Skip to main content

Securing Biometric Templates for Reliable Identity Authentication

  • Conference paper
Book cover Advances in Intelligent Computing (ICIC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3645))

Included in the following conference series:

Abstract

The large-scale implementation and deployment of biometric systems demand the concentration on the security holes, by which a reliable system can loose its integrity and acceptance. Like the passwords or PIN codes, biometric systems also suffer from inherent security threats and it is important to pay attention on the security issues before deploying a biometric system. To solve these problems, this paper proposes a novel chaotic encryption method to protect and secure biometric templates. To enhance the security of the templates, this research uses two chaotic maps for the encryption/decryption process. One chaotic map generates a pseudorandom sequence, which is used as private key. While on the other hand, another chaotic map encrypts the biometric data. Experimental results show that the proposed method is secure, fast, and easy to implement for achieving the security of biometric templates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khan, M.K., Jiashu, Z.: Optimizing WLAN Security by Biometrics. In: Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards. CRC Press, Boca Raton (2005) (in press)

    Google Scholar 

  2. Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)

    Article  Google Scholar 

  3. Pan, S.B., et al.: An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card. IEEE Transactions on Consumer Electronics 49(2), 453–459 (2003)

    Article  Google Scholar 

  4. Schneier, B.: The uses and abuses of biometrics. Comm. ACM 42(8), 136 (1999)

    Article  Google Scholar 

  5. Davida, G.I., Frankel, Y., Matt, B.J.: On Enabling Secure Applications through Online Biometric Identification. In: IEEE Symposium on Security and Privacy, pp. 148–157 (1998)

    Google Scholar 

  6. Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the Relation of Error Correction and Cryptography to an Offline Biometric Based Identification Scheme. In: Proc. Workshop Coding and Cryptography, pp. 129–138 (1999)

    Google Scholar 

  7. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption Using Image Processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)

    Google Scholar 

  8. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric encryption—enrollment and verification procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pp. 24–35 (1998)

    Google Scholar 

  9. Khan, M.K., Jiashu, Z., Lei, T.: Protecting Biometric Data for Personal Identification. In: Li, S.Z., Lai, J.-H., Tan, T., Feng, G.-C., Wang, Y. (eds.) SINOBIOMETRICS 2004. LNCS, vol. 3338, pp. 629–638. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Jain, A.K.: Umut Uludag: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  11. Gunsel, B., Uludag, U., Tekalp, A.M.: Robust Watermarking of Fingerprint Images. Pattern Recognition 35(12), 2739–2747 (2002)

    Article  MATH  Google Scholar 

  12. Jain, S.: Digital Watermarking Techniques: A Case Study in Fingerprints and Faces. In: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, December 2000, pp. 139–144 (2000)

    Google Scholar 

  13. Pankanti, S., Yeung, M.M.: Verification Watermarks on Fingerprint Recognition and Retrieval. In: Proc. SPIE, vol. 3657, pp. 66–78 (1999)

    Google Scholar 

  14. Ratha, N., Connell, J., Bolle, R.: Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM System Journal 40(3), 614–634 (2001)

    Article  Google Scholar 

  15. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. Proceedings of IEEE 92, 948–960 (2004)

    Article  Google Scholar 

  16. Adler, A.: Vulnerabilities in Biometric Encryption Systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Hill, C.J.: Risk of Masquerade Arising from the Storage of Biometrics. Bachelor of Science thesis, Dept. of CS, Australian National University (2002)

    Google Scholar 

  18. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of Artificial Gummy Fingers on Fingerprint Systems. In: Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275–289 (2002)

    Google Scholar 

  19. Derakhshani, R., Schuckers, S.A.C., Hornak, L.A., Gorman, L.O.: Determination of Vitality from a Non-invasive Biomedical Measurement for Use in Fingerprint Scanners. Pattern Recognition 36, 383–396 (2003)

    Article  Google Scholar 

  20. Li, J., Wang, Y., Tan, T., Jain, A.K.: Live Face Detection Based on the Analysis of Fourier Spectra. In: Proc. SPIE on defense and security symposium, April 2004, vol. 5404 (2004)

    Google Scholar 

  21. Leniski, A.C., Skinner, R.C., McGann, S.F., Elliott, S.J.: Securing the Biometric Model. In: IEEE ICCST, Taiwan (October 2003)

    Google Scholar 

  22. Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 15, 1148–1161 (1993)

    Article  Google Scholar 

  23. Dawei, Z., Guanrong, C., Wenbo, L.: A Chaos-based Robust Wavelet-domain Watermarking Algorithm. Chaos, Solitons and Fractals 22, 47–54 (2004)

    Article  MATH  Google Scholar 

  24. Zhang, J., Tian, L., Tai, H.-M.: A New Watermarking Method Based on Chaotic Maps. In: 2004 IEEE International Conference on Multimedia and Expo., ICME 2004, June 2004, vol. 2, pp. 939–942 (2004)

    Google Scholar 

  25. CASIA Iris Database (March 2005) (online), http://www.sinobiometrics.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, M.K., Zhang, J. (2005). Securing Biometric Templates for Reliable Identity Authentication. In: Huang, DS., Zhang, XP., Huang, GB. (eds) Advances in Intelligent Computing. ICIC 2005. Lecture Notes in Computer Science, vol 3645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11538356_75

Download citation

  • DOI: https://doi.org/10.1007/11538356_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28227-3

  • Online ISBN: 978-3-540-31907-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics