Abstract
This paper presents a biometric system solution that “masks” a fraction of a person’s biometric image before submission, to reduce the possibility of forgery and collusion. A prototype system was constructed for the fingerprint biometric and tested in three security scenarios. It is shown that implementing the fractional biometric system does not significantly affect accuracy. We provide theoretical security analysis on the guessing entropy of a Fractional Template and the security against collusion. We demonstrate that by masking above 50% of the biometric features, we achieve a sufficient mix of security, robustness and accuracy to warrant further study. When 75% of the features are masked, we found that the theoretical guessing entropy is 42 bits, and we found that, on average, 5 authenticators had to collude before the system would be compromised.
Similar content being viewed by others
References
Arakala, A., Horadam, K.J., Boztas, S.: Practical considerations for secure minutiae based templates. In: Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2008, pp. 53–58. IEEE Press, Tampa, FL, USA, (2008)
Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee, S.W., Li, S. (eds.) Proceedings of the Second International Conference in Biometrics, pp. 760–769. Springer, Seoul, South Korea, (2009)
Bates, B.: A Guide to Physical Examination and History Taking, 5th edn. pp. 181–215. Lippincott, Philadelphia (1991) Also in interview with F.P. Nasrallah and A.S. DiDo, Washington, D.C., April 4, 1994, as referenced in [30]
Bayly, D.: Fractional Biometrics. Master’s Thesis, RMIT University, Melbourne, Australia (2004)
Cappelli, R., Maio, D., Maltoni, D.: Synthetic fingerprint-database generation. In: Proceedings of the 16th International Conference on Pattern Recognition (ICPR2002), 3, pp. 744–747, Québec City, Canada (2002)
Cavoukian A., Stoianov A.: Biometric encryption. Biometric Technol. Today 15(3), 11 (2007)
Corcoran, D., Sims, D., Hillhouse, B.: Smart cards and biometrics: the cool way to make secure transactions. Linux J. 1999(59,7) (1999)
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Cryptology ePrint Archive, Report 2003/235. Available: http://eprint.iacr.org (2003)
Green R., Young R.: Fingerprint asymmetry in male and female transsexuals. Personality and Individual Differences 29, pp. 933–942. Elsevier, Oxford (2000)
Hall, J.A., Kimura, D.: Dermatoglyphic asymmetry and sexual orientation in men. Behavioral neuroscience 108(6), pp. 1203–6. American Psychological Association, Washington, DC, USA (1994)
Jain, A.K., Flynn, P., Ross, A.A. (eds.): Handbook of Biometrics. Springer, New York (2008)
Jeffers, J., Arakala, A.: Fingerprint alignment for a minutiae-based fuzzy vault. In: Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2007, pp. 1–6. IEEE Press, Baltimore, Maryland, USA, (2007)
Jeffers, J., Arakala, A.: Minutiae-based Structures for a Fuzzy Vault, Proceedings of the Biometrics Consortium Conference, Biometrics Symposium 2006, pp. 1–6. IEEE Press, Baltimore, Maryland, USA, (2006)
Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE ISIT, p. 408. IEEE Press, Lausanne, Switzerland (2002)
Juels, A., Wattenberg., M.: A fuzzy commitment scheme. In: Tsudik, G. (ed.) Proceedings of the Sixth ACM Conference on Computer and Communications Security, pp. 28–36, ACM Press, New york (1999)
Kindt, E., Breebaart, J., Busch, C., Grave, J.: A reference architecture for biometric template protection based on pseudo identities. In: Bromme, A.B. (ed.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures 2008, pp. 25–37. GI-LNI, Darmstadt, Germany, 11–12 September (2008)
Kovács-Vajna Z.M.: A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans. Pattern Anal. Mach. Intell. 22(11), 1266–1276 (2000)
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of AVBPA 2003, 2688 pp. 393-402. LNCS, Springer, Berlin (2003)
Maltoni D., Maio D., Jain A., Prabhakar S.: Handbook of Fingerprint Recognition. Springer, New York (2003)
Mital, D.P., Teoh, E.K.: An automated matching technique for fingerprint identification. In: Jain, L.C. (Ed.) Proceedings of the First International Conference on Knowledge-Based Intelligent Electronic Systems, pp. 142–147. IEEE Computer Society, Adelaide, Australia (1997)
Nandakumar K., Jain A.K., Pankanti S.: Fingerprint-based Fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)
Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management—A Consolidated Proposal for Terminology, Version 0.31. “http://dud.inf.tu-dresden.de/Anon_Terminology.shtml”, Last Accessed 4 March (2008)
Ratha, N.K.: Cancelable biometrics. In: Proceedings of the Biometric Consortium Conference 2000, pp. 501–526. Gaithersburg, Maryland, USA (2000)
Ratha N.K., Connell J.H., Bolle R.M.: Enhancing security and privacy in biometrics based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Ratha N.K., Connell J.H., Bolle R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)
Ross A., Shah J., Jain A.K.: From template TO image: reconstructing fingerprints from minutiae points. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 544–560 (2007)
Teoh A.B.J., Kuan Y.W., Lee S.: Cancellable biometrics and annotations on BioHash. Pattern Recognit. 41(6), 2034–2044 (2008)
TrUsted Revocable Biometric IdeNtitiEs (TURBINE) http://www.turbine-project.org, Accessed on: 16 March (2009)
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Proceedings of the 8th ECCV, 3087, pp. 158–170, LNCS, Springer, Prague, Czech Republic (2004)
Woodward J.D.: Biometrics: privacy’s foe or privacy’s friend? Proc. IEEE 85(9), 1480–1492 (1997)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bayly, D., Castro, M., Arakala, A. et al. Fractional biometrics: safeguarding privacy in biometric applications. Int. J. Inf. Secur. 9, 69–82 (2010). https://doi.org/10.1007/s10207-009-0096-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-009-0096-z