Approach for Protection of Iris Template using Cancelable Biometrics

Author(s): Sheetal Chaudhary*, Rajender Nath, Chander Kant, Surya Kant.

Journal Name: International Journal of Sensors, Wireless Communications and Control

Volume 9 , Issue 1 , 2019

Become EABM
Become Reviewer

Graphical Abstract:


Abstract:

Background & Objective: The most important issue concerning the security of biometric authentication systems is protection of biometric templates. This is because once the biometric template being attacked, it cannot be canceled and reissued. Thus, the intruder could avail the facilities that are meant only for the genuine user just bypassing the enrollment phase.

Methods: To protect the biometric templates from attacks, it is advantageous to modify them before storing in the databases through some cancelable and non-invertible transformations. Hence, an approach based on cancelable biometrics is proposed in this paper for providing security and privacy to biometric templates. It uses left iris and right iris as input biometric traits. Different experiments are carried out to authenticate the proposed approach.

Results & Conclusion: It satisfies all template protection requirements and expected to show good recognition performance without degrading it.

Keywords: Cancelable biometrics, fusion, iris recognition, non-invertible transformation, security, template.

[1]
Jain AK, Ross A, Prabhakar S. An introduction to biometric recognition. IEEE Trans Syst Technol 2004; 14: 4-20.
[2]
Ratha NK. Privacy protection in high security biometrics applications. Ethics and Policy of Biometrics, Lecture Notes in Computer Science,. A. Kumar and D. Zhang, Eds. Springer Berlin Heidelberg 2010; 6005: pp. 62-9.
[3]
Ratha NK, Connell JH, Bolle RM. An analysis of minutiae matching strength. Proceedings of the third international conference on audio- and video-based biometric person authentication. 2001; 11: 233-8.
[4]
Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP 2008; 2008: 1-17.
[5]
Juels A, Sudan M. A fuzzy vault scheme.Proceedings of the IEEE International Symposium on Information Theory 2002. 408.
[6]
Yanikoglu B, Kholmatov A. Combining multiple biometrics to protect privacy. Proceedings of ICPRBCTP Workshop. Cambridge, England. August 2004.
[7]
Ang R, Safavi-Naini R, McAven L. Cancelable key-based fingerprint templates. Proceedings of 10th Australian Conference on Information security and Privacy Info Sec Priv 2005; 3574: 242-52.
[8]
Ratha NK, Chikkerur S, Connell JH, Bolle R. Generating cancelable fingerprint templates. IEEE Trans Analysis Intell 2007; 29(4): 561-72.
[9]
Maiorana E, Martinez-Diaz M, Campisi P, Ortega-Garcia J, Neri A. Template protection for HMM-based on-line signature authentication. Proc IEEE Conf Comp Recog 2008 2008; 1-6.
[10]
Jinyu Z, Ratha N, Connell J. Cancelable iris biometric. Proceedings of the 19th International IAPR Conference on Pattern Recognition (ICPR) 2008; 1-4.
[11]
Feng YC, Yuen PC, Jain AK. A hybrid approach for face template protection. Proceedings of SPIE Conference on Biometric Technology for Human Identification 2008; 6944 Orlando, FL, USA
[12]
Suzwani I, Fakariah HA, Syed AA. A new hybrid approach for securing multibiometric templates based on cancelable and fuzzy commitment scheme. Aust J Basic Appl Sci 2015; 9(26): 72-6.
[13]
Padma PP, Marina G. Cancelable biometrics: securing biometric face template. IJAIT 2012; 4(1): 25-34.
[14]
Baca M, Antonic M, Franjo M. Upgrading existing biometric security systems by implementing the concept of cancelable biometrics. Proceedings of Central European Conference on Information & Intelligent Systems 2008.
[15]
Ratha N, Connell J, Bolle R. Enhancing security and privacy in biometrics-based authentication systems. IBM J Syst 2001; 40: 614-34.
[16]
Maltoni D, Maio D, Jain AK, Prabhakar S. In: handbook of fingerprint recognition. Springer, Berlin, Germany 2003.
[17]
Breebaart J, Yang B, Buhan-Dulman I, Busch C. Biometric template protection: the need for open standards. J Private Secur 2009; 5(2009): 299-304.
[18]
Andy Adler Biometric system security. In: Handbook of Biometrics. Springer 2007.
[19]
Illingworth J, Kittler J. A survey of the hough transform. Computer Vision, Graphics, and Image Processing 1988; 44(1): 87-116.
[20]
Daugman J. How iris recognition works. IEEE Trans Circuit Syst Technol 2004; 14(1): 21-30.
[21]
Anap MB, Vikhe PS. Iris recognition system using 2D log-gabor filter. Int J Adv Eng 2012; 1(2): 59-62.
[22]
Daugman J. Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vision 2001; 45(1): 25-38.
[23]
Chinese Academy of Sciences. Center of Biometrics and Security ResearchDatabase of Eye Images Available from: www.cbsr.ia.ac.cn/IrisDatabase.htm


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 9
ISSUE: 1
Year: 2019
Page: [144 - 152]
Pages: 9
DOI: 10.2174/2210327908666181011143736
Price: $58

Article Metrics

PDF: 19
HTML: 2