Skip to main content
Log in

Fractional biometrics: safeguarding privacy in biometric applications

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

This paper presents a biometric system solution that “masks” a fraction of a person’s biometric image before submission, to reduce the possibility of forgery and collusion. A prototype system was constructed for the fingerprint biometric and tested in three security scenarios. It is shown that implementing the fractional biometric system does not significantly affect accuracy. We provide theoretical security analysis on the guessing entropy of a Fractional Template and the security against collusion. We demonstrate that by masking above 50% of the biometric features, we achieve a sufficient mix of security, robustness and accuracy to warrant further study. When 75% of the features are masked, we found that the theoretical guessing entropy is 42 bits, and we found that, on average, 5 authenticators had to collude before the system would be compromised.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Arakala, A., Horadam, K.J., Boztas, S.: Practical considerations for secure minutiae based templates. In: Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2008, pp. 53–58. IEEE Press, Tampa, FL, USA, (2008)

  2. Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee, S.W., Li, S. (eds.) Proceedings of the Second International Conference in Biometrics, pp. 760–769. Springer, Seoul, South Korea, (2009)

    Google Scholar 

  3. Bates, B.: A Guide to Physical Examination and History Taking, 5th edn. pp. 181–215. Lippincott, Philadelphia (1991) Also in interview with F.P. Nasrallah and A.S. DiDo, Washington, D.C., April 4, 1994, as referenced in [30]

  4. Bayly, D.: Fractional Biometrics. Master’s Thesis, RMIT University, Melbourne, Australia (2004)

  5. Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint-database generation. In: Proceedings of the 16th International Conference on Pattern Recognition (ICPR2002), 3, pp. 744–747, Québec City, Canada (2002)

  6. Cavoukian A., Stoianov A.: Biometric encryption. Biometric Technol. Today 15(3), 11 (2007)

    Article  Google Scholar 

  7. Corcoran, D., Sims, D., Hillhouse, B.: Smart cards and biometrics: the cool way to make secure transactions. Linux J. 1999(59,7) (1999)

  8. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235. Available: http://eprint.iacr.org (2003)

  9. Green R., Young R.: Fingerprint asymmetry in male and female transsexuals. Personality and Individual Differences 29, pp. 933–942. Elsevier, Oxford (2000)

    Google Scholar 

  10. Hall, J.A., Kimura, D.: Dermatoglyphic asymmetry and sexual orientation in men. Behavioral neuroscience 108(6), pp. 1203–6. American Psychological Association, Washington, DC, USA (1994)

    Google Scholar 

  11. Jain, A.K., Flynn, P., Ross, A.A. (eds.): Handbook of Biometrics. Springer, New York (2008)

    Google Scholar 

  12. Jeffers, J., Arakala, A.: Fingerprint alignment for a minutiae-based fuzzy vault. In: Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2007, pp. 1–6. IEEE Press, Baltimore, Maryland, USA, (2007)

  13. Jeffers, J., Arakala, A.: Minutiae-based Structures for a Fuzzy Vault, Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2006, pp. 1–6. IEEE Press, Baltimore, Maryland, USA, (2006)

  14. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE ISIT, p. 408. IEEE Press, Lausanne, Switzerland (2002)

  15. Juels, A., Wattenberg., M.: A fuzzy commitment scheme. In: Tsudik, G. (ed.) Proceedings of the Sixth ACM Conference on Computer and Communications Security, pp. 28–36, ACM Press, New york (1999)

    Chapter  Google Scholar 

  16. Kindt, E., Breebaart, J., Busch, C., Grave, J.: A reference architecture for biometric template protection based on pseudo identities. In: Bromme, A.B. (ed.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures 2008, pp. 25–37. GI-LNI, Darmstadt, Germany, 11–12 September (2008)

  17. Kovács-Vajna Z.M.: A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans. Pattern Anal. Mach. Intell. 22(11), 1266–1276 (2000)

    Article  Google Scholar 

  18. Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of AVBPA 2003, 2688 pp. 393-402. LNCS, Springer, Berlin (2003)

  19. Maltoni D., Maio D., Jain A., Prabhakar S.: Handbook of Fingerprint Recognition. Springer, New York (2003)

    MATH  Google Scholar 

  20. Mital, D.P., Teoh, E.K.: An automated matching technique for fingerprint identification. In: Jain, L.C. (Ed.) Proceedings of the First International Conference on Knowledge-Based Intelligent Electronic Systems, pp. 142–147. IEEE Computer Society, Adelaide, Australia (1997)

  21. Nandakumar K., Jain A.K., Pankanti S.: Fingerprint-based Fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)

    Article  Google Scholar 

  22. Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management—A Consolidated Proposal for Terminology, Version 0.31. “http://dud.inf.tu-dresden.de/Anon_Terminology.shtml”, Last Accessed 4 March (2008)

  23. Ratha, N.K.: Cancelable biometrics. In: Proceedings of the Biometric Consortium Conference 2000, pp. 501–526. Gaithersburg, Maryland, USA (2000)

  24. Ratha N.K., Connell J.H., Bolle R.M.: Enhancing security and privacy in biometrics based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  25. Ratha N.K., Connell J.H., Bolle R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  26. Ross A., Shah J., Jain A.K.: From template TO image: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544–560 (2007)

    Article  Google Scholar 

  27. Teoh A.B.J., Kuan Y.W., Lee S.: Cancellable biometrics and annotations on BioHash. Pattern Recognit. 41(6), 2034–2044 (2008)

    Article  MATH  Google Scholar 

  28. TrUsted Revocable Biometric IdeNtitiEs (TURBINE) http://www.turbine-project.org, Accessed on: 16 March (2009)

  29. Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Proceedings of the 8th ECCV, 3087, pp. 158–170, LNCS, Springer, Prague, Czech Republic (2004)

  30. Woodward J.D.: Biometrics: privacy’s foe or privacy’s friend? Proc. IEEE 85(9), 1480–1492 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kathy Horadam.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bayly, D., Castro, M., Arakala, A. et al. Fractional biometrics: safeguarding privacy in biometric applications. Int. J. Inf. Secur. 9, 69–82 (2010). https://doi.org/10.1007/s10207-009-0096-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-009-0096-z

Keywords

Navigation