Skip to main content

Classification Based Revocable Biometric Identity Code Generation

  • Conference paper
Biometric ID Management and Multimodal Communication (BioID 2009)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5707))

Included in the following conference series:

Abstract

The recent biometric template protection methods often propose salting or one-way transformation functions and biometric cryptosystems which are capable of key binding or key generation to provide the revocability of the templates. Moreover, the use of multiple instances of a biometric trait proposes more robust features which are then combined with the well-known template protection methods. In this study, a normal densities based linear classifier is proposed to distinguish the features associated with each user and cluster them to generate an identity code by mapping the center of the cluster to a N-dimensional quantized bin. The resulting code is converted to a bit stream by a hashing mechanism to let user revoke his biometric in case of key compromise. This method presents the advantage of representing an individual by using his plenty of features instead of a single one in a supervised manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Jour. on Adv. in. Sig. Proc., Special Issue on Biometrics (2008)

    Google Scholar 

  2. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges 92(6), 948–960 (2004)

    Google Scholar 

  3. Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random Multispace Quantization as an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs. IEEE Trans. on Pat. An. & Mach. Intelligence 28(12), 1892–1901 (2006)

    Article  Google Scholar 

  4. Kanak, A., Sog̃ukpınar, İ.: Fingerprint Hardening with Randomly Selected Chaff Minutiae. In: Kropatsch, W.G., Kampel, M., Hanbury, A. (eds.) CAIP 2007. LNCS, vol. 4673, pp. 383–390. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Sutcu, Y., Sencar, H.T., Memon, N.: A Secure Biometric Authentication Scheme Based on Robust Hashing. In: Conf. MM-SEC, New York, USA (2005)

    Google Scholar 

  6. Savvides, M., Vijaya Kumar, B.V.K., Khosla, P.K.: Cancelable Biometric Filters for Face Recognition. In: Proc. of Int. Conf. on Pattern Rec., pp. 922–925 (2004)

    Google Scholar 

  7. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Trans. on Pat. An.& Mac. Intelligence 29(4), 561–572 (2007)

    Article  Google Scholar 

  8. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Tsudik, G. (ed.) Proc. ACM Conf. Comp. & Comm. Security, pp. 28–36 (1999)

    Google Scholar 

  9. Chang, Y.J., Zhang, W., Chen, T.: Biometric-based Cryptographic Key Generation. In: Int. Conf. on Multimedia and Expo (2004)

    Google Scholar 

  10. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: theory and Practice. IEEE Trans. on Inf. Forensics & Security 2(3), 502–512 (2007)

    Article  Google Scholar 

  12. Buhan, I.R., Doumen, J.M., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy Extractors for Continous Distributions. In: Proc. of ACM Symp. on Inf., Comp. & Comm. Security, Singapore, pp. 353–355 (2007)

    Google Scholar 

  13. Fairhust, M., Hoque, S., Howells, W.G.J., Deravi, F.: Evaluating Biometric Encryption Key Generation. In: Proc. of 3rd Cost 275 Workshop Biometrics Internet, pp. 93–96 (2005)

    Google Scholar 

  14. Yamazaki, Y., Komatsu, N.: A Secure Communication System Using Biometric Identity Verification. IEICE Trans. Inf. Syst. E84-D(7), 879–884 (2001)

    Google Scholar 

  15. Sheng, W., Howells, G., Fairhust, M., Deravi, F.: Template-Free Biometric Key Generation by Means of Fuzzy Genetic Clustering. IEEE Trans. Inf. Forensics & Security 3(2), 183–191 (2008)

    Article  Google Scholar 

  16. Lee, Y.J., Park, K.R., Lee, S.J., Bae, K., Kim, J.: A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. IEEE Trans. on Sys., Man. & Cyber., Part B 38(5), 1302–1313 (2008)

    Article  Google Scholar 

  17. Willis, A.J., Myers, L.: A Cost-Effective Fingerprint Recognition System for Use with Low-Quality Prints and Damaged Fingertips. Jour. Pattern Recog. 34, 255–270 (2001)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kanak, A., Sog̃ukpınar, İ. (2009). Classification Based Revocable Biometric Identity Code Generation. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds) Biometric ID Management and Multimodal Communication. BioID 2009. Lecture Notes in Computer Science, vol 5707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04391-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04391-8_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04390-1

  • Online ISBN: 978-3-642-04391-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics