Skip to main content

Biometric Template Privacy Using Visual Cryptography

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2017)

Abstract

One of the critical steps in designing a secure biometric system is protecting the templates of the users. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. This work propose a new cancelable biometric template using visual cryptography (VC) for preserving privacy to biometric data such as finger-vein. The finger vein template is divided into two noisy images, known as shares, using VC, where one share is stored in the system database and the other is kept with the user on a smart card. The private image can be revealed only when both shares are simultaneously available at the same time. The individual share images do not reveal the identity of the private image. We experimentally evaluate performance of the proposed scheme. The evaluation is performed based on the two metrics: (i) False Acceptance Rate (FAR), and (ii) False Rejection Rate (FRR).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stavroulakis, P., Stamp, M.: Handbook of Information and Communication Security. Springer, Heidelberg (2010)

    Book  MATH  Google Scholar 

  2. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometric-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  3. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, London (2009)

    Book  MATH  Google Scholar 

  4. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption using image processing. In: Photonics West 1998 Electronic Imaging, International Society for Optics and Photonics, pp. 178–188 (1998)

    Google Scholar 

  5. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  6. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)

    Google Scholar 

  7. Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forensics Secur. 2(4), 744–757 (2007)

    Article  Google Scholar 

  8. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28–36. ACM (1999)

    Google Scholar 

  9. Li, Q., Chang, E.C.: Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th Workshop on Multimedia and Security, pp. 56–61. ACM (2006)

    Google Scholar 

  10. Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503–512 (2007)

    Article  Google Scholar 

  11. Ratha, N.K., Connell, J.H., Bolle, R.M., Chikkerur, S.: Cancelable biometrics: a case study in fingerprints. In: 18th International Conference on Pattern Recognition (ICPR 2006), vol. 4, pp. 370–373 (2006)

    Google Scholar 

  12. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007)

    Article  Google Scholar 

  13. Maiorana, E., Campisi, P., Fierrez, J., Ortega-Garcia, J., Neri, A.: Cancelable templates for sequence based biometrics with application to on-line signature recognition. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 40(3), 525–538 (2010)

    Article  Google Scholar 

  14. Connie, T., Teoh, A., Goh, M., Ngo, D.: Palmhashing: a novel approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1–5 (2005)

    Article  MathSciNet  Google Scholar 

  15. Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245–2255 (2004)

    Article  Google Scholar 

  16. Hirata, S., Takahashi, K.: Cancelable biometrics with perfect secrecy for correlation-based matching. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 868–878. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Chen, X., Bai, X., Tao, X., Pan, X.: Chaotic random projection for cancelable biometric key generation. In: Intelligent Science and Intelligent Data Engineering, pp. 605–612. Springer, Heidelberg (2013)

    Google Scholar 

  18. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT 1994, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  19. Monoth, T., Anto, P.B.: Tamperproof transmission of fingerprints using visual cryptography schemes. Procedia Comput. Sci. 2, 143–148 (2010)

    Article  Google Scholar 

  20. Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)

    Article  Google Scholar 

  21. Ross, A., Othman, A.A.: Visual cryptography for face privacy. In: SPIE Defense, Security, and Sensing, International Society for Optics and Photonics, p. 76,670B (2010)

    Google Scholar 

  22. Divya, C., Surya, E.: Visual cryptography using palm print based on DCT algorithm. Int. J. Emerg. Technol. Adv. Eng. 2(12), 2250–2459 (2012)

    Google Scholar 

  23. Revenkar, P., Anjum, A., Gandhare, W.: Secure iris authentication using visual cryptography. arXiv preprint arXiv:10041748 (2010)

  24. Chin, C.S., Jin, A.T.B., Ling, D.N.C.: High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2), 169–177 (2006)

    Article  Google Scholar 

  25. Sinduja, R., Sathiya, R., Vaithiyanathan, V.: Sheltered iris attestation by means of visual cryptography (SIA-VC). In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 650–655 (2012)

    Google Scholar 

  26. Jain, A.K., Nandakumar, K., Nagar, A., et al.: Biometric template security. EURASIP J. Adv. Sig. Process. 2008(113), 1–17 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sana Ibjaoun , Anas Abou El Kalam , Vincent Poirriez or Abdellah Ait Ouahman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ibjaoun, S., Abou El Kalam, A., Poirriez, V., Ait Ouahman, A. (2018). Biometric Template Privacy Using Visual Cryptography. In: Abraham, A., Haqiq, A., Muda, A., Gandhi, N. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2017. Advances in Intelligent Systems and Computing, vol 735. Springer, Cham. https://doi.org/10.1007/978-3-319-76354-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-76354-5_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-76353-8

  • Online ISBN: 978-3-319-76354-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics