Open Access Open Access  Restricted Access Subscription Access

Challenges Arising from Multi-Modal Biometric Template Security Schemes


Affiliations
1 Swami Ramanand Teerth Marathwada University, Nanded, Maharashtra, India
 

Since the inception of Biometric authentication system in 1870, a wide variety of applications like Computer systems, laptops, mobile phones, ATM, access to buildings etc. are increasing in the 21st century. In the absence of such robust authentications systems, these systems are vulnerable to the wiles of an imposter. It is believed that the biometric authentication systems are the ultimate form of personal identification and encouraged because of convenience, high security etc. these are the solutions to the limitations of identity theft. Also biometric systems are safer, convenient, cost effective and cheaper to implement than traditional identification and verification systems.

The protection of Uni-modal or Multi-modal biometric templates is fundamental. In case of biometric data theft, an attacker can gain possession of a legal user's identity and this can have serious consequences like bank account fraud, unauthorized payments or receipts, privacy violations, etc. Furthermore, once stolen, is impossible to modify the individual traits to resolve the problem and reuse them; the biometric data become unusable.For such reasons, it's important to guarantee the protection of biometric characteristics to ensure security and privacy.However, the Template protection scheme may reduce the system's recognition performances, affecting the quality of the overall biometric authentication process.

Nonetheless, biometric system also have their own limitations, e.g. username , passwords, PIN, ID cards can be replaced or re-issued easily if they are compromised, which is not possible in case of individual's fingerprint, face, voice, retina etc. In this paper, an attempt is made to identify the challenges arising out of Multi-modal biometric template protection schemes.


Keywords

Multi-Biometric Systems, Multimodal Biometric, Biometric Template Security, Template Protection, Feature Transformation, Biometric Cryptosystems.
User
Notifications
Font Size

  • Harbi Ahmad Almahafzah. (2013). Person verification based on Multibiometric systems. A Thesis Submitted for Doctor of Philosophy at Department of Electronics & CommunicationEngineering, P.E.T. Research Foundation, University of Mysore.
  • Christian Rathgeb, Christoph Busch. (2012). A Book chapter on Multi-Biometric Template Protection: Issues and Challenges, Chapter 8, http://dx.doi.org/10.5772/52152, pp. 173-190.
  • A. Ross, K. Nandakumar, A. K. Jain. (2006). Handbook of Multi-biometrics.International Series on Biometrics.Springer-Verlag New York. pp. 1-35.
  • C. Rathgeb, A. Uhl. (2011). A survey on biometric cryptosystems and cancelable biometrics.EURASIP Journal on Information Security, DOI: 10.1186/1687-417X-2011-3.
  • Abhishek Nagar, KarthikNandakumar, Anil K. Jain. (2010). Biometric Template Transformation: A Security Analysis. SPIE 7541, Media Forensics and Security II, 75410O; doi: 10.1117/12.839976.
  • Christina AngelikiToli, Bart Preneel. (2015). A Survey on Multimodal Biometrics and the Protection of Their Templates.International Federation for Information Processing, pp. 169-184.
  • Buchmann, N., Rathgeb, C., Baier, H., Busch, C. (2014). Towards electronic identification and trusted services for biometric authenticated transactions in the single euro payments area.Springer, Heidelberg , vol. 8450, pp. 172-190.
  • Yang, B., Busch, C., Bringer, J., Kindt, E., Belser, W.R., Seidel, U., Springmann, E., Rabeler, U., Wolf, A., Aukrust, M. (2013). Towards standardizing trusted evidence of identity. Proceedings of ACM Workshop on Digital Identity Management, pp. 63–72.
  • Ross, A.A., Nandakumar, K., Jain, A.K. (2014). Handbook of Multi-biometrics.Springer, New York, vol. 6.
  • Sim, H.M., Asmuni, H., Hassan, R., Othman, R. M. (2014). Multimodal biometrics: weighted score level fusion based on non-ideal iris and face images. Elsevier,Expert System Application, 41(11), pp. 5390-5404.
  • Siddiqui, A.M., Telgad, R., Deshmukh, P.D. (2014). Multimodal Biometric Systems: Study to Improve Accuracy and Performance. IJCET: International Journal of Current Engineering and Technology, Vol.4, No.1, pp. 165-171.
  • Rathgeb C., Busch C. (2012). A Book chapter on Multi-biometric template protection: Issues and challenges. Chapter 8: http://dx.doi.org/10.5772/52152, pp. 173–190.
  • Rathgeb C., Uhl A. (2011). A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Information Security, 1, pp. 1-25.
  • Nandakumar K. (2010). A fingerprint cryptosystem based on minutiae phase spectrum. IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6.
  • Christian Rathgeb and Christoph Busch, Multi-Biometric Template Protection: Issues and Challenges, Chapter 8, pp. 173 -190.
  • A. Nagar, K. Nandakumar, and A. K. Jain.(2012). Multi-biometric cryptosystems based on feature level fusion.IEEE Transactions on Information Forensics and Security, 7(1), pp. 255–268.
  • Y. Sutcu, Q. Li, and N. Memon.(2007). Secure biometric templates from fingerprintface features.In IEEE Conf. on Computer Vision and Pattern Recognition, CVPR ’07, pp. 1-6.
  • E. J. C. Kelkboom, X. Zhou, J. Breebaart, R. N. S. Veldhuis, and C. Busch.( 2009). Multialgorithm fusion with template protection. In Proc. of the 3rd IEEE Int. Conf. on Biometrics: Theory, applications and systems (BTAS’09), pp 1-7.
  • C. Rathgeb, A. Uhl, and P. Wild. (2011). Reliability-balanced feature level fusion for fuzzy commitment scheme. In Proc. of the Int. Joint Conf. on Biometrics (IJCB), pp.1-7.
  • Anil K. Jain, KarthikNandakumar, and Abhishek Nagar. (2008). Biometric template security.EURASIP J. Adv. Signal Process, pp.1-17.
  • U. Uludag and A. K. Jain. (2004). Fuzzy fingerprint vault. Workshop: Biometrics: Challenges Arising from Theory to Practice, pp 13-16.
  • K. Nandakumar, A. K. Jain, and S. Pankanti. (2007). Fingerprint-based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security, volume 2, pp.744-757.
  • F. Willems and T. Ignatenko.(2010). Identification and secret-key binding in binarysymmetric template-protected biometric systems.Proceeding of IEEE Workshop on Information Forensics and Security (WIFS).
  • E. J. C. Kelkboom, G. G. Molina, J. Breebaart, R. N. J. Veldhuis, T. A. M. Kevenaar, and W. Jonker. (2010). Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption. Trans. on System, Man, and Cybernetics-Part A: Systems and Humans, 40(3), pp. 555-571.
  • A. Stoianov, T. Kevenaar, and M. van der Veen.(2009). Security issues of biometric encryption.In Proc. of the Toronto Int. Conf. Science and Technology for Humanity (TICSTH), pp. 34-39.
  • F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel. (2001).Using Voice to Generate Cryptographic Keys. Proceeding of A Speaker Odyssey, The Speech Recognition Workshop.
  • A. Ross, K. Nandakumar, and A. K. Jain. (2006). Handbook of Multi-biometrics (International Series on Biometrics).Springer-Verlag New York.
  • C. Rathgeb and A. Uhl.(2011). A survey on biometric cryptosystems and cancelable biometrics.EURASIP Journal on Information Security, Volume 3.
  • K. Nandakumar and A. K. Jain.(2008). Multibiometric template security using fuzzy vault. In IEEE 2nd Int. Conf. on Biometrics: Theory, Applications, and Systems, BTAS, pp 1-6.
  • C. Vielhauer, R. Steinmetz, and A. Mayerhöfer.(2002). Biometric hash based on statistical features of online signatures.ICPR: Proc. of the 16th International. Conference on Pattern Recognition.Volume 1.
  • A. Nagar, K. Nandakumar, and A. K. Jain.(2012). Multibiometric cryptosystems based on feature level fusion.IEEE Transactions on Information Forensics and Security, 7(1), pp.255-268.
  • I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis. (2006). Fuzzy extractors for continuous distributions.Technical report, University of Twente.
  • E. J. C. Kelkboom, J. Breebaart, I. Buhan, and R. N. J. Veldhuis.(2010). Analytical template protection performance and maximum key size given a gaussian modeled biometric source.Proc. of SPIE defense, security and sensing.
  • T. Ignatenko and F. M. J. Willems.(2010). Information leakage in fuzzy commitment schemes.Trans. on Information Forensics and Security, 5(2), pp.337-348.
  • X. Zhou, A. Kuijper, R. N. J. Veldhuis, and C. Busch.(2011). Quantifying privacy and security of biometric fuzzy commitment. International Joint Conf. on Biometrics - IJCB, pp. 1-8.
  • Karthik Nandakumar, Anil K. Jain. (2015). Biometric Template Protection: Bridging the Performance Gap between Theory and Practice. IEEE Signal Processing Magazine, Special issue of Biometric security and privacy.

