Volume 4, Issue 11 (November 2017), Pages: 65-77
----------------------------------------------
Review Paper
Title: Cancelable and hybrid biometric cryptosystems: current directions and open research issues
Author(s): Abayomi Jegede 1, 2, *, Nur Izura Udzir 1, Azizol Abdullah 1, Ramlan Mahmod 1
Affiliation(s):
1Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM Serdang, Selangor, Malaysia
2Department of Computer Science, University of Jos, Jos, Nigeria
https://doi.org/10.21833/ijaas.2017.011.010
Full Text - PDF XML
Abstract:
Cancelable and hybrid biometric cryptosystems are two techniques used to offer protection against the security and privacy challenges faced by users of biometric authentication systems. The main objective of this paper is to present a critical review of current and emerging trends as well as open research issues in cancellable and hybrid biometric systems. The study examines cancelable biometrics under two main categories, namely non-invertible transformation and biometric salting. It also explores hybrid cryptosystems as means of providing improved template security and user privacy. The review focusses on the modes of operation, performance accuracy, security and privacy of various types of cancellable and hybrid biometric cryptosystems. It also provides a more comprehensive survey of latest research works in cancellable and hybrid biometric cryptosystems than existing review papers in these fields. The paper will provide readers with up-to-date information on current directions and open research issues in cancelable and hybrid biometric cryptosystems.
© 2017 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Biometrics, Biometric cryptosystem, Privacy, Security
Article History: Received 28 April 2017, Received in revised form 20 September 2017, Accepted 21 September 2017
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2017.011.010
Citation:
Jegede A, Udzir NI, Abdullah A, and Mahmod R (2017). Cancelable and hybrid biometric cryptosystems: current directions and open research issues. International Journal of Advanced and Applied Sciences, 4(11): 65-77
Permanent Link:
http://www.science-gate.com/IJAAS/V4I11/Jegede.html
----------------------------------------------
References (65)
- Ao M and Li SZ (2009). Near infrared face based biometric key binding. In the International Conference on Biometrics, Springer, Alghero, Italy: 376-385. https://doi.org/10.1007/978-3-642-01793-3_39
- Arya KV and Singh S (2012). Generating cancelable fingerprint using drawing code. In the International Conference on Soft Computing for Problem Solving, Springer, India, 189-195. https://doi.org/10.1007/978-81-322-0491-6_18
- Bringer J, Chabanne H, and Kindarji B (2008). The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming, 74(1): 43-51. https://doi.org/10.1016/j.scico.2008.09.016
- Brocardo ML, Traore I, and Woungang I (2014). Toward a framework for continuous authentication using stylometry. In the IEEE 28th International Conference on Advanced Information Networking and Applications, IEEE, Victoria, BC, Canada: 106-115. https://doi.org/10.1109/AINA.2014.18
- Butt M and Damer N (2014). Helper data scheme for 2D cancelable face recognition using bloom filters. In the International Conference on Systems, Signals and Image Processing, IEEE, Dubrovnik, Croatia: 271-274.
- Chafia F, Salim C, and Farid B (2010). A biometric crypto-system for authentication. In the International Conference on Machine and Web Intelligence, IEEE, Algiers: 434-438. https://doi.org/10.1109/ICMWI.2010.5648101
- Chen H and Chen H (2010). A hybrid scheme for securing fingerprint templates. International Journal of Information Security, 9(5): 353-361. https://doi.org/10.1007/s10207-010-0114-1
- Dahake P and Nimbhorkar S (2015). Hybrid cryptosystem for maintaining image integrity using biometric fingerprint. In the International Conference on Pervasive Computing, IEEE, Pune, India: 1-5. https://doi.org/10.1109/PERVASIVE.2015.7087177
- Dang TK, Truong QC, Le TTB, and Truong H (2016). Cancellable fuzzy vault with periodic transformation for biometric template protection. IET Biometrics, 5(3): 229-235. https://doi.org/10.1049/iet-bmt.2015.0029
- Farberbock P, Hämmerle-Uhl J, Kaaser D, Pschernig E, and Uhl A (2010). Transforming rectangular and polar iris images to enable cancelable biometrics. In: Campilho A and Kamel M (Eds.), Image analysis and recognition: 276-286. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-13775-4_28
- Feng YC, Yuen PC, and Jain AK (2010). A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security, 5(1): 103-117. https://doi.org/10.1109/TIFS.2009.2038760
- Filho OIDL, Bedregal BR, and Canuto AM (2012). An investigation of ensemble systems applied to encrypted and cancellable biometric data. In the International Conference on Artificial Neural Networks, Springer, Lausanne, Switzerland: 180-188. https://doi.org/10.1007/978-3-642-33266-1_23
- Ghany KKA, Hefny HA, Hassanien AE, and Ghali NI (2012). A hybrid approach for biometric template security. In the 2012 International Conference on Advances in Social Networks Analysis and Mining, IEEE Computer Society, Washington, DC, USA: 941-942. https://doi.org/10.1109/ASONAM.2012.167
- Grassi M and Faundez-Zanuy M (2009). Protecting DCT templates for a face verification system by means of pseudo-random permutations. In: Cabestany J, Sandoval F, Prieto A, and Corchado-Rodríguez JM (Eds.), Bio-inspired systems: computational and ambient intelligence: 1216-1223. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-02478-8_152
- Hammerle-Uhl J, Pschernig E, and Uhl A (2009). Cancelable iris biometrics using block re-mapping and image warping. In the 12th International Conference on Information Security, Springer, Pisa, Italy, 9: 135-142. https://doi.org/10.1007/978-3-642-04474-8_11
- Jeong M and Teoh ABJ (2010). Cancellable face biometrics system by combining independent component analysis coefficients. In the International Workshop on Computational Forensics, Springer, Tokyo, Japan: 78-87. https://doi.org/10.1007/978-3-642-19376-7_7 PMid:20156484
- Jin Z and Teoh ABJ (2015). Construct a new fixed-length binary fingerprint representation using kernelized local-sensitive hashing. In the 10th IEEE Conference on Industrial Electronics and Applications, IEEE, Auckland, New Zealand: 296-301. https://doi.org/10.1109/ICIEA.2015.7334128
- Kaur H and Khanna P (2017). Cancelable features using log-Gabor filters for biometric authentication. Multimedia Tools and Applications, 76(4): 4673–4694. https://doi.org/10.1007/s11042-016-3652-3
- Khandelwal S and Gupta PC (2015). Implementation of secure biometric fuzzy vault using personal image identification. In the Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India, Springer, 1: 311-319. https://doi.org/10.1007/978-3-319-13728-5_35
- Kim Y and Toh KA (2007). A method to enhance face biometric security. In the First IEEE International Conference on Biometrics: Theory, Applications, and Systems, IEEE, Crystal City, VA, USA: 1-6. https://doi.org/10.1109/BTAS.2007.4401913
- Kong A, Cheunga KH, Zhang D, Kamel M, and You J (2006). An analysis of biohashing and its variants. Pattern Recognition, 39(7): 1359-1368. https://doi.org/10.1016/j.patcog.2005.10.025
- Lalithamani N and Soman KP (2009). An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In the International Conference on Advances in Recent Technologies in Communication and Computing, IEEE, Kottayam, Kerala, India: 47-52. https://doi.org/10.1109/ARTCom.2009.193
- Latif EB, Wilbowo S, Wasimi S and Tareef A (2017). A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system. Multimedia Tools and Applications: 1-19. Springer Science+Business Media, New York, USA. https://doi.org/10.1007/s11042-016-4280-7
- Le TTB, Dang TK, Truong QC, and Nguyen TAT (2014). Protecting biometric features by periodic function-based transformation and fuzzy vault. In: Hameurlain A., Küng J., Wagner R, Dang T, and Thoai N (Eds.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI. Lecture Notes in Computer Science, 8960. Springer, Berlin, Heidelberg, Germany. https://doi.org/10.1007/978-3-662-45947-8_5
- Lee Y, Chung Y, and Moon K (2009). Inverse operation and preimage attack on biohashing. In the IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, IEEE, Nashville, USA: 92-97. https://doi.org/10.1109/CIB.2009.4925692
- Li C and Hu J (2016). A security-enhanced alignment-free fuzzy vault-based cryptosystem using pair-polar minutiae structures. IEEE Transactions on Information Forensic and Security, 11(3): 543-555. https://doi.org/10.1109/TIFS.2015.2505630
- Li CT (2016). A secure chaotic maps-based privacy-protection scheme for multi-server environments. Security and Communication Networks, 9(14): 2276–2290. https://doi.org/10.1002/sec.1487
- Lin J and Gunopulos D (2003) Dimensionality reduction by random projection and latent semantic indexing. In the Text Mining Workshop at the 3rd SIAM International Conference on Data Mining, SIAM: 1-10.
