Abstract
One of the critical steps in designing a secure biometric system is protecting the templates of the users. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. This work propose a new cancelable biometric template using visual cryptography (VC) for preserving privacy to biometric data such as finger-vein. The finger vein template is divided into two noisy images, known as shares, using VC, where one share is stored in the system database and the other is kept with the user on a smart card. The private image can be revealed only when both shares are simultaneously available at the same time. The individual share images do not reveal the identity of the private image. We experimentally evaluate performance of the proposed scheme. The evaluation is performed based on the two metrics: (i) False Acceptance Rate (FAR), and (ii) False Rejection Rate (FRR).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security. Springer, Heidelberg (2010)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometric-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption using image processing. In: Photonics West 1998 Electronic Imaging, International Society for Optics and Photonics, pp. 178–188 (1998)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)
Li, Q., Chang, E.C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56–61. ACM (2006)
Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503–512 (2007)
Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancelable biometrics: a case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR 2006), vol. 4, pp. 370–373 (2006)
Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(3), 525–538 (2010)
Connie, T., Teoh, A., Goh, M., Ngo, D.: Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1–5 (2005)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)
Hirata, S., Takahashi, K.: Cancelable biometrics with perfect secrecy for correlation-based matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2009)
Chen, X., Bai, X., Tao, X., Pan, X.: Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering, pp. 605–612. Springer, Heidelberg (2013)
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT 1994, pp. 1–12. Springer, Heidelberg (1995)
Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)
Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)
Ross, A., Othman, A.A.: Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, p. 76,670B (2010)
Divya, C., Surya, E.: Visual cryptography using palm print based on DCT algorithm. Int. J. Emerg. Technol. Adv. Eng. 2(12), 2250–2459 (2012)
Revenkar, P., Anjum, A., Gandhare, W.: Secure iris authentication using visual cryptography. arXiv preprint arXiv:10041748 (2010)
Chin, C.S., Jin, A.T.B., Ling, D.N.C.: High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2), 169–177 (2006)
Sinduja, R., Sathiya, R., Vaithiyanathan, V.: Sheltered iris attestation by means of visual cryptography (SIA-VC). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 650–655 (2012)
Jain, A.K., Nandakumar, K., Nagar, A., et al.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(113), 1–17 (2008)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ibjaoun, S., Abou El Kalam, A., Poirriez, V., Ait Ouahman, A. (2018). Biometric Template Privacy Using Visual Cryptography. In: Abraham, A., Haqiq, A., Muda, A., Gandhi, N. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2017. Advances in Intelligent Systems and Computing, vol 735. Springer, Cham. https://doi.org/10.1007/978-3-319-76354-5_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-76354-5_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76353-8
Online ISBN: 978-3-319-76354-5
eBook Packages: EngineeringEngineering (R0)