Abstract Views: 445

PDF Views: 7




  • Challenges Arising from Multi-Modal Biometric Template Security Schemes

Abstract Views: 445  |  PDF Views: 7

Authors

Pratap P. Patil
Swami Ramanand Teerth Marathwada University, Nanded, Maharashtra, India
Sudhir B. Jagtap
Swami Ramanand Teerth Marathwada University, Nanded, Maharashtra, India

Abstract


Since the inception of Biometric authentication system in 1870, a wide variety of applications like Computer systems, laptops, mobile phones, ATM, access to buildings etc. are increasing in the 21st century. In the absence of such robust authentications systems, these systems are vulnerable to the wiles of an imposter. It is believed that the biometric authentication systems are the ultimate form of personal identification and encouraged because of convenience, high security etc. these are the solutions to the limitations of identity theft. Also biometric systems are safer, convenient, cost effective and cheaper to implement than traditional identification and verification systems.

The protection of Uni-modal or Multi-modal biometric templates is fundamental. In case of biometric data theft, an attacker can gain possession of a legal user's identity and this can have serious consequences like bank account fraud, unauthorized payments or receipts, privacy violations, etc. Furthermore, once stolen, is impossible to modify the individual traits to resolve the problem and reuse them; the biometric data become unusable.For such reasons, it's important to guarantee the protection of biometric characteristics to ensure security and privacy.However, the Template protection scheme may reduce the system's recognition performances, affecting the quality of the overall biometric authentication process.

Nonetheless, biometric system also have their own limitations, e.g. username , passwords, PIN, ID cards can be replaced or re-issued easily if they are compromised, which is not possible in case of individual's fingerprint, face, voice, retina etc. In this paper, an attempt is made to identify the challenges arising out of Multi-modal biometric template protection schemes.


Keywords


Multi-Biometric Systems, Multimodal Biometric, Biometric Template Security, Template Protection, Feature Transformation, Biometric Cryptosystems.

References