Skip to main content
Log in

Cancelable Biometrics: a comprehensive survey

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Biometric recognition is a challenging research field but suffers from privacy and security concerns. To address this concern, Cancelable Biometrics is suggested in literature in which a Biometric image of a sample is distorted or transformed in such a manner that it becomes difficult to obtain the original Biometric image from the distorted one. Another important characteristic of Cancelable Biometrics is that it can be reissued if compromised. In this research paper, we present a comprehensive survey of more than 120 techniques suggested by various researchers from time to time for Cancelable Biometrics and a novel taxonomy for the same is developed. Further, various performance measures used in Cancelable Biometrics are reviewed and their mathematical formulations are given. Cancelable Biometrics also suffer from various security attacks as given in literature. A review of these security attacks is carried out. We have also performed a review of databases used in literature for nine different Cancelable Biometrics viz. Face, Iris, Speech, Fingerprint, Signature, Palmprint, ECG, Palmvein and Fingervein. Lastly, we have also given future research directions in this field. This study shall be useful for the researchers and practitioners working in this fascinating research area.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  • Abid M, Kanade S, Petrovska-Delacrétaz D, Dorizzi B, Afifi H (2010) Iris based authentication mechanism for e-passports. In: 2nd International workshop on security and communication networks (IWSCN). IEEE, pp 1–5

  • Aggarwal G, Ratha NK, Connell JH, Bolle RM (2008) Physics-based revocable face recognition. In: IEEE international conference on acoustics, speech and signal processing. IEEE, pp 5232–5235

  • Ahmad T, Hu J (2010) Generating Cancelable Biometric templates using a projection line. In: 11th International conference on control automation robotics and vision. IEEE, pp 7–12

  • Ali MA, Tahir NM (2018) Cancelable Biometrics technique for iris recognition. In: IEEE symposium on computer applications & industrial electronics (ISCAIE). IEEE, pp 434–437

  • Andalib AS, Abdulla-Al-Shami M (2013) A novel key generation scheme for Biometric cryptosystems using fingerprint minutiae. In: 2nd International conference on informatics, electronics and vision (ICIEV). IEEE, pp 1–6

  • Arjona R, Prada-Delgad MA, Baturone I, Ross A (2018) Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. In: International conference on Biometrics (ICB). IEEE, pp 54–60

  • Barbier M, Le JM, Rosenberge C (2015) Image watermarking with biometric data for copyright protection. In: 10th International conference on availability, reliability and security (ARES). IEEE, pp 618–625

  • Batool R, Naveed G, Khan A (2015) Biometric authentication in cloud computing. Int J Comput Appl 129(11):6–9

    Google Scholar 

  • Belguechi R, Cherrier E, Rosenberger C (2011a) Evaluation of Cancelable Biometric systems: application to finger-knuckle-prints. In: International conference on hand-based biometrics (ICHB). IEEE, pp 1–6

  • Belguechi R, Le-Goff T, Cherrier E, Rosenberger C (2011b) Study of the robustness of a Cancelable Biometric system. In: Conference on network and information systems security. IEEE, pp 1–7

  • Belhadj F, Akrouf S (2015) Secure fingerprint-based authentication and non-repudiation services for mobile learning systems. In: International conference on interactive mobile communication technologies and learning (IMCL). IEEE, pp 200–204

  • Bhatega A, Sharma K (2014) Secure cancelable fingerprint key generation. In: Power India international conference (PIICON) (no. 6). IEEE, pp 1–4

  • Bissessar D, Gorodnichy DO, Stoianov A, Thieme M (2012) Assessment of privacy enhancing technologies for biometrics. In: Symposium on computational intelligence for security and defence applications. IEEE, pp 1–9

  • Bolle RM, Connell JH, Ratha NK (2002) Biometric perils and patches. Pattern Recognit 35(12):2727–2738

    Article  MATH  Google Scholar 

  • Bommagani AS, Valenti MC, Ross A (2014) A framework for secure cloud-empowered mobile Biometrics. In: Military communications conference (MILCOM). IEEE, pp 255–261

  • Boult T (2006) Robust distance measures for face-recognition supporting revocable biometric tokens. In: International conference on automatic face and gesture recognition (FGR06), vol 7. IEEE, pp 560–566

  • Boult TE, Scheirer WJ, Woodworth R (2007) Revocable fingerprint biotokens: accuracy and security analysis. In: Conference on computer vision and pattern recognition. IEEE, pp 1–8

  • Bringer J, Chabanne H, Kindarji B (2009) Anonymous identification with cancelable biometrics. In: Proceedings of international symposium on image and signal processing and analysis, vol 6. IEEE, pp 494–499

  • Bringer J, Chabanne H, Morel C (2014) Shuffling is not sufficient: security analysis of cancelable iris codes based on a secret permutation. In: International joint conference on biometrics (IJCB). IEEE, pp 1–8

  • Camenisch J, Stadler M (1997) Efficient group signature schemes for large groups. In: Annual international cryptology conference. Springer, Berlin, pp 410–424

  • Chandra E, Kanagalakshmi K (2011) Cancelable Biometric template generation and protection schemes: a review. In: International conference on electronics computer technology, vol 3(no. 5). IEEE, pp 15–20

  • Chen X, Zheng L, Liu Z, Zhang J (2014) Privacy-preserving Biometrics using matrix random low-rank approximation approach. In: International symposium on biometrics and security technologies (ISBAST). IEEE, pp 6–12

  • Chen PT, Wu SC, Hsieh JH (2017) A Cancelable Biometric scheme based on multi-lead ECGs. In: Annual international conference of the engineering in medicine and biology society (EMBC) vol 39. IEEE, pp 3497–3500

  • Chikkerur S, Ratha NK, Connell JH, Bolle RM (2008) Generating registration-free cancelable fingerprint templates. In: IEEE international conference on biometrics: theory, applications and systems, vol 2. IEEE, pp 1–6

  • Chin YJ, Ong TS, Teoh AB, Goh MK (2011) Multimodal biometrics based bit extraction method for template security. In: Conference on industrial electronics and applications, vol 6. IEEE, pp 1971–1976

  • Choudhury B, Then P, Raman V, Issac B, Haldar MK (2016) Cancelable iris Biometrics based on data hiding schemes. In: IEEE student conference on research and development (SCOReD). IEEE, pp 1–6

  • Connie T, Teoh A, Goh M, Ngo D (2005) Palmhashing: a novel approach for Cancelable Biometrics. Inf Process Lett 93(1):1–5

    Article  MathSciNet  Google Scholar 

  • Deshmukh M, Balwant MK (2017) Generating Cancelable Palmprint templates using local binary pattern and random projection. In: International conference on signal-image technology & internet-based systems (SITIS), vol 13. IEEE, pp 203–209

  • Dey N, Nandi B, Dey M, Biswas D, Das A, Chaudhuri SS (2013) BioHash code generation from electrocardiogram features. In: Advance computing conference (IACC), vol 3. IEEE, pp 732–735

  • Drozdowski P, Garg S, Rathgeb C, Gomez-Barrcro M, Chang D, Busch C (2018) Privacy-preserving indexing of Iris-codes with cancelable bloom filter-based search structures. In: European signal processing conference (EUSIPCO), vol 26. IEEE, pp 2360–2364

  • Dwivedi R, Dey S (2015) Cancelable iris template generation using look-up table mapping. In: International conference on signal processing and integrated networks (SPIN), vol 2. IEEE, pp 785–790

  • Egner A, Soceanu A, Moldoveanu F (2012) Managing secure authentication for standard mobile medical networks. In: Symposium on computers and communications (ISCC). IEEE, pp 390–393

  • Farooq F, Bolle RM, Jea TY, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: Conference on computer vision and pattern recognition. IEEE, pp 1–7

  • Ghany KK, Hefny HA, Hassanien AE, Ghali NI (2012) A hybrid approach for biometric template security. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012). IEEE Computer Society, pp 941–942

  • Hämmerle-Uhl J, Pschernig E, Uhl A (2013) Cancelable iris-templates using key-dependent wavelet transforms. In: International conference on biometrics (ICB). IEEE, pp 1–8