- Liu H, Sun D, Xiong K, and Qiu Z (2014). A hybrid approach to protect palmprint templates. The Scientific World Journal, 2014: Article ID 686754, 9 pages. https://doi.org/10.1155/2014/686754
- Lumini A and Nanni L (2007). An improved biohashing for human authentication. Pattern Recognition, 40(3): 1057-1065. https://doi.org/10.1016/j.patcog.2006.05.030
- Maiorana E, Campisi P, and Neri A (2011). Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system. In the IEEE International Systems Conference, IEEE, Montreal, QC, Canada: 495-500. https://doi.org/10.1109/SYSCON.2011.5929064
- Meenakshi VS and Padmavathi G (2010). Security analysis of hardened multimodal biometric fuzzy vault with combined feature points extracted from fingerprint, iris and retina for high security applications. Procedia Computer Science, 2: 195-206. https://doi.org/10.1016/j.procs.2010.11.025
- Moujahdi C, Ghouzali S, Mikram M, Rziza M, and Bebis G (2012). Spiral cube for biometric template protection. In the International Conference on Image and Signal Processing, Springer, Trois-Rivières, QC, Canada: 235-244. https://doi.org/10.1007/978-3-642-31254-0_27
- Nagar A and Jain AK (2009). On the security of non-invertible fingerprint template transforms. In the First IEEE International Workshop on Information Forensics and Security, IEEE, London, UK: 81-85. https://doi.org/10.1109/WIFS.2009.5386477
- Nagar A, Nandakumar K, and Jain AK (2010). A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 31(8): 733-741. https://doi.org/10.1016/j.patrec.2009.07.003
- Narayanan R and Subramanian K (2011). An efficient secure biometric system with non-invertible gabor-transform. International Journal of Computer Science Issues, 8(5): 170-175.
- Nasir MS and Kuppuswamy P (2013). Implementation of biometric security using hybrid combination of RSA and simple symmetric key algorithm. International Journal of Innovative Research in Computer and Communication Engineering, 1(8): 1741-1748.
- Nguyen MT, Truong TK, and Dang TK (2016). Enhance fuzzy vault security using nonrandom chaff point generator. Information Processing Letters, 116(1): 53-64. https://doi.org/10.1016/j.ipl.2015.08.012
- Nguyen TAT, Nguyen DT, and Dang TK (2015). A multi-factor biometric based remote authentication using fuzzy commitment and non-invertible transformation. In the Information and Communication Technology - EurAsia Conference, Springer, Cham, Switzerland: 77-88. https://doi.org/10.1007/978-3-319-24315-3_8
- Ouda O, Tsumura N, and Nakaguchi T (2010). Tokenless cancelable biometrics scheme for protecting iris codes. In the 20th International Conference on Pattern Recognition, IEEE, Istanbul, Turkey: 882-885. https://doi.org/10.1109/ICPR.2010.222
- Quan F, Fei S, Anni C, and Feifei Z (2008). Cracking cancelable fingerprint template of Ratha. In the International Conference on Computer Science and Computational Technology, IEEE, Shanghai, China, 2: 572-575. https://doi.org/10.1109/ISCSCT.2008.226
- Ratha N, Connell J, Bolle RM, and Chikkerur S (2006). Cancelable biometrics: A case study in fingerprints. In the 18th International Conference on Pattern Recognition, IEEE, Hong Kong, China, 4: 370-373. https://doi.org/10.1109/ICPR.2006.353
- Ratha NK, Connell JH, and Bolle RM (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3): 614-634. https://doi.org/10.1147/sj.403.0614
- Ratha NK, Connell JH, Bolle RM, and Chikkerur, S (2007). Generating cancellable fingerprints templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4): 561-572. https://doi.org/10.1109/TPAMI.2007.1004 PMid:17299214
- Rathgeb C and Uhl A (2010). Secure iris recognition based on local intensity variations. In: Campilho A and Kamel M (Eds.), Image analysis and recognition: 266-275. Springer-Verlag, Berlin Heidelberg, Germany. https://doi.org/10.1007/978-3-642-13775-4_27
- Rathgeb C, Breitinger F, Busch C, and Baier H (2014). On the application of bloom filters to iris biometrics. IET Biometrics, 3(4): 207-218. https://doi.org/10.1049/iet-bmt.2013.0049
- Rathgeb C, Uhl A, and Wild P (2012). Iris biometrics: from segmentation to template security. Springer New York, USA.
