Biometric layering: template security and privacy through multi-biometric template fusion

作者: Berrin Yanıkoğlu , Alper Kanak , Alisher Anatolyevich Kholmatov , Hakan Erdoğan , Umut Uludağ

DOI:

关键词: Structure (mathematical logic)Construct (python library)PassphraseFingerprint (computing)EngineeringIdentification (information)NISTData miningAuthenticationComputer securityBiometrics

摘要: As biometric applications are gaining popularity, there is increased concern over the loss of privacy and potential misuse data held in central repositories. Biometric template protection mechanisms suggested recent years aim to address these issues by securing a or other structure such that it suitable for authentication purposes, while being protected against unauthorized access crosslinking attacks. We propose framework enhancing security, layering multiple modalities construct multi-biometric difficult extract separate individual layers. Thus, uses subject's own conceal her data, also enjoys performance benefits because use modalities. The resulting cancelable if system implemented with biometrics as voice. present two different realizations this idea: one combining fingerprints another fingerprint spoken passphrase. In either case, both samples required successful authentication, leading addition gains. proposed evaluated using FVC 2000-2002 NIST databases, TUBITAK MTRD speaker database. Results show only small degradation EER compared state-of-the-art ngerprint verification high identification rates, cross-link rates low even very databases.

参考文章(30)
Berrin Yanıkoğlu, Alisher Anatolyevich Kholmatov, Combining multiple biometrics to protect privacy ,(2004)
Jean-Paul Linnartz, Pim Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates Lecture Notes in Computer Science. pp. 393- 402 ,(2003) , 10.1007/3-540-44887-X_47
Davide Maltoni, Anil K. Jain, Dario Maio, Salil Prabhakar, Handbook of Fingerprint Recognition ,(2005)
Sheng Li, Alex C. Kot, Fingerprint Combination for Privacy Protection IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 350- 360 ,(2013) , 10.1109/TIFS.2012.2234740
Adams Kong, David Zhang, Mohamed Kamel, None, A survey of palmprint recognition Pattern Recognition. ,vol. 42, pp. 1408- 1418 ,(2009) , 10.1016/J.PATCOG.2009.01.018
Alisher Kholmatov, Berrin Yanikoglu, Realization of correlation attack against the fuzzy vault scheme electronic imaging. ,vol. 6819, ,(2008) , 10.1117/12.766861
Sushil Chauhan, A.S. Arora, Amit Kaul, A survey of emerging biometric modalities Procedia Computer Science. ,vol. 2, pp. 213- 218 ,(2010) , 10.1016/J.PROCS.2010.11.027
Kevin W. Bowyer, Karen Hollingsworth, Patrick J. Flynn, Image understanding for iris biometrics: A survey Computer Vision and Image Understanding. ,vol. 110, pp. 281- 307 ,(2008) , 10.1016/J.CVIU.2007.08.005
Ari Juels, Martin Wattenberg, A fuzzy commitment scheme computer and communications security. pp. 28- 36 ,(1999) , 10.1145/319709.319714
N. K. Ratha, J. H. Connell, R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems Ibm Systems Journal. ,vol. 40, pp. 614- 634 ,(2001) , 10.1147/SJ.403.0614