Abstract
The large-scale implementation and deployment of biometric systems demand the concentration on the security holes, by which a reliable system can loose its integrity and acceptance. Like the passwords or PIN codes, biometric systems also suffer from inherent security threats and it is important to pay attention on the security issues before deploying a biometric system. To solve these problems, this paper proposes a novel chaotic encryption method to protect and secure biometric templates. To enhance the security of the templates, this research uses two chaotic maps for the encryption/decryption process. One chaotic map generates a pseudorandom sequence, which is used as private key. While on the other hand, another chaotic map encrypts the biometric data. Experimental results show that the proposed method is secure, fast, and easy to implement for achieving the security of biometric templates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Khan, M.K., Jiashu, Z.: Optimizing WLAN Security by Biometrics. In: Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, Boca Raton (2005) (in press)
Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)
Pan, S.B., et al.: An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card. IEEE Transactions on Consumer Electronics 49(2), 453–459 (2003)
Schneier, B.: The uses and abuses of biometrics. Comm. ACM 42(8), 136 (1999)
Davida, G.I., Frankel, Y., Matt, B.J.: On Enabling Secure Applications through Online Biometric Identification. In: IEEE Symposium on Security and Privacy, pp. 148–157 (1998)
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the Relation of Error Correction and Cryptography to an Offline Biometric Based Identification Scheme. In: Proc. Workshop Coding and Cryptography, pp. 129–138 (1999)
Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption Using Image Processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)
Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption—enrollment and verification procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)
Khan, M.K., Jiashu, Z., Lei, T.: Protecting Biometric Data for Personal Identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)
Jain, A.K.: Umut Uludag: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)
Gunsel, B., Uludag, U., Tekalp, A.M.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35(12), 2739–2747 (2002)
Jain, S.: Digital Watermarking Techniques: A Case Study in Fingerprints and Faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, December 2000, pp. 139–144 (2000)
Pankanti, S., Yeung, M.M.: Verification Watermarks on Fingerprint Recognition and Retrieval. In: Proc. SPIE, vol. 3657, pp. 66–78 (1999)
Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM System Journal 40(3), 614–634 (2001)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of IEEE 92, 948–960 (2004)
Adler, A.: Vulnerabilities in Biometric Encryption Systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)
Hill, C.J.: Risk of Masquerade Arising from the Storage of Biometrics. Bachelor of Science thesis, Dept. of CS, Australian National University (2002)
Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275–289 (2002)
Derakhshani, R., Schuckers, S.A.C., Hornak, L.A., Gorman, L.O.: Determination of Vitality from a Non-invasive Biomedical Measurement for Use in Fingerprint Scanners. Pattern Recognition 36, 383–396 (2003)
Li, J., Wang, Y., Tan, T., Jain, A.K.: Live Face Detection Based on the Analysis of Fourier Spectra. In: Proc. SPIE on defense and security symposium, April 2004, vol. 5404 (2004)
Leniski, A.C., Skinner, R.C., McGann, S.F., Elliott, S.J.: Securing the Biometric Model. In: IEEE ICCST, Taiwan (October 2003)
Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)
Dawei, Z., Guanrong, C., Wenbo, L.: A Chaos-based Robust Wavelet-domain Watermarking Algorithm. Chaos, Solitons and Fractals 22, 47–54 (2004)
Zhang, J., Tian, L., Tai, H.-M.: A New Watermarking Method Based on Chaotic Maps. In: 2004 IEEE International Conference on Multimedia and Expo., ICME 2004, June 2004, vol. 2, pp. 939–942 (2004)
CASIA Iris Database (March 2005) (online), http://www.sinobiometrics.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, M.K., Zhang, J. (2005). Securing Biometric Templates for Reliable Identity Authentication. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_75
Download citation
DOI: https://doi.org/10.1007/11538356_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28227-3
Online ISBN: 978-3-540-31907-8
eBook Packages: Computer ScienceComputer Science (R0)