- Safie SI, Nurfazira H, Azavitra Z, Soraghan JJ, and Petropoulakis L (2014). Pulse active transform (PAT): A non-invertible transformation with application to ECG biometric authentication. In the IEEE Region 10 Conference, IEEE, Kuala Lumpur, Malaysia: 667-671. https://doi.org/10.1109/TENCONSpring.2014.6863117
- Sandhya M and Prasad MVNK (2016). Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators. Pattern Analysis and Applications: 1-16. https://doi.org/10.1007/s10044-016-0584-5
- Sandhya M, Prasad MVNK, and Chillarige RR (2016). Generating cancellable fingerprint templates based on delaunay triangle feature set construction. IET Biometrics, 5(2): 131-139. https://doi.org/10.1049/iet-bmt.2015.0034
- Savvides M, Kumar BV, and Khosla PK (2004). Cancelable biometric filters for face recognition. In the 17th International Conference on Pattern Recognition, IEEE, Cambridge, UK, 3: 922-925. https://doi.org/10.1109/ICPR.2004.1334679
- Shin WK, Lee MK, Moon D, and Moon K (2009). Dictionary attack on functional-based cancelable fingerprint templates. Electronics and Telecommunications Research Institute (ETRI Journal), 31(5): 628-630. https://doi.org/10.4218/etrij.09.0209.0137
- Sree SS and Radha N (2016). Cancellable multimodal biometric user authentication system with fuzzy vault. In the International Conference on Computer Communication and Informatics, IEEE, Coimbatore, India: 1-6. https://doi.org/10.1109/ICCCI.2016.7479931
- Teoh AB and Ngo DC (2006). Biophasor: Token supplemented cancellable biometrics. In the 9th International Conference on Control, Automation, Robotics and Vision, IEEE, Singapore, Singapore: 1-5. https://doi.org/10.1109/ICARCV.2006.345404
- Teoh ABJ and Yuang CT (2007). Cancelable biometrics realization with multispace random projections. IEEE Transactions on System, Man and Cybernetics, Part B, 37(5): 1096-1106.
- Vo TTL, Dang TK, and Küng J (2014). A hash-based index method for securing biometric fuzzy vaults. In the International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, Switzerland: 60-71. https://doi.org/10.1007/978-3-319-09770-1_6
- Wang N, Li Q, El-Latif AAA, Peng J, Yan X, and Niu X (2015). A novel protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal, Image and Video Processing, 9(1): 99-109. https://doi.org/10.1007/s11760-014-0663-2
- Wang S and Hu J (2013). A hadamard transformed-based method for the design of cancellable fingerprint templates. In the 6th International Congress on Image and Signal Processing, IEEE, Hangzhou, China, 3: 1682-1687. https://doi.org/10.1109/CISP.2013.6743947
- Wu L and Yuan S (2010). A face based fuzzy vault scheme for secure online authentication. In the Second International Conference on Data, Privacy and E-Commerce, IEEE, Buffalo, NY, USA: 45-49. https://doi.org/10.1109/ISDPE.2010.13
- Wu Z, Liang B, You L, Jian Z, and Li J (2016). High-dimensional space projection-based biometric encryption for fingerprint with fuzzy minuatia. Soft Computing, 20(12): 4907-4918. https://doi.org/10.1007/s00500-015-1778-2
- Xu W, He Q, Li Y, and Li T (2008). Cancellable voiceprint templates based on knowledge signatures. In the 2008 International Symposium on Electronic Commerce and Security, IEEE, Guangzhou, China: 412-415. https://doi.org/10.1109/ISECS.2008.100
- Yang W, Hu J, and Wang S (2013). A finger-vein based cancellable bio-cryptosystem. In the International Conference on Network and System Security, Springer, Helsinki, Finland: 784-790. https://doi.org/10.1007/978-3-642-38631-2_71
- Yang Y, Yu J, Zhang Q, and Meng F (2015). Improved hash functions for cancelable fingerprint encryption schemes. Wireless Personal Communications, 84(1): 643–669. https://doi.org/10.1007/s11277-015-2654-1
- Zhu HH, He QH, and Li YX (2012). A two-step hybrid approach for voiceprint-biometric template protection. In the International Conference on Machine Learning and Cybernetics, IEEE, Xian, China, 2: 560-565. https://doi.org/10.1109/ICMLC.2012.6358984
- Zuo J, Ratha NK, and Connell JH (2008). Cancelable iris biometric. In the 19th International Conference on Pattern Recognition, IEEE, Tampa, USA: 1-4. https://doi.org/10.1109/ICPR.2008.4761886
|