New Zealand: 296-301. https://doi.org/10.1109/ICIEA.2015.7334128     
  18. Kaur H and Khanna P (2017). Cancelable features using log-Gabor filters for biometric authentication. Multimedia Tools and Applications, 76(4): 4673–4694. https://doi.org/10.1007/s11042-016-3652-3 
  19. Khandelwal S and Gupta PC (2015). Implementation of secure biometric fuzzy vault using personal image identification. In the Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India, Springer, 1: 311-319. https://doi.org/10.1007/978-3-319-13728-5_35 
  20. Kim Y and Toh KA (2007). A method to enhance face biometric security. In the First IEEE International Conference on Biometrics: Theory, Applications, and Systems, IEEE, Crystal City, VA, USA: 1-6. https://doi.org/10.1109/BTAS.2007.4401913 
  21. Kong A, Cheunga KH, Zhang D, Kamel M, and You J (2006). An analysis of biohashing and its variants. Pattern Recognition, 39(7): 1359-1368. https://doi.org/10.1016/j.patcog.2005.10.025 
  22. Lalithamani N and Soman KP (2009). An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In the International Conference on Advances in Recent Technologies in Communication and Computing, IEEE, Kottayam, Kerala, India: 47-52. https://doi.org/10.1109/ARTCom.2009.193 
  23. Latif EB, Wilbowo S, Wasimi S and Tareef A (2017). A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimedia Tools and Applications: 1-19. Springer Science+Business Media, New York, USA. https://doi.org/10.1007/s11042-016-4280-7     
  24. Le TTB, Dang TK, Truong QC, and Nguyen TAT (2014). Protecting biometric features by periodic function-based transformation and fuzzy vault. In: Hameurlain A., Küng J., Wagner R, Dang T, and Thoai N (Eds.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI. Lecture Notes in Computer Science, 8960. Springer, Berlin, Heidelberg, Germany. https://doi.org/10.1007/978-3-662-45947-8_5 
  25. Lee Y, Chung Y, and Moon K (2009). Inverse operation and preimage attack on biohashing. In the IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, IEEE, Nashville, USA: 92-97. https://doi.org/10.1109/CIB.2009.4925692     
  26. Li C and Hu J (2016). A security-enhanced alignment-free fuzzy vault-based cryptosystem using pair-polar minutiae structures. IEEE Transactions on Information Forensic and Security, 11(3): 543-555. https://doi.org/10.1109/TIFS.2015.2505630 
  27. Li CT (2016). A secure chaotic maps-based privacy-protection scheme for multi-server environments. Security and Communication Networks, 9(14): 2276–2290. https://doi.org/10.1002/sec.1487 
  28. Lin J and Gunopulos D (2003) Dimensionality reduction by random projection and latent semantic indexing. In the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining, SIAM: 1-10.     
  29. Liu H, Sun D, Xiong K, and Qiu Z (2014). A hybrid approach to protect palmprint templates. The Scientific World Journal, 2014: Article ID 686754, 9 pages. https://doi.org/10.1155/2014/686754 
  30. Lumini A and Nanni L (2007). An improved biohashing for human authentication. Pattern Recognition, 40(3): 1057-1065. https://doi.org/10.1016/j.patcog.2006.05.030 
  31. Maiorana E, Campisi P, and Neri A (2011). Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system. In the IEEE International Systems Conference, IEEE, Montreal, QC, Canada: 495-500. https://doi.org/10.1109/SYSCON.2011.5929064 
  32. Meenakshi VS and Padmavathi G (2010). Security analysis of hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Procedia Computer Science, 2: 195-206. https://doi.org/10.1016/j.procs.2010.11.025 
  33. Moujahdi C, Ghouzali S, Mikram M, Rziza M, and Bebis G (2012). Spiral cube for biometric template protection. In the International Conference on Image and Signal Processing, Springer, Trois-Rivières, QC, Canada: 235-244. https://doi.org/10.1007/978-3-642-31254-0_27 
  34. Nagar A and Jain AK (2009). On the security of non-invertible fingerprint template transforms. In the First IEEE International Workshop on Information Forensics and Security, IEEE, London, UK: 81-85. https://doi.org/10.1109/WIFS.2009.5386477 
  35. Nagar A, Nandakumar K, and Jain AK (2010). A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 31(8): 733-741. https://doi.org/10.1016/j.patrec.2009.07.003 
  36. Narayanan R and Subramanian K (2011). An efficient secure biometric system with non-invertible gabor-transform. International Journal of Computer Science Issues, 8(5): 170-175.     
  37. Nasir MS and Kuppuswamy P (2013). Implementation of biometric security using hybrid combination of RSA and simple symmetric key algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 1(8): 1741-1748.     
  38. Nguyen MT, Truong TK, and Dang TK (2016). Enhance fuzzy vault security using nonrandom chaff point generator. Information Processing Letters, 116(1): 53-64. https://doi.org/10.1016/j.ipl.2015.08.012 
  39. Nguyen TAT, Nguyen DT, and Dang TK (2015). A multi-factor biometric based remote authentication using fuzzy commitment and non-invertible transformation. In the Information and Communication Technology - EurAsia Conference, Springer, Cham, Switzerland: 77-88. https://doi.org/10.1007/978-3-319-24315-3_8 
  40. Ouda O, Tsumura N, and Nakaguchi T (2010). Tokenless cancelable biometrics scheme for protecting iris codes. In the 20th International Conference on Pattern Recognition, IEEE, Istanbul, Turkey: 882-885. https://doi.org/10.1109/ICPR.2010.222 
  41. Quan F, Fei S, Anni C, and Feifei Z (2008). Cracking cancelable fingerprint template of Ratha. In the International Conference on Computer Science and Computational Technology, IEEE, Shanghai, China, 2: 572-575. https://doi.org/10.1109/ISCSCT.2008.226 
  42. Ratha N, Connell J, Bolle RM, and Chikkerur S (2006). Cancelable biometrics: A case study in fingerprints. In the 18th International Conference on Pattern Recognition, IEEE, Hong Kong, China, 4: 370-373. https://doi.org/10.1109/ICPR.2006.353 
  43. Ratha NK, Connell JH, and Bolle RM (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3): 614-634. https://doi.org/10.1147/sj.403.0614 
  44. Ratha NK, Connell JH, Bolle RM, and Chikkerur, S (2007). Generating cancellable fingerprints templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4): 561-572. https://doi.org/10.1109/TPAMI.2007.1004  PMid:17299214 
  45. Rathgeb C and Uhl A (2010). Secure iris recognition based on local intensity variations. In: Campilho A and Kamel M (Eds.), Image analysis and recognition: 266-275. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-13775-4_27 
  46. Rathgeb C, Breitinger F, Busch C, and Baier H (2014). On the application of bloom filters to iris biometrics. IET Biometrics, 3(4): 207-218. https://doi.org/10.1049/iet-bmt.2013.0049 
  47. Rathgeb C, Uhl A, and Wild P (2012). Iris biometrics: from segmentation to template security. Springer New York, USA.     