  • Hirata S, Takahashi K (2009) Cancelable biometrics with perfect secrecy for correlation-based matching. In: International conference on biometrics. Springer, Berlin, pp 868–878

  • Issac CM, Kanaga EG (2017) Probing on classification algorithms and features of brain signals suitable for Cancelable Biometric authentication. In: IEEE international conference on computational intelligence and computing research (ICCIC). IEEE, pp 1–4

  • Izu T, Sakemi Y, Takenaka M, Torii N (2014) A spoofing attack against a Cancelable Biometric authentication scheme. In: International conference on advanced information networking and applications (AINA), vol 28. IEEE, pp 234–239

  • Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):1–47

  • Jain AK, Flynn P, Ross AA (2007) Handbook of biometrics. Springer, Berlin

    Google Scholar 

  • Jenisch S, Uhl A (2011) Security analysis of a cancelable iris recognition system based on block remapping. In: IEEE international conference on image processing, vol 18. IEEE, pp 3213–3216

  • Jeong M, Lee C, Kim J, Choi JY, Toh KA, Kim J (2006) Changeable biometrics for appearance based face recognition. In: biometrics symposium: special session on research at the biometric consortium conference. IEEE, pp 1–5

  • Jiménez A, Raj B (2017) A two factor transformation for speaker verification through l comparison. In: IEEE workshop on information forensics and security (WIFS). IEEE, pp 1–6

  • Jin Z, Hwang JY, Lai YL, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled Cancelable Biometrics: index-of-max hashing. IEEE Trans Inf Forensics Secur 13(2):393–407

    Article  Google Scholar 

  • Kanade S, Petrovska-Delacrétaz D, Dorizzi B (2009) Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data. In: IEEE conference on computer vision and pattern recognition. IEEE, pp 120–127

  • Kanade S, Petrovska-Delacrétaz D, Dorizzi B (2010) Generating and sharing biometrics based session keys for secure cryptographic applications. In: Fourth IEEE international conference on biometrics: theory, applications and systems (BTAS). IEEE, pp 1–7

  • Karabat C, Erdogan H (2009a) A Cancelable Biometric hashing for secure biometric verification system. In: Fifth international conference on intelligent information hiding and multimedia signal processing. IEEE, pp 1082–1085

  • Karabat C, Erdogan H (2009b) Trustworthy biometric hashing method. IEEE Signal Process Commun Appl Conf 17:65–68

    Google Scholar 

  • Kaur H, Khanna P (2015) Gaussian random projection based non-invertible Cancelable Biometric templates. Procedia Comput Sci 54:661–670

    Article  Google Scholar 

  • Kaur H, Khanna P (2016) Biometric template protection using Cancelable Biometrics and visual cryptography techniques. Multimed Tools Appl 75(23):16333–16361

    Article  Google Scholar 

  • Kaur H, Khanna P (2017a) Cancelable features using log-Gabor filters for biometric authentication. Multimed Tools Appl 76(4):4673–4694

    Article  Google Scholar 

  • Kaur H, Khanna P (2017b) Non-invertible biometric encryption to generate Cancelable Biometric templates. In: Proceedings of the World Congress on Engineering and Computer Science, vol 1, pp 1–4

  • Kaur H, Khanna P (2019) Random distance method for generating unimodal and multimodal Cancelable Biometric features. IEEE Trans Inf Forensics Secur 14(3):709–719

    Article  Google Scholar 

  • Kelkboom EJ, Zhou X, Breebaart J, Veldhuis RN, Busch C (2009) Multi-algorithm fusion with template protection. In: International conference on biometrics: theory, applications, and systems, vol 3. IEEE, pp 1–8

  • Kelkboom EJ, Molina GG, Breebaart J, Veldhuis RN, Kevenaar TA, Jonker W (2010) Binary biometrics: an analytic framework to estimate the performance curves under Gaussian assumption. IEEE Trans Syst Man Cybern A Syst Hum 40(3):555–571

    Article  Google Scholar 

  • Khodabacchus MY, Soyjaudah KMS, Ramsawok G (2016) Fingerprint code authentication protocol on cloud. In: International conference on emerging technologies and innovative business practices for the transformation of societies (EmergiTech). IEEE, pp 162–166

  • Khodabacchus MY, Soyjaudah KMS, Ramsawock G (2017) Secured SAML cloud authentication using fingerprint. In: International conference on next generation computing applications (NextComp), vol 1. IEEE, pp 151–156

  • Kim J, Teoh AB (2018) One-factor Cancellable Biometrics based on indexing-first-order hashing for fingerprint authentication. In: International conference on pattern recognition (ICPR), vol 24. IEEE, pp 3108–3113

  • Kim Y, Toh KA (2007) A method to enhance face biometric security. In: International conference on biometrics: theory, applications, and systems, vol 1. IEEE, pp 1–6

  • Kim Y, Toh KA (2008) Sparse random projection for efficient cancelable face feature extraction. In: Conference on industrial electronics and applications, vol 3. IEEE, pp 2139–2144

  • Kim H, Nguyen MP, Chun SY (2017) Cancelable ECG Biometrics using GLRT and performance improvement using guided filter with irreversible guide signal. In: Annual international conference of engineering in medicine and biology society (EMBC), vol 39. IEEE, pp 454–457

  • Kong A, Cheung KH, Zhang D, Kamel M, You J (2006) An analysis of BioHashing and its variants. Pattern Recognit 39(7):1359–1368

    Article  MATH  Google Scholar 

  • Kumar N, Singh S, Kumar A (2018) Random permutation principal component analysis for Cancelable Biometric recognition. Appl Intell 48(9):2824–2836

    Article  Google Scholar 

  • Lalithamani N, Soman KP (2009a) An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics. In: International conference on advances in recent technologies in communication and computing. IEEE, pp 47–52

  • Lalithamani N, Soman KP (2009b) Towards generating irrevocable key for cryptography from cancelable fingerprints. In: International conference on computer science and information technology, vol 2. IEEE, pp 563–568

  • Lee C, Choi JY, Toh KA, Lee S, Kim J (2007) Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans Syst Man Cybern B Cybern 37(4):980–992

    Article  Google Scholar 

  • Lee DH, Lee SH, Cho NI (2018) Cancelable Biometrics using noise embedding. In: International conference on pattern recognition (ICPR), vol 24. IEEE, pp 3390–3395

  • Leng L, Zhang J (2012) Palmhash code for Palmprint verification and protection. In: IEEE Canadian conference on electrical & computer engineering (CCECE), vol 25. IEEE, pp 1–4

  • Leng L, Zhang JS, Khan MK, Bi X, Ji M (2010) Cancelable palmcode generated from randomized gabor filters for palmprint protection. In: International conference of image and vision computing New Zealand, vol 25. IEEE, pp 1–6

  • Leng L, Zhang S, Bi X, Khan M K (2012) Two-dimensional cancelable Biometric scheme. In: International conference on wavelet analysis and pattern recognition (ICWAPR). IEEE, pp 164–169

  • Leng L, Li M, Teoh ABJ (2013a) Conjugate 2dpalmhash code for secure palm-print-vein verification. In: International congress on image and signal processing (CISP), vol 6(no 3). IEEE, pp 1705–1710

  • Leng L, Teoh ABJ, Li M, Khan MK (2013b) Orientation range for transposition according to the correlation analysis of 2DPalmHash Code. In: International symposium on biometrics and security technologies (ISBAST). IEEE, pp 230–234

  • Leng L, Teoh AB, Li M, Khan MK (2014a) Analysis of correlation of 2DPalmHash code and orienta tion range suitable for transposition. Neurocomputing 131:377–387

    Article  Google Scholar 

  • Leng L, Li M, Teoh ABJ (2014b) Matching reduction of 2DPalmHash code. In: International symposium on biometrics and security technologies (ISBAST). IEEE, pp 124–128

  • Lingli Z, Jianghuang L (2010) Security algorithm of face recognition based on binary pattern and random projection. In: Cognitive informatics (ICCI), vol 9. IEEE, pp 733–738

