Skip to main content
Log in

PolyCodes: generating cancelable biometric features using polynomial transformation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cancelable biometrics is a template protection technique proposed to bridge the growing gap between ‘biometrics for security’ and ‘security for biometrics’. Various approaches have been reported in literature, yet transforming a biometric template for privacy preservation is a challenging task. The manuscript proposes a random polynomial based template transformation technique to generate protected biometric templates named as ‘PolyCodes’. These protected versions are privacy and discriminability preserving, revocable, and provide significant dimensionality reduction. Several polynomial functions with dimensionality reduction factor ranging from 65% to 90% are designed and evaluated for security and performance. Further, applicability of the proposed ‘PolyCodes’ is experimentally verified for many biometric modalities such as visible and thermal face, palmprint, palmvein, and fingervein.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alam B, Jin Z, Yap WS, Goi BM (2018) An alignment-free cancelable fingerprint template for bio-cryptosystems. J Netw Comput Appl 115:20–32

    Article  Google Scholar 

  2. CASIA-FaceV5 (2005) Biometrics Ideal Test. http://biometrics.idealtest.org

  3. CASIA-MS-Palmprint V1 (2007) Biometrics Ideal Test. http://biometrics.idealtest.org

  4. CASIA palmprint database (2005) Biometrics Ideal Test. http://biometrics.idealtest.org/downloadDB/

  5. Cho S, Teoh ABJ (2017) Face template protection via random permutation maxout transform. In: 2017 international conference on biometrics engineering and application (ICBEA), ACM, pp 21–27

  6. Cimato S, Yang CN (2011) Visual cryptography and secret image sharing. CRC press

  7. De Boor C, Ron A (1990) On multivariate polynomial interpolation. Constr Approx 6(3):287–302

    Article  MathSciNet  Google Scholar 

  8. Dwivedi R, Dey S, Singh R, Prasad A (2017) A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. Computers & Security 65:373–386

    Article  Google Scholar 

  9. Farooq F, Bolle RM, Jea TY, Ratha N (2007) Anonymous and revocable fingerprint recognition. In: 2007 international conference on Computer Vision and pattern recognition (CVPR), IEEE, pp 1–7

  10. Gomez-Barrero M, Rathgeb C, Galbally J, Busch C, Fierrez J (2016) Unlinkable and irreversible biometric template protection based on bloom filters. Inf Sci 370:18–32

    Article  MathSciNet  Google Scholar 

  11. Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2018) General framework to evaluate unlinkability in biometric template protection systems. IEEE Transactions on Information Forensics and Security 13(6):1406–1420

    Article  Google Scholar 

  12. Hermans J, Mennink B, Peeters R (2014) When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system. In: 2014 international conference of the biometrics special interest group (BIOSIG), IEEE, pp 1–6

  13. Ignatenko T, Willems FM (2010) Information leakage in fuzzy commitment schemes. IEEE Transactions on Information Forensics and Security 5(2):337–348

    Article  Google Scholar 

  14. IRIS thermal/visible face database (2005) University of Tennessee. http://www.cse.ohio-state.edu/otcbvs-bench

  15. Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255

    Article  Google Scholar 

  16. Jin Z, Hwang JY, Lai YL, Kim S, Teoh ABJ (2018) Ranking-based locality sensitive hashing-enabled cancelable biometrics: index-of-max hashing. IEEE Transactions on Information Forensics and Security 13(2):393–407

    Article  Google Scholar 

  17. Kaur H, Khanna P (2016) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimed Tools Appl 75(23):16333–16361

    Article  Google Scholar 

  18. Kaur H, Khanna P (2017) Cancelable features using log-gabor filters for biometric authentication. Multimed Tools Appl 76(4):4673–4694

    Article  Google Scholar 

  19. Lacharme P, Cherrier E, Rosenberger C (2013) Preimage attack on biohashing. In: 2013 international conference on security and cryptography (SECRYPT), IEEE, pp 1–8

  20. Lee C, Kim J (2010) Cancelable fingerprint templates using minutiae-based bit-strings. J Netw Comput Appl 33(3):236–246

    Article  Google Scholar 

  21. Leng L, Zhang J (2011) Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security. J Netw Comput Appl 34(6):1979–1989

    Article  Google Scholar 

  22. Leng L, Zhang J (2013) Palmhash code vs. palmphasor code. Neurocomputing 108:1–12

    Article  Google Scholar 

  23. Li J, Sang N, Gao C (2015) Log-gabor weber descriptor for face recognition. Journal of Electronic Imaging 24(5):053014–053014