  48. Safie SI, Nurfazira H, Azavitra Z, Soraghan JJ, and Petropoulakis L (2014). Pulse active transform (PAT): A non-invertible transformation with application to ECG biometric authentication. In the IEEE Region 10 Conference, IEEE, Kuala Lumpur, Malaysia: 667-671. https://doi.org/10.1109/TENCONSpring.2014.6863117 
  49. Sandhya M and Prasad MVNK (2016). Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern Analysis and Applications: 1-16. https://doi.org/10.1007/s10044-016-0584-5 
  50. Sandhya M, Prasad MVNK, and Chillarige RR (2016). Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biometrics, 5(2): 131-139. https://doi.org/10.1049/iet-bmt.2015.0034 
  51. Savvides M, Kumar BV, and Khosla PK (2004). Cancelable biometric filters for face recognition. In the 17th International Conference on Pattern Recognition, IEEE, Cambridge, UK, 3: 922-925. https://doi.org/10.1109/ICPR.2004.1334679 
  52. Shin WK, Lee MK, Moon D, and Moon K (2009). Dictionary attack on functional-based cancelable fingerprint templates. Electronics and Telecommunications Research Institute (ETRI Journal), 31(5): 628-630. https://doi.org/10.4218/etrij.09.0209.0137 
  53. Sree SS and Radha N (2016). Cancellable multimodal biometric user authentication system with fuzzy vault. In the International Conference on Computer Communication and Informatics, IEEE, Coimbatore, India: 1-6. https://doi.org/10.1109/ICCCI.2016.7479931     
  54. Teoh AB and Ngo DC (2006). Biophasor: Token supplemented cancellable biometrics. In the 9th International Conference on Control, Automation, Robotics and Vision, IEEE, Singapore, Singapore: 1-5. https://doi.org/10.1109/ICARCV.2006.345404 
  55. Teoh ABJ and Yuang CT (2007). Cancelable biometrics realization with multispace random projections. IEEE Transactions on System, Man and Cybernetics, Part B, 37(5): 1096-1106.     
  56. Vo TTL, Dang TK, and Küng J (2014). A hash-based index method for securing biometric fuzzy vaults. In the International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, Switzerland: 60-71. https://doi.org/10.1007/978-3-319-09770-1_6 
  57. Wang N, Li Q, El-Latif AAA, Peng J, Yan X, and Niu X (2015). A novel protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal, Image and Video Processing, 9(1): 99-109. https://doi.org/10.1007/s11760-014-0663-2 
  58. Wang S and Hu J (2013). A hadamard transformed-based method for the design of cancellable fingerprint templates. In the 6th International Congress on Image and Signal Processing, IEEE, Hangzhou, China, 3: 1682-1687. https://doi.org/10.1109/CISP.2013.6743947     
  59. Wu L and Yuan S (2010). A face based fuzzy vault scheme for secure online authentication. In the Second International Conference on Data, Privacy and E-Commerce, IEEE, Buffalo, NY, USA: 45-49. https://doi.org/10.1109/ISDPE.2010.13 
  60. Wu Z, Liang B, You L, Jian Z, and Li J (2016). High-dimensional space projection-based biometric encryption for fingerprint with fuzzy minuatia. Soft Computing, 20(12): 4907-4918. https://doi.org/10.1007/s00500-015-1778-2 
  61. Xu W, He Q, Li Y, and Li T (2008). Cancellable voiceprint templates based on knowledge signatures. In the 2008 International Symposium on Electronic Commerce and Security, IEEE, Guangzhou, China: 412-415. https://doi.org/10.1109/ISECS.2008.100 
  62. Yang W, Hu J, and Wang S (2013). A finger-vein based cancellable bio-cryptosystem. In the International Conference on Network and System Security, Springer, Helsinki, Finland: 784-790. https://doi.org/10.1007/978-3-642-38631-2_71 
  63. Yang Y, Yu J, Zhang Q, and Meng F (2015). Improved hash functions for cancelable fingerprint encryption schemes. Wireless Personal Communications, 84(1): 643–669. https://doi.org/10.1007/s11277-015-2654-1 
  64. Zhu HH, He QH, and Li YX (2012). A two-step hybrid approach for voiceprint-biometric template protection. In the International Conference on Machine Learning and Cybernetics, IEEE, Xian, China, 2: 560-565. https://doi.org/10.1109/ICMLC.2012.6358984 
  65. Zuo J, Ratha NK, and Connell JH (2008). Cancelable iris biometric. In the 19th International Conference on Pattern Recognition, IEEE, Tampa, USA: 1-4. https://doi.org/10.1109/ICPR.2008.4761886