Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security

Published: 01 November 2011 Publication History

Abstract

Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely ''two dimensional (2D) Palmprint Phasor'', the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme.

References

[1]
High security iris verification system based on random secret integration. Computer Vision and Image Understanding. v102 i2. 169-177.
[2]
PalmHashing: a novel approach for cancelable biometrics. Information Processing Letters. v93 i1. 1-5.
[3]
Feng YC, Yuen PC, Jain AK. A hybrid approach for face template protection. In: Proceedings of the SPIE, biometric technology for human identification V 6944; 2008, p. 8-11.
[4]
A hybrid approach for generating secure and discriminating face template. IEEE Transactions on Information Forensics and Security. v5 i1. 103-107.
[5]
Palmprint verification using binary orientation co-occurrence vector. Pattern Recognition Letters. v30 i13. 1219-1227.
[6]
Chaos-based scramble self-embedding watermarking algorithm. Journal on Communications. v27 i7. 80-86.
[7]
Information leakage in fuzzy commitment schemes. IEEE Transactions on Information Forensics and Security. v5 i2. 337-348.
[8]
Biometric template security. EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics. 1-20.
[9]
Juels A, Wattenberg M. A fuzzy commitment scheme. In: Proceedings of sixth ACM conference computer and communication security; 1999, p. 28-36.
[10]
Juels A, Sudan M. A fuzzy vault scheme. In: Proceedings of IEEE international symposium on information theory; 2002, p. 408.
[11]
Jeong MY, Lee CH, Kim JS, Choi JY, Toh KA, Kim JH. Changeable biometrics for appearance based face recognition. In: Proceedings of 2006 biometrics symposium: special session on research at the biometric consortium conference; 2006, p. 1-5.
[12]
Jeong MY, Choi JY, Kim JH. Using genetic algorithms to improve matching performance of changeable biometrics from combining PCA and ICA methods. In: Proceedings of IEEE conference on computer vision and pattern recognition; 2007, p. 1-5.
[13]
Palmprint verification based on robust line orientation code. Pattern Recognition. v41 i5. 1504-1513.
[14]
Chaotic secure content-based hidden transmission of biometric templates, Chaos. Solitons & Fractals. v32 i5. 1749-1759.
[15]
Chaos and NDFT-based concealing of fingerprint-biometric data into audio signals for trustworthy person authentication. Digital Signal Processing. v20 i1. 179-190.
[16]
An analysis of BioHashing and its variants. Pattern Recognition. v39 i7. 1359-1368.
[17]
A performance driven methodology for cancelable face templates generation. Pattern Recognition. v43 i7. 2544-2559.
[18]
Kumar A, Kumar A. A palmprint based cryptosystem using double encryption. In: Proceedings of the SPIE 6944; 2008 {69440D_1-69440D_9}.
[19]
A survey of palmprint recognition. Pattern Recognition. v42 i7. 1408-1418.
[20]
Palmprint identification using feature-level fusion. Pattern Recognition. v39 i3. 478-487.
[21]
Kong AWK, Zhang D. Competitive coding scheme for palmprint verification. In: Proceedings of the 17th international conference on pattern recognition; 2004, p. 520-3.
[22]
Three measures for secure palmprint identification. Pattern Recognition. v41 i4. 1329-1337.
[23]
Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes. Information Sciences. v180 i20. 3876-3893.
[24]
A novel chaotic stream cipher and its application to palmprint template protection. Chinese Physics B. v19 i4.
[25]
Cancelable PalmCode generated from randomized Gabor filters for palmprint template protection. Scientific Research and Essays. v6 i4. 784-792.
[26]
Enhancing security and privacy in biometrics-based authentication systems. IBM System Journal. v40 i3. 614-634.
[27]
Ratha N, Connell J, Bolle R, Chikkerur S. Cancelable biometrics: a case study in fingerprints. In: Proceedings of international conference on pattern recognition 4; 2006, p. 370-3.
[28]
Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence. v29 i4. 561-752.
[29]
Savvides M, Vijaya Kumar BVK, Khosla PK. Cancelable biometric filters for face recognition. In: Proceedings of international conference on pattern recognition 3; 2004, p. 922-5.
[30]
Shi RQ, Sun DM. A new security scheme based on palmprint biometrics for signature. In: Proceedings of first IEEE international conference on biometrics: theory, applications, and systems, 2007; p. 1-6.
[31]
Sun Z, Tan T, Wang Y, Li SZ. Ordinal palmprint representation for personal identification. In: Proceedings of IEEE international conference on computer vision and pattern recognition; 2005, p. 279-84.
[32]
Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition. v37 i1. 2245-2255.
[33]
Cancellable biometrics featuring with tokenised random number. Pattern Recognition Letters. v26 i10. 1454-1460.
[34]
Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence. v28 i12. 1892-1901.
[35]
Remarks on BioHashing based cancelable biometrics in verification system. Neurocomputing. v69 i16-18. 2461-2464.
[36]
Teoh ABJ, Ngo DCL. Biophasor: token supplemented cancellable biometrics. In: Proceedings of ninth international conference on control, automation, robotics and vision; 2006, p. 1-5.
[37]
Teoh ABJ, Toh KA, Yip WK. 2^N discretisation of BioPhasor in cancellable biometrics. In: Proceedings of international conference on biometrics 4642; 2007, p. 435-44.
[38]
Wu XQ, Zhang D, Wang KQ. A cryptosystem based on palmprint feature. In: Proceedings of 19th international conference on pattern recognition; 2008, p. 1-4.
[39]
A palmprint cryptosystem. Lecture Notes in Computer Science. v4642. 1035-1042.
[40]
On-line palmprint identification. IEEE Transactions on Pattern Analysis and Machine Intelligence. v25 i9. 1041-1050.