    Article  Google Scholar 

  24. Li SZ, Yi D, Lei Z, Liao S (2013) The casia nir-vis 2.0 face database. In: 2013, computer vision and pattern recognition workshops (CVPRW), IEEE, pp 348–353

  25. Maiorana E, Campisi P, Neri A (2011) Bioconvolving: cancelable templates for a multi-biometrics signature recognition system. In: Systems Conference (SysCon), 2011 IEEE International, IEEE, pp 495–500

  26. Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: Fuzzy vault with minutiae descriptors. In: 2008 international conference on pattern recognition (ICPR), IEEE, pp 1–4

  27. Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100

    Article  Google Scholar 

  28. ORL face database (1994) AT&T Laboratories Cambridge. http://www.cl.cam.ac.uk/

  29. Quan F, Fei S, Anni C, Feifei Z (2008) Cracking cancelable fingerprint template of ratha. In: 2008 international symposium on computer science and computational technology (ISCSCT). IEEE 2:572–575

    Google Scholar 

  30. Ratha N, Connell J, Bolle RM, Chikkerur S (2006) Cancelable biometrics: a case study in fingerprints. In: 2006 international conference on pattern recognition (ICPR). IEEE 4:370–373

    Google Scholar 

  31. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  32. Rathgeb C, Breitinger F, Busch C (2013) Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: 2013 international conference on biometrics (ICB), IEEE, pp 1–8

  33. Savvides M, Kumar BV, Khosla PK (2004) Cancelable biometric filters for face recognition. In: 2004 international conference on pattern recog- nition (ICPR). IEEE 3:922–925

    Google Scholar 

  34. Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics Symposium, 2007, IEEE, pp 1–6

  35. Tamayo-Rios M, Faugère JC, Perret L, How PH, Zhang R (2017) Fully homomorphic encryption using multivariate polynomials. Cryptology ePrint Archive, Report 2017/458, https://eprint.iacr.org/2017/458

  36. Teoh AB, Goh A, Ngo DC (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Article  Google Scholar 

  37. Teoh ABJ, Kim J (2007) Secure biometric template protection in fuzzy commitment scheme. IEICE Electronics Express 4(23):724–730

    Article  Google Scholar 

  38. Teoh ABJ, Ngo DCL (2006) Biophasor: token supplemented cancellable biometrics. In: 2006 international conference on control, automation, robotics and vision (ICARCV), IEEE, pp 1–5

  39. Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37(5):1096–1106

    Article  Google Scholar 

  40. Teoh ABJ, Yip WK, Toh KA (2010) Cancellable biometrics and user-dependent multi-state discretization in biohash. Pattern Anal Applic 13(3):301–307

    Article  MathSciNet  Google Scholar 

  41. Teoh ABJ, Cho S, Kim J (2018) Random permutation maxout transform for cancellable facial template protection. Multimedia Tools and Applications pp:1–27

  42. Wang S, Hu J (2014) Design of alignment-free cancelable fingerprint templates via curtailed circular convolution. Pattern Recogn 47(3):1321–1329

    Article  Google Scholar 

  43. Wang S, Yang W, Hu J (2017) Design of alignment-free cancelable fingerprint templates with zoned minutia pairs. Pattern Recogn 66:295–301

    Article  Google Scholar 

  44. Wang Y, Plataniotis KN (2010) An analysis of random projection for changeable and privacy-preserving biometric verification. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 40(5):1280–1293

    Article  Google Scholar 

  45. Williams GO (1996) The use of d’as a “decidability” index. In: 1996 international carnahan conference on security technology, IEEE, pp 65–71

  46. Yang MH (2002) Kernel eigenfaces vs. kernel fisherfaces: face recognition using kernel methods. In: Fgr, vol 2, p 215

  47. Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay triangle-based local structures. Cyberspace Safety and Security, Springer, In, pp 81–91

    Google Scholar 

  48. Yin Y, Liu L, Sun X (2011) Sdumla-hmt: a multimodal biometric database. Biometric Recognition, Springer, In, pp 260–268

    Google Scholar 

  49. Zuo J, Ratha NK, Connell JH (2008) Cancelable iris biometric. In: 2008 international conference on pattern recognition (ICPR), IEEE, pp 1–4

Download references

Acknowledgments

This work is supported by BRNS, DAE, Government of India, Grant. No: 36(3)/14/58/2016-BRNS.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harkeerat Kaur.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, H., Khanna, P. PolyCodes: generating cancelable biometric features using polynomial transformation. Multimed Tools Appl 79, 20729–20752 (2020). https://doi.org/10.1007/s11042-020-08734-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08734-8

Keywords

Navigation