  • Lumini A, Nanni L (2007) An improved biohashing for human authentication. Pattern Recognit 40(3):1057–1065

    Article  MATH  Google Scholar 

  • Maiorana E, Campisi P, Ortega-Garcia J, Neri A (2008) Cancelable Biometrics for HMM-based signature recognition. In: International conference on biometrics: theory, applications and systems, vol 2. IEEE, pp 1–6

  • Maiorana E, Campisi P, Neri A (2009) Template protection for dynamic time warping based biometric signature authentication. In: International conference on digital signal processing, vol 16. IEEE, pp 1–6

  • Maiorana E, Campisi P, Fierrez J, Ortega J, Neri A (2010) Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Trans Syst Man Cybern 40(3):525–538

    Article  Google Scholar 

  • Maiorana E, Campisi P, Neri A (2011) Bioconvolving: cancelable templates for a multi-biometrics signature recognition system. In: IEEE international systems conference. IEEE, pp 495–500

  • Meetei TC, Begum SA (2016) A variant of cancelable iris biometric based on BioHashing. In: International conference on signal and information processing (IConSIP). IEEE, pp 1–5

  • Mtibaa A, Petrovska-Delacretaz D, Hamida AB (2018) Cancelable speaker verification system based on binary Gaussian mixtures. In: International conference on advanced technologies for signal and image processing (ATSIP), vol 4. IEEE, pp 1–6

  • Nazari S, Moin MS, Kanan HR (2014) Cancelable face using chaos permutation. In: International symposium on telecommunications (IST), vol 7. IEEE, pp 925–928

  • Nishiuchi N, Soya H (2011) Cancelable Biometric identification by combining biological data with artifacts. In: International conference on biometrics and Kansei engineering (ICBAKE), pp 61–64

  • Oh K, Toh KA (2012) Extracting sclera features for cancelable identity verification. In: International conference on Biometrics (ICB), vol 5. IEEE, pp 245–250

  • Othman A, Ross A (2013) On mixing fingerprints. IEEE Trans Inf Forensics Secur 8(1):260–267

    Article  Google Scholar 

  • Ouda O, Tusmura N, Nakaguchi T (2011) Securing bioencoded iris codes against correlation attacks. In: IEEE international conference on communications (ICC). IEEE, pp 1–5

  • Patel VM, Chellappa R, Tistarelli M (2010) Sparse representations and random projections for robust and cancelable biometrics. In: International conference on control automation robotics and vision, vol 11. IEEE, pp 1–6

  • Patel VM, Ratha NK, Chellappa R (2015) Cancelable Biometrics: a review. IEEE Signal Process Mag 32(5):54–65

    Article  Google Scholar 

  • Paul PP, Gavrilova M (2012) Multimodal cancelable Biometrics. In: International conference on cognitive informatics & cognitive computing (ICCI* CC), vol 11. IEEE, pp 43–49

  • Paul PP, Gavrilova M (2013a) Cancelable fusion using social network analysis. In: Proceedings of the IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 1469–1471

  • Paul PP, Gavrilova M (2013b) Novel multimodal template generation algorithm. In: IEEE international conference on cognitive informatics & cognitive computing (ICCI* CC), vol 12. IEEE, pp 76–82

  • Paul PP, Gavrilova M (2014a) Multimodal Biometrics using cancelable feature fusion. In: International conference on cyberworlds (CW). IEEE, pp 279–284

  • Paul PP, Gavrilova M (2014b) Rank level fusion of multimodal Cancelable Biometrics. In: IEEE international conference on cognitive informatics & cognitive computing (ICCI* CC), vol 13. IEEE, pp 80–87

  • Paul PP, Gavrilova M, Klimenko S (2013) Situation awareness through multimodal Biometric template security in real-time environments. In: International conference on cyberworlds (CW). IEEE, pp 82–88

  • Pillai JK, Patel VM, Chellappa R, Ratha NK (2010) Sectored random projections for cancelable iris biometrics. In: IEEE international conference on acoustics, speech and signal processing, pp 1838–1841

