Abstract
In this paper we present a new approach for biometric template protection. Our objective is to build a preliminary non-invertible transformation approach, based on random projection, which meets the requirements of revocability, diversity, security and performance. We use the chaotic behavior of logistic map to build the projection vectors using a new technique that makes the construction of the projection matrix depend on the biometric template and its identity. Experimental results conducted on several face databases show the ability of our technique to preserve and increase the performance of protected systems. Moreover, we demonstrate that the security of our approach is sufficiently robust to possible attacks.
Chapter PDF
Similar content being viewed by others
References
Ratha, N.K., Connell, J.H., Bolle, R.M.: An Analysis of Minutiae Matching Strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing (2008)
Syverson, P.: A taxonomy of replay attacks. In: The Computer Security Foundations Workshop (1994)
Adler, A.: Vulnerabilities in Biometric Encryption Systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)
Adler, A.: Images can be regenerated from quantized biometric match score data. In: The Canadian Conference on Electrical and Computer Engineering (2004)
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal (2004)
Breebaart, J., Yang, B., Buhan-Dulman, I., Busch, C.: Biometric Template Protection: The need for open standards. Privacy and Data Security Journal (2009)
Lam, K., Beth, T.: Timely authentication in distributed systems. In: The European Symposium on Research in Computer Security (1992)
Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition (2002)
Teoh, A.B.J., Toh, K.-A., Yip, W.K.: 2N Discretisation of BioPhasor in Cancellable Biometrics. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 435–444. Springer, Heidelberg (2007)
Yang, B., Hartung, D., Simoens, K., Busch, C.: Dynamic Random Projection for Biometric Template Protection. In: The 7th Framework Programme of the European Union, Project TURBINE, ICT-2007-216339 (2010)
Goel, N., Bebis, G., Nefian, A.: Face Recognition Experiments with Random Projection. In: SPIE Defense and Security Symposium (Biometric Technology for Human Identification), Orlando, FL, March 28-April 1 (2005)
Wang, Y., Plataniotis, K.N.: Face Based Biometric Authentication with Changeable and Privacy Preservable templates. In: Biometrics Symposium (2007)
Achlioptas, D.: Database-friendly random projections. In: ACM Symposium on the Principles of Database Systems, pp. 274–281 (2001)
Gu, S., Tan, Y., He, X.: Laplacian Smoothing Transform for Face Recognition. Science in China Series F-Information Sciences (2009)
Gu, S., Tan, Y., He, X.: Discriminant Analysis via Support Vectors. Neurocomputing (2009)
Nagar, A., Nandakumar, K., Jain, A.K.: Biometric Template Transformation: A Security Analysis. SPIE Digital Library (2010)
Moujahdi, C., Ghouzali, S., Mikram, M., Abdul, W., Rziza, M.: Inter-communication classification for multi-view face recognition. In: International Conference on Multimedia Computing and Systems (ICMCS), Tangier, Morocco (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moujahdi, C., Ghouzali, S., Mikram, M., Rziza, M., Bebis, G. (2012). Spiral Cube for Biometric Template Protection. In: Elmoataz, A., Mammass, D., Lezoray, O., Nouboud, F., Aboutajdine, D. (eds) Image and Signal Processing. ICISP 2012. Lecture Notes in Computer Science, vol 7340. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31254-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-31254-0_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31253-3
Online ISBN: 978-3-642-31254-0
eBook Packages: Computer ScienceComputer Science (R0)