references - Academic Science,International Journal of Computer

advertisement
Comparative Study on Biometric Template Protection
Schemes
Ruchi Nagpure
Nilmani Verma
(Research Scholar)
(HOD of computer science and engg.)
School of Engineering and IT, MATS
University, Raipur, India
ruchi.nagpure@gmail.com
School of Engineering and IT, MATS
University, Raipur, India
nilmaniv@matsuniversity.ac.in
results are combined together. Through this matching
performance can be increased.
ABSTRACT
Biometric cryptosystem is the combination of cryptography and
biometrics to enhance the security as misuse of biometric data can be
avoided by using cryptosystem. In order to overcome the problems of
unibiometric that is non- uviversality and less accuracy,
multibiometrics seems to be more reliable. Multibiometric system
means using more than one trait (eg. Fingerprint, iris, face, palmprint
etc.) for identification of a person. This system increases security and
is more accurate. However, multibiometric for each user needs to be
stored as separate entities which in turn increases the risk to user
privacy and security of the system. Therefore, fusion scheme is
applied to ensure user’s privacy and system security and biometric
cryptosystem is applied for template protection. Two well known
biometric cryptosystem namely key generation and key binding are
studied. A significant amount of approaches for both fusion scheme
and template protection has been published in the previous years. In
this paper comprehensive overview of research in fusion and
template protection is presented.
Keywords
multibiometric crptosystem, fusion, template protection.
Fig. 1 Shows feature level fusion of two biometric traits.
iris
fingerprint
Feature
Extraction
Feature
Extraction
Fused Set of
Features
Matching Module
I. INTRODUCTION
Biometric means recognizing a person based on his/her behavioral or
physical traits [1]. Unibiometric suffers from the problem of nonuniversality, uniqueness and less accuracy. To overcome these
problems, multibiometric appears to be more reliable and accurate.
Multibiometric systems is a combination of different biometric
modalities (e.g.- iris, palmprint, fingerprint etc.) to identify a
person[2]. In comparison to unibiometric system, multibiometric
system provides higher accuracy rate and high level of security.
Decision
Database(Stored
template)
Accept/Reject
Fig. 1 Feature level fusion of two biometric traits
Fusion of different modalities results in multibiometric. Fusion is
categorized in 3 levels- [3]
1.
Feature level fusion: In this level features from different
modalities are combined and a new feature vector is
constructed.
2.
Score level fusion: Feature vectors extracted from the input
image are processed separately for the generating a
matching score of each. Then the match score is combined.
3.
Decision level fusion: In this, for each biometric trait a
separate authentication decision is made and then final
For the security of biometric templates proper attention has not
been given. Multibiometric templates desires to be protected as the
leakage of biometric template information can lead to security and
privacy threat due to intrusion attack and function creep [3]. Hence,
biometric cryptosystem which is combination of biometric &
cryptography provides better key management & security.
The challenges for unibiometric cryptosystem focuses on 3
fundamental challenges- template security, feature extraction and
error tolerance. Security is the main challenge which has to be taken
care of while designing BC [5]. For resolving the purpose 3
frameworks are designed- fuzzy commitment [6], fuzzy vault [7], and
fuzzy extractor [8]. In fuzzy commitment a codeword is XORed with
the template and secure sketch is generated. During authentication
new codeword is formed and key is generated. If the hash value of
both the key is same, it is authentic. In fuzzy vault, security depends
on the infeasibility of the polynomial reconstructions problem and is
generally used to secure biometric features which are point-set. In
fuzzy extractor, two primitives are used secure sketch and fuzzy
extractor. In secure sketch biometric is given as input and a sketch is
generated which does not reveal much information about the
biometric and in fuzzy extractor a random string R is extracted.
1.1 Literature Review
In [9], the author presented preprocessing of the fingerprint and
how efficiently features can be extracted from the enhanced image.