  • Pillai JK, Patel VM, Chellappa R, Ratha NK (2011) Secure and robust iris recognition using random projections and sparse representations. IEEE Trans Pattern Anal Mach Intell 33(9):1877–1893

    Article  Google Scholar 

  • Popa D, Simion E (2017) Enhancing security by combining Biometrics and cryptography. In: International conference on electronics, computers and artificial intelligence (ECAI), vol 9. IEEE, pp 1–7

  • Prasad MV, Jyothi A, Lasya K (2017) Cancelable iris template generation using modulo operation. In: International conference on signal-image technology & internet-based systems (SITIS), vol 13. IEEE, pp 210–217

  • Prasanalakshmi B, Kannammal A (2010) Secure cryptosystem from palm vein Biometrics in smart card. In: Computer and automation engineering (ICCAE), vol 2(no 1). IEEE, pp 653–657

  • Pravinchandra MM, Diwanji HM, Shah JS, Kotak H(2012) Performace analysis of encryption and decryption using genetic based cancelable non-invertible fingerprint based key in MANET. In: International conference on communication systems and network technologies (CSNT). IEEE, pp 357–361

  • Punithavathi P, Geetha S (2016) Dynamic sectored random projection for cancelable iris template. In: International conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 711–715

  • Punithavathi P, Geetha S, Shanmugam S (2017) Cloud-based framework for cancelable biometric system. In: IEEE international conference on cloud computing in emerging markets (CCEM). IEEE, pp 35–38

  • Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of Ratha. In: International symposium on computer science and computational technology, vol 2. IEEE, pp 572–575

  • Rachapalli DR, Kalluri HK (2017) A survey on Biometric template protection using cancelable Biometric scheme. In: International conference on electrical, computer and communication technologies (ICECCT), vol 2. IEEE, pp 1–4

  • Raja KB, Raghavendra R, Busch C (2018a) Manifold-structure preserving biometric templates—a preliminary study on fully cancelable smartphone biometric templates. In: IEEE international conference on multimedia & expo workshops (ICMEW). IEEE, pp 1–7

  • Raja KB, Raghavendra R, Busch C (2018b) Towards protected and cancelable multi-spectral face templates using feature fusion and kernalized hashing. In: International conference on information fusion (FUSION), vol 21. IEEE, pp 2098–2106

  • Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  • Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable Biometrics: a case study in fingerprints. In: International conference on pattern recognition (ICPR’06), vol 18(no. 4). IEEE, pp 370–373

  • Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572

    Article  Google Scholar 

  • Rathgeb C, Busch C (2013) Comparison score fusion towards an optimal alignment for enhancing cancelable iris biometrics. In: Fourth international conference on emerging security technologies (EST). IEEE, pp 51–54

  • Rathgeb C, Busch C (2014) Cancelable multi-Biometrics: mixing iris-codes based on adaptive bloom filters. Comput Secur 42:1–12

    Article  Google Scholar 

  • Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 2011(1):1–3

  • Rathgeb C, Breitinger F, Busch C (2013) Alignment-free cancelable iris Biometric templates based on adaptive bloom filters. In: International conference on Biometrics (ICB). IEEE, pp 1–8

  • Rathgeb C, Breitinger F, Busch C, Baier H (2014) On application of bloom filters to iris biometrics. IET Biom 3(4):207–218

    Article  Google Scholar 

  • Rathgeb C, Gomez-Barrero M, Busch C, Galbally J, Fierrez J (2015a) Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris. In: International workshop on biometrics and forensics (IWBF 2015), vol 3. IEEE, pp 1–6

  • Rathgeb C, Wagner J, Tams B, Busch C (2015b) Preventing the cross-matching attack in bloom filter-based Cancelable Biometrics. In: International workshop on biometrics and forensics (IWBF). IEEE, pp 1–6

  • Ross A, Othman A (2010) Visual cryptography for biometric privacy. IEEE Trans Inf Forensics Secur 6(1):70–81

    Article  Google Scholar 

  • Ross A, Shah J, Jain AK (2007) From template to image: reconstructing fingerprints from minutiae points. IEEE Trans Pattern Anal Mach Intell 29(4):544–560

