Biometric template security: an overview

被引:13
作者
Riaz, Naveed [1 ]
Riaz, Ayesha [1 ]
Khan, Sajid Ali [2 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[2] Fdn Univ, Dept Software Engn, Islamabad, Pakistan
关键词
Biohashing; Biometric cryptosystem; Biometrics security; FUZZY COMMITMENT; AUTHENTICATION; FILTERS; VAULT;
D O I
10.1108/SR-07-2017-0131
中图分类号
TH7 [仪器、仪表];
学科分类号
0804 ; 080401 ; 081102 ;
摘要
Purpose - The security of the stored biometric template is itself a challenge. Feature transformation techniques and biometric cryptosystems are used to address the concerns and improve the general acceptance of biometrics. The purpose of this paper is to provide an overview of different techniques and processes for securing the biometric templates. Furthermore, the paper explores current research trends in this area. Design/methodology/approach - In this paper, the authors provide an overview and survey of different features transformation techniques and biometric cryptosystems. Findings - Feature transformation techniques and biometric cryptosystems provide reliable biometric security at a high level. There are many techniques that provide provable security with practical viable recognition rates. However, there remain several issues and challenges that are being faced during the deployment of these technologies. Originality/value - This paper provides an overview of currently used techniques for securing biometric templates and also outlines the related issues and challenges.
引用
收藏
页码:120 / 127
页数:8
相关论文
共 80 条
  • [31] Identification of humans using gait
    Kale, A
    Sundaresan, A
    Rajagopalan, AN
    Cuntoor, NP
    Roy-Chowdhury, AK
    Krüger, V
    Chellappa, R
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (09) : 1163 - 1173
  • [32] Kang H., 2014, 16 INT C ADV COMM TE
  • [33] Kevenaar T., 2006, ELECT IMAGING
  • [34] Kholmatov A., 2006, INT S COMP INF SCI
  • [35] An analysis of BioHashing and its variants
    Kong, Adams
    Cheung, King-Hong
    Zhang, David
    Kamel, Mohamed
    You, Jane
    [J]. PATTERN RECOGNITION, 2006, 39 (07) : 1359 - 1368
  • [36] Kumar A., 2008, P SPIE C BIOM TECHN
  • [37] Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault
    Kumar, Amioy
    Kumar, Ajay
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [38] Lee Y. J., 2007, INT C BIOM
  • [39] A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
    Li, Cai
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (03) : 543 - 555
  • [40] Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
    Li, Hengjian
    Zhang, Jiashu
    Zhang, Zutao
    [J]. INFORMATION SCIENCES, 2010, 180 (20) : 3876 - 3893