Post processing is also done after minutiae extraction to validate the
minutiae. In [10], iris detection is done. For finding the inner
boundary, bisection method is used by the authors. To find collarette
boundary histogram equalization is used. In [11], the authors have
proposed a multimodal system taking features of fingerprint, palm
print and hand geometry. These biometrics are taken from the
identical image. Firstly fusion of fingerprint and palm print is
performed at matching score level and then matching score fusion
between multimodal system and unimodal system i.e. hand geometry
is performed. In [12], the authors proposed a multimodal system
combining finger print and iris. Decision is considered from each
modality and then finally combined by “AND” operator. In [13], the
authors proposed polar, surface and Cartesian folding transformations
to generate cancellable finger print. According to [14] biometric
cryptosystem can be classified in two major categories namely 1. Key
binding 2. Key generation. Key binding is a mechanism in which
helper data is obtained by combining biometric template with a key.
Key generation is a mechanism in which helper data is derived from
the template and helper data helps to generate the cryptographic key.
Fig.2 Different template Protection scheme. In [15], author proposed
a multimodal system in which finger print and face template are
taken as biometrics and are combined to form a binary string. The
binary strings that are obtained are concatenated and further fuzzy
commitment scheme is applied. In [4], authors proposed a
multibiometric cryptosystem that is based on feature level fusion
which in turn generates a single secure sketch and for both binary
string and point-set based representations practical implementation
issues are considered. In [16], authors proposed a modular approach
for multibiometric cryptosystem which takes two biometrics and
from first biometric sketch is obtained along with the hash value of
1st biometric which is then used to secure second template. In [17],
authors proposed an approach biometric templates or passwords are
combined in a single secure sketch in cascaded manner. In [18], the
authors proposed a methodology in which biometric template pass
through cancellable transformation. Further decision is made by
using individual classifiers and finally fusion is implemented at the
decision level using any of unimodal and unialgorithm, unimodal and
multialgorithm, multimodal and multialgorithm. This results that
recognition task becomes more difficult and complex when
cancellable biometrics are used. In [19], authors have proposed
hybrid template protection scheme which is carried out in 3 stages.
Firstly feature level fusion is performed. In second stage random
feature set is generated and in third stage template bit string is
obtained. This ensures that diversified and revocable templates will
be generated. In [20], authors have proposed an optional
multibiometric that is based on fuzzy extractor. Fuzzy extractor
extracts a stable codeword from biometric trait and a codeword set is
formed. Secret share procedure would generate a public template
with the help of a random key. Fuzzy extractor is responsible for the
security. The rest of the paper is organized as follows-
Section II provides brief introduction of cryptosystem. Section III
provides the different methodologies used. Results are discussed in
section IV. Conclusion and future work are summarized in section V.
II. PROBLEM DEFINITION
Cryptosystem makes reference to the aggregation of cryptographic
algorithms that is needed to implement a security service and
confidentiality. Cryptosystem is basically used when the
cryptographic algorithms that is needed to implement a security
service and confidentiality. Cryptosystem is basically used when the
concept of key generation is important. Biometric cryptosystems
combine both cryptography and biometrics to provide better security
and take the advantage of both cryptograpy and biometric.
Template Protection
Feature Transformation
Salting
Noninvertible
Transforms
Biometric Cryptosystem
Key
binding
Key
generation
Fig. 2 Different template Protection schemes
III. METHODOLOGY
A.Nagar, K.Nandakumar, A.K.Jain proposed a multibiometric
system with feature level fusion which secures templates by using
biometric cryptosystem [4]. Fig. 3 Shows the schematic diagram for
multibiometric Cryptosystem. Firstly biometric templates are taken as
input and if they are heterogeneous then conversions from binary to
point-sets, point-sets to binary string and real valued vectors to binary
strings. Second fusing of these biometric templates is done by simply
concatenating the string which can be secured by using two known
biometric cryptosystems namely fuzzy vault if the string is point-set
and fuzzy commitment in case of binary string. Thirdly imposing a
minimum matching constraint for different modalities in a
multibiometric cryptosystems. This paper not only provides security
to the multibiometric templates but also to the unibiometric template
by applying unique keys that are different form the one used in
securing multibiometric template which in turn generates a
unibiometric secure sketch. Finally this unibiometric secure sketch is
binded with the key that helped in generating multibiometric
template. For authentication purpose the key associated with the
multibiometric template needs to be recovered and further
unibiometric secure sketch are decoded. Experiments are conducted
on two databases which contains face, fingerprint and iris. This
system demonstrates that multibiometric cryptosystem is not only
beneficial in increasing matching performance but simultaneously
increases the template security.