Cited By

View all
  • (2024)An Overview of Privacy-Enhancing Technologies in Biometric RecognitionACM Computing Surveys10.1145/366459656:12(1-28)Online publication date: 14-May-2024
  • (2024)A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data StorageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346186919(8587-8599)Online publication date: 1-Jan-2024
  • (2024)Feature extraction and learning approaches for cancellable biometricsCAAI Transactions on Intelligence Technology10.1049/cit2.122839:1(4-25)Online publication date: 22-Jan-2024
  • Show More Cited By
  1. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Journal of Network and Computer Applications
        Journal of Network and Computer Applications  Volume 34, Issue 6
        November, 2011
        281 pages

        Publisher

        Academic Press Ltd.

        United Kingdom

        Publication History

        Published: 01 November 2011

        Author Tags

        1. Biometric cryptosystem
        2. Biometric protection
        3. Cancelable biometrics
        4. Dual-key-binding cancelable palmprint
        5. Information security
        6. Palmprint Phasor

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)An Overview of Privacy-Enhancing Technologies in Biometric RecognitionACM Computing Surveys10.1145/366459656:12(1-28)Online publication date: 14-May-2024
        • (2024)A Dual-Level Cancelable Framework for Palmprint Verification and Hack-Proof Data StorageIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346186919(8587-8599)Online publication date: 1-Jan-2024
        • (2024)Feature extraction and learning approaches for cancellable biometricsCAAI Transactions on Intelligence Technology10.1049/cit2.122839:1(4-25)Online publication date: 22-Jan-2024
        • (2024)Proposed homomorphic DWT for cancelable palmprint recognition techniqueMultimedia Tools and Applications10.1007/s11042-023-15710-583:4(9479-9502)Online publication date: 1-Jan-2024
        • (2024)BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCSCluster Computing10.1007/s10586-023-04134-327:3(3135-3148)Online publication date: 1-Jun-2024
        • (2023)Authentication-based multimodal biometric system using exponential water wave optimization algorithmMultimedia Tools and Applications10.1007/s11042-023-14498-882:20(30275-30307)Online publication date: 15-Feb-2023
        • (2022)Upgrading Information Security and Protection for Palm-Print TemplatesWireless Personal Communications: An International Journal10.1007/s11277-022-09805-9126:2(1535-1551)Online publication date: 1-Sep-2022
        • (2022)Biometric cryptosystems: a comprehensive surveyMultimedia Tools and Applications10.1007/s11042-022-13817-982:11(16635-16690)Online publication date: 30-Sep-2022
        • (2022)Vision based leather defect detection: a surveyMultimedia Tools and Applications10.1007/s11042-022-13308-x82:1(989-1015)Online publication date: 11-Jun-2022
        • (2022)Towards a fully homomorphic symmetric cipher scheme resistant to plain-text/cipher-text attacksMultimedia Tools and Applications10.1007/s11042-022-12043-781:10(14403-14449)Online publication date: 1-Apr-2022
        • Show More Cited By

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media