生物特征模板保护
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.60621001, 60875018 (国家自然科学基金), the National High-Tech Research and Development Plan of China under Grant No.2008AA01Z411 (国家高技术研究发展计划(863)); the Hundred Talents Program of the Chinese Academy of Sciences (中国科学院百人计划); the Beijing Municipal Natural Science Foundation of China under Grant No.4091004 (北京市自然科学基金)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [73]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    对当前国内外生物特征模板保护技术发展的现状进行综述和探索,对该方向的研究内容进行详细的梳理和分类.首先阐述传统生物特征识别系统存在的本质缺陷和易于遭受到的攻击的形式,进而从理论上引出了生物特征模板保护的必要性及其难点所在.然后以模板保护算法的具体操作方式为分类标准,详细阐述了当前在这个领域出现的比较有代表性的算法,诸如Biohashing和模糊保险箱(Fuzzy Vault)等.通过实验验证了Biohashing算法的优势和缺陷,并且在FVC2002 DB2数据库上对提出的改进Fuzzy Vault算法进

    Abstract:

    This paper reviews the state-of-the-art of biometric template protection technology domestic and abroad, and then systemizes almost all the related research directions. First it is clarified that the underlying disadvantages of traditional biometric systems and the attacks they are vulnerable to. Then the necessity and difficulty of protecting biometric template are drawn naturally. Afterwards this paper classifies the methods and algorithms into various categories based on the operation manner, and elaborates specifically some representative ones, such as Biohashing and Fuzzy Vault and so on. In the experiment, evaluations of Biohashing and Fuzzy Vault are carried on different fingerprint databases, and the results show the advantages and disadvantages of Biohashing method, as well as our improved Fuzzy Fingerprint Vault’s better performance and security on FVC2002 DB2.

