Biometric template transformation: a security analysis
نویسندگان
چکیده
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.
منابع مشابه
Biometric Template Protection Using Spiral Cube: Performance and Security Analysis
Personal authentication systems based on biometrics have given rise to new problems and challenges related to the protection of personal data, issues of less concern in traditional authentication systems. The irrevocability of biometric templates makes biometric systems very vulnerable to several attacks. In this paper we present a new approach for biometric template protection. Our objective i...
متن کاملPrivacy and security assessment of biometric template protection
Biometrics enables convenient authentication based on a person’s physical or behavioral characteristics. In comparison with knowledgeor token-based methods, it links an identity directly to its owner. Furthermore, it can not be forgotten or handed over easily. As biometric techniques have become more and more efficient and accurate, they are widely used in numerous areas. Among the most common ...
متن کاملAn Efficient Secure Biometric System with Non-Invertible Gabor Transform
Biometric scheme are being widely employed because their security merits over the earlier authentication system based on records that can be easily lost, guessed or forged. High scale employments and the related template storage have increased the requirement to guard the biometric data stored in the system. Theft of biometric information is a negotiation of the user’s privacy. In Addition, the...
متن کاملNon-Invertible Online Signature Biometric Template Protection via Shuffling and Trigonometry Transformation
This paper describes a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. We propose a renewable-noninvertible transformation process named Bio-Trigono comprising two consecutive steps. First, a shuffling scheme is applied to a signature sample to attain the renewability proper...
متن کاملTemplate Protection and its Implementation in 3D Face Recognition Systems
As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper...
متن کامل