    Article  Google Scholar 

  • Saito Y, Nakamura I, Shiota S, Kiya H (2016) An efficient random unitary matrix for biometric template protection. In: joint international conference on soft computing and intelligent systems (SCIS) and international symposium on advanced intelligent systems (ISIS), vol 8 & 17. IEEE, pp 366–370

  • Sandhya M, Prasad MV (2015) k-Nearest Neighborhood structure (k-NNS) based alignment-free method for fingerprint template protection. In: International conference on Biometrics (ICB). IEEE, pp 386–393

  • Sandhya M, Prasad MV (2016) Securing fingerprint templates using fused structures. IET Biom 6(3):173–182

    Article  Google Scholar 

  • Sarier ND (2010) Practical multi-factor biometric remote authentication. In: International conference on biometrics: theory, applications and systems (BTAS), vol 4. IEEE, pp 1–6

  • Sarkar A, Singh BK (2017) Cancelable Biometric based key generation for symmetric cryptography. In: International conference on inventive communication and computational technologies (ICICCT). IEEE, pp 404–409

  • Savvides M, Kumar BV, Khosla PK (2004) Cancelable biometric filters for face recognition. Proc Int Conf Pattern Recognit 17(3):922–925

    Article  Google Scholar 

  • Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Comput Sci 54:472–481

    Article  Google Scholar 

  • Soutar C, Roberge D, Stoianov A, Gilroy R, Kumar BV (1998) Biometric encryption using image processing. Opt Secur Counterfeit Deterrence Techn 3314:178–189

    Article  Google Scholar 

  • Sree SS, Radha N (2016) Cancellable multimodal biometric user authentication system with fuzzy vault. In: International conference on computer communication and informatics (ICCCI). IEEE, pp 1–6

  • Sui Y, Zou X, Du EY, Li F (2014) Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Trans Comput 63(4):902–916

    Article  MathSciNet  MATH  Google Scholar 

  • Suresh P, Radhika KR (2015) Biometric credential system: multimodal cancelable anonymous identity management. In: International advance computing conference (IACC). IEEE, pp 353–356

  • Takahashi K, Hirata S (2011a) Cancelable Biometrics with provable security and its application to fingerprint verification. IEICE Trans Fundam Electron Commun Comput Sci 94(1):233–244

    Article  Google Scholar 

  • Takahashi K, Hirata S (2011b) Parameter management schemes for cancelable biometrics. In: IEEE workshop on computational intelligence in biometrics and identity management (CIBIM). IEEE, pp 145–151

  • Takahashi K, Hitachi SH (2009) Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering. In: International conference on biometrics: theory, applications, and systems, vol 3. IEEE, pp 1–6

  • Takahashi K, Naganuma K (2012) Unconditionally provably secure Cancellable Biometrics based on a quotient polynomial ring. IET Biom 1(1):63–71

    Article  Google Scholar 

  • Talreja V, Valenti MC, Nasrabadi NM (2017) MultiBiometric secure system based on deep learning. In: IEEE global conference on signal and information processing (GlobalSIP). IEEE, pp 298–302

  • Tams B, Rathgeb C (2014) Towards efficient privacy-preserving two-stage identification for fingerprint-based Biometric cryptosystems. In: IEEE international joint conference on Biometrics (IJCB). IEEE, pp 1–8

  • Tan F, Ong TS, Tee C, Teoh AB (2009) Image hashing enabled technique for biometric template protection. In: TENCON IEEE region conference, vol 10. IEEE, pp 1–5

  • Teoh AB, Yuang CT (2007) Cancelable Biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern B Cybern 37(5):1096–1106

    Article  Google Scholar 

  • Teoh AB, Goh A, Ngo DC (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Article  Google Scholar 

  • Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recognit 41(6):2034–2044

    Article  MATH  Google Scholar 

  • Thomas AO, Ratha NK, Connell JH, Bolle RM (2008) Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. In: International conference on pattern recognition, vol 19. IEEE, pp 1–4