Anne M.P. Canuto, Fernando Pintro, Joao C. Xavier. This paper
investigates multibiometric cancellable recognition with different
fusion approaches [18]. Fig. 4 shows Structure of the methodology.
The authors proposed a framework that takes biometric template as
input and passes it through cancellable transformation module,
training is provided to these transformed templates by individual
classifiers and then decision level fusion is performed following any
of the three approaches (unimodal and unialogorithm, unimodal and
multialgorithm, multimodal and multialgorithm). In this paper,
investigation of ensemble based multibiometric cancellable systems
for different fusion approaches is analyzed. Original biometric data
are also used for the comparison purpose without any cancellable
transformation.
Biometric
Template 1
Biometric
Template 2
Embedding
algorithm
Embedding
algorithm
Chi Chen, chaogang Wang, Iengfei Yang, Dongdai Lin, Song Wang,
Jiankun Hu [5]. In this paper an optional multibiometric system based
on fuzzy extractor is proposed. Two procedures are followed in this
scheme. First fuzzy extractor extracts a stable codeword from the
feature vectors of each biometric traits, from all the generated
codewords a codeword set is formed. Secret Share forms a public
template by binding codewords with a random key. During
verification,
Biometric trait
Biometric Trait
Biometric
Template
Biometric
Template
Cancellable
Transforma
tion
Cancellable
Transforma
tion
Cancellable
Transforma
tion
Cancellable
Transforma
tion
Individual
Classifiers
Individual
Classifiers
Individual
Classifiers
Individual
Classifiers
Fusion
Uni-algorithm
Uni-modal fusion
Key (kc)
Biometric
Cryptosystem
Multibiometric
Secure Sketch
Database
(Stored Template)
Fig. 3 Schematic diagram for multibiometric Cryptosystem
As a result, it is demonstrated that, when using more than one
transformation cancellable transformations are more efficient.
Increase in accuracy level when multimodal fusion is did. Thus, when
multialgorithm and multifusion all the three cancellable
transformation were combined it delivered the highest result.
Y.J. chin, T.S. Ong, A.B.J. Teoh, K.O.M. Goh [19]. Fig. 5 shows a
schematic diagram of hybrid template protection method. In this
paper the authors proposed a hybrid template protection scheme.
Integration of fingerprint and palmprint is done at feature level. To
the fused feature a random tiling is applied. To generate the template
bit string random features are discretized. This proposed method in
both stolen and plain token scenario gives a promising result.
Evaluation illustrates that this proposed method provides
discrimination against imposters. Diversified and revocable templates
are also generated.
Uni-algorithm
Uni-modal fusion
Uni-algorithm
Uni-modal fusion
Fig. 4 Structure of the methodology.
the key is recovered with the help of correct codewords. Further hash
values of both the keys are matched for validating the genuine user.
This proposed system shows feasibility and efficiency. The security
of this system is based on fuzzy extractor.
IV. RESULT
The biometric trait iris with fuzzy vault individually gives the
result at GAR of 90% which is at 45 bits. When face and fingerprint
are involved then security is at 90 bits for the same GAR. This is for
virtual database. For real multimodal database proposed fusion for
fuzzy vault GAR is 68% and fuzzy commitment GAR is 75%. For
virtual database proposed fusion gives the result of 99% of GAR for
both fuzzy vault and fuzzy commitment. For optional multibiometric
based fuzzy extractor FAR is 0.1%.
V. CONCLUSION AND FUTURE WORK
The different methodologies presented here provides security to the
biometric template with the use of biometric cryptosystem or
cancellable transformations. Biometric cryptosystem namely fuzzy
vault, fuzzy commitment and fuzzy extractor improves the security
and matching performance of the system. By using these template
protection schemes it becomes difficult for the hacker to guess which
type of biometric is used or how many. There are some critical issues
that needs to be investigated further, firstly, different feature extraction
techniques can be used. Secondly, other fusion scheme to generate a compact
template. Most intensive work is to improve the security.