  • Toh KA, Lee C, Choi JY, Kim J (2007) Performance based revocable biometrics. In: IEEE conference on industrial electronics and applications, vol 2. IEEE, pp 647–652

  • Ueshige Y, Sakurai K (2014) Towards receipt-freeness in remote biometric authentication. In: Fifth international conference on emerging security technologies. IEEE, pp 8–12

  • Wang Y, Hatzinakos D (2010) Cancelable face recognition using random multiplicative transform. In: International conference on pattern recognition, vol 20. IEEE, pp 1261–1264

  • Wang S, Hu J (2013) A Hadamard transform-based method for the design of cancellable fingerprint templates. In: International Congress on image and signal processing (CISP), vol 3(no 6). IEEE, pp 1682–1687

  • Wong WJ, Wong MD, Teoh A BJ (2014) A security-and privacy-driven hybrid Biometric template protection technique. In: International conference on electronics, information and communications (ICEIC). IEEE, pp 1–5

  • Wu SC, Chen PT, Swindlehurst AL, Hung PL (2018) Cancelable biometric recognition with ECGs: subspace-based approaches. IEEE Trans Inf Forensics Secur 14(5):1323–1336

    Article  Google Scholar 

  • Xu W, Cheng M (2008) Cancelable voiceprint template based on chaff-points-mixture method. In: International conference on computational intelligence and security, vol 2. IEEE, pp 263–266

  • Xu D, Li B (2009) A pseudo-random sequence fingerprint key algorithm based on fuzzy vault. In: International conference on mechatronics and automation. IEEE, pp 2421–2425

  • Xu D, Wang X (2010) A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence. In: IEEE international conference on mechatronics and automation. IEEE, pp 329–332

  • Xu W, He Q, Li Y, Li T (2008) Cancelable voiceprint templates based on knowledge signatures. In: International symposium on electronic commerce and security. IEEE, pp 412–415

  • Yang H, Jiang X, Kot AC (2009) Generating secure cancelable fingerprint templates using local and global features. In: International conference on computer science and information technology, vol 2. IEEE, pp 645–649

  • Yang K, Du Y, Zhou Z, Belcher C (2010) Gabor descriptor based cancelable iris recognition method. In: IEEE international conference on image processing. IEEE, pp 4085–4088

  • Yang W, Wang S, Hu J, Zheng G, Chaudhry J, Adi E, Valli C (2018a) Securing mobile healthcare data: a smart card based cancelable finger-vein bio-cryptosystem. IEEE Access 6:36939–36947

    Article  Google Scholar 

  • Yang W, Wang S, Hu J, Zheng G, Valli C (2018b) A fingerprint and finger-vein based cancelable multi-biometric system. Pattern Recognit 78:242–251

    Article  Google Scholar 

  • You L, Yang L, Yu W, Wu Z (2017) A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin J Electron 26(2):236–43

    Article  Google Scholar 

  • Zhang N, Yang X, Zang Y, Jia X, Tian J (2013) Generating registration-free cancelable fingerprint templates based on minutia cylinder-code representation. In: International conference on biometrics: theory, applications and systems (BTAS), vol 6. IEEE, pp 1–6

  • Zhu HH, He QH, Tang H, Cao WH (2011) Voiceprint-biometric template design and authentication based on cloud computing security. In: International conference on cloud and service computing. IEEE, pp 302–308

  • Zhu HH, He QH, Li YX (2012) A two-step hybrid approach for voiceprint-biometric template protection. In: International conference on machine learning and cybernetics, vol 2. IEEE, pp 560–565

  • Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: International conference on pattern recognition, vol 19. IEEE, pp 1–4

Download references

Acknowledgements

One of the authors Dr. Nitin Kumar is thankful to Uttarakhand State Council of Science and Technology, Dehradun, India for providing financial assistance towards the implementation of Project Sanction No. UCS&T/R&D-05/18-19/15202.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manisha, Kumar, N. Cancelable Biometrics: a comprehensive survey. Artif Intell Rev 53, 3403–3446 (2020). https://doi.org/10.1007/s10462-019-09767-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-019-09767-8

Keywords

Navigation