Biometric Trait
Biometric Trait
Preprocessing
Preprocessing
Fusion
Fused Feature
Random Tiling
Helper Data
Generation
Discretization
Database
Template Bit
String
Fig. 5 Schematic diagram of hybrid template protection method
REFERENCES
[1] S.C. Dass, K. Nandakumar & A.K. Jain, Secure and
reliable
Multimodal System.
[2] A. Ross, K. Nandakumar, and A.K. Jain, Handbook of
Multibiometrics. New York: Springer, 2006.
[3] Austin Hicklin, Brad Ulery, Craig Watson “A brief introduction
to biometric fusion” 16 june 2006.
[4] A. Nagar, A.K. Jain, K. Nandakumar “Multibiometric
cryptosystems
based on feature-level fusion” IEEE
Transactions on Information Forensices and Security 7 (2012)
255–268.
[5] Chi Chen, chaogang Wang, Iengfei Yang, Dongdai Lin, Song
Wang, Jiankun Hu “Optional multibiometric cryptosystem based on
fuzzy extractor”, Proceedings of IEEE 2014, 11th International
Conference on Fuzzy Systems and Knowledge Discovery. 989-994.
[6] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in
Proc. Sixth ACM Conf. Computer and Communications Security,
Singapore, Nov. 1999, pp. 28–36.
[7] A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proc. IEEE
Int. Symp. Information Theory, Lausanne, Switzerland, 2002, p.
408.
[8] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy
Extractors: How to Generate Strong Keys from Biometrics and
Other Noisy Data cryptology ePrint Archive, Tech. Rep. 235,
Feb. 2006, A preliminary version of this work appeared in
EUROCRYPT 2004.
[9] Raymond Thai “Fingerprint Image enhancement and Minutiae
Extraction” year 2003 School of Computer Science and Software
Engineering, The University of Western Australia, 2003.
[10] H. Sung, J. Lim, J. Park, and Y. Lee. Iris recognition using
collarette boundary localization. In 17th International
Conference on PatternRecognition, volume 4, pages 857–860,
2004.
[11] F. Yang, B.MA, “A new mixed mode biometrics information
fusion based on fingerprint, hand geometry and palm print”.
Proceedings 4th International IEEE Conf. Image Graph, 2007, pp689-693.
[12] F. Besbes, H. Trichili, and B. Solaiman, “Multimodal biometric
system based on Fingerprint identification and iris recognition” in
proceedings 3rd International IEEE conf. Inf. Communication
technology. ICITA 2008, pp-1-5.
[13] N.K. Ratha, S.Chikkerur, J.H. Connell, R.M. Bolle, “Generating
cancellable fingerprint templates”, IEEE transaction on paper
analysis and machine intelligence 29, 2007. pp-561-572.
[14] A.K. Jain, K. Nandakumar, A. Nagar, “Biometric Template
Security”. EURASIP journal on advances in signal processing,
2008.
[15] Y. sutcu, Q. Li, and N. Memon, “Secure biometric templates from
fingerprint-face features” in Proc. CVPR Workshop Biometrics,
june 2007.
[16] S. Cimato, M. Gamassi, V. Piuri, R. Rassi, and F. Scotti,
“Privacy-aware biometrics: Design and Implementation of a
multimodal verification system” in proc. IEEE annual conference
Computer Security Applications, 2008.
[17] C. Fang, Q.Li, and C. Chang, “Secure sketch for multiple secrets”
in proc. International Conference Applied Cryptography and
Network Security, 2010.
[18] Anne M.P. Canuto, F. Pintro, J.C. Xavier-jr., “Investigating
fusion approaches in multibiometric cancellable recognition”
Expert Systems with Applications, Elsevier, 2013. pp-1971-1980.
[19] Y. J. Chin, T.S. Ong, A.B.J. Teoh, K.O.M. Goh, “Integrated
biometrics template protection technique based on fingerprint and
palm print feature level fusion”. Expert Systems with
Applications, Elsevier, 2014. pp-161-174.
Download