    参考文献
    [1] Tian J, Yang X. Biometric Recognition Theory and Application. Beijing: Publishing House of Electronics Industry, 2005 (in Chinese).
    [2] Results in FVC2006. http://bias.csr.unibo.it/fvc2006/
    [3] Cappelli R, Lumini A, Daio D, Maltoni D. Fingerprint image reconstruction from standard templates. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2007,29(9):1489-1503.
    [4] Maltoni D, Maio D, Jain A, Prabhakar S. Handbook of Fingerprint Recognition. New York: Springer-Verlag. 2003. 281-283.
    [5] Ratha N, Connell JH, Bolle RM. An analysis of minutiae matching strength. In: Josef B, Fabrizio S, eds. Proc. of the Int'l Conf. on Audio and Video-based Biometric Person Authentication. Berlin: Springer-Verlag, 2001. 223-228.
    [6] Ratha N, Chikkerur S, Connell J, Bolle R. Generating cancelable fingerprint templates. IEEE Trans. on Pattern Analysis And Machine Intelligence, 2007,29(4):561-572.
    [7] Uludag U, Pankanti S, Prabhakar S, Jain A. Biometric cryptosystems: Issues and challenges. Proc. of the IEEE, 2004,92(6): 948-960.
    [8] Cavoukian A, Stoianov A. Biometric Encryption: A positive-sum technology that achieves strong authentication, security and privacy. Technical Report, Office of the Information and Privacy Commissioner of Ontario, 2007.
    [9] Tomko G, Soutar C, Schmidt G. Fingerprint controlled public key cryptographic system. U.S. Patent 5541994, 1996.
    [10] Wang X, Tian J, Wu Y. The application in network security of secure cryptosystem scheme integrated with automatic fingerprint authentication. Computer Application, 2000,2:53-54 (in Chinese with English abstract).
    [11] Jin A, Ling D, Goh A. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition ,2004,37:2245-2255.
    [12] Lumini A, Nanni L. An improved BioHashing for human authentication. Pattern Recognition, 2007,40:1057-1065.
    [13] Jain A, Prabhakar S, Hong L, Pankanti S. FingerCode: A filterbank for fingerprint representation and matching. In: Baldwin T, Sipple RS, eds. Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, Vol.2. New Jersey: IEEE Computer Society. 1999. 187-193.
    [14] Jin A, Goh A, Ling D. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2006,28(12):1892-1901.
    [15] Nanni L, Lumini A. Empirical tests on BioHashing. Neurocomputing, 2006,69(16-18):2390-2395.
    [16] Connie T, Jin A, Goh A, Ling D. PalmHashing: A novel approach for dual-factor authentication. Pattern Analysis & Applications, 2004,7(3):255-268.
    [17] Jin A, Ling D. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Letters, 2005,26(10): 1454-1460.
    [18] Nanni L, Lumini A. Random subspace for an improved BioHashing for face authentication. Pattern Recognition Letters, 2008,29(3): 295-300.
    [19] Jin A, Ling D, Goh A. Personalised cryptographic key generation based on FaceHashing. Computers & Security, 2004,23(7): 606-614.
    [20] Jin A, Ling D, Goh A. An integrated dual factor authenticator based on the face data and tokenised random number. In: Proc. of the ICBA 2004. LNCS 3072, 2004. 117-123.
    [21] Ling D, Jin A, Goh A. Eigenspace-Based face hashing. In: Proc. of the ICBA 2004.LNCS 3072, 2004. 195-199.
    [22] Ling D, Jin A, Goh A. Biometric Hash: High-Confidence face recognition. IEEE Trans. on Circuits And Systems for Video Technology, 2006,16(6):771-775.
    [23] Lumini A, Nanni L. An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers. Neurocomputing, 2006,69(13-15):1706-1710.
    [24] Jin A, Toh K, Yip W. 2N Discretisation of biophasor in cancellable biometrics. In: Proc. of the ICB 2007. LNCS 4642, 2007. 435-444.
    [25] Jin A, Yip W, Lee S. Cancellable biometrics and annotations on BioHash. Pattern Recognition, 2008,41(6):2034-2044.
    [26] Maio D, Nanni L. Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004. Neurocomputing, 2005,69(1-3):242-249.
    [27] Lumini A, Nanni L. An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers. Neurocomputing, 2006,69(13-15):1706-1710.
    [28] Nanni L, Lumini A. A multi-modal method based on the competitors of FVC2004 and on palm data combined with tokenised random numbers. Pattern Recognition Letters, 2008,29(9):1344-1350.
    [29] Ang R, Rei S, Luke M. Cancelable key-based fingerprint templates. In: Proc. of the ACISP 2005. LNCS 3574, 2005. 242-252.
    [30] Ratha N, Connell J, Bolle R, Chikkerur S. Cancelable biometrics: A case study in fingerprints. In: Proc. of the 18th Int'l Conf. on Pattern Recognition (ICPR 2006). New Jersey: IEEE Computer Society, 2006. 370-373.
    [31] Farooq, F. Bolle, R.M. Tsai-Yang Jea. Ratha, N. Anonymous and revocable fingerprint recognition. In: Proc. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR 2007). 2007. 1-7.
    [32] Farooq F, Ratha N, Jea T, Bolle R. Security and accuracy trade-off in anonymous fingerprint recognition. In: Proc. of the 1st IEEE Int'l Conf. on Biometrics: Theory, Applications, and Systems. 2007. 1-6. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp= &arnumber=4401917&isnumber=4401902
    [33] Lee C, Choi J, Toh K, Lee S, Kim J. Alignment-Free cancelable fingerprint templates based on local minutiae information. IEEE Trans. on Systems, Man, and Cybernetics-Part B: Cybernetics, 2007,37(4):980-992.
    [34] Tulyakov S, Farooq F, Govindaraju V. Symmetric hash functions for fingerprint minutiae. In: Singh S, Singh M, Apté C, Perner P, eds. Proc. of the Int'l Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance. Berlin: Springer-Verlag, 2005. 30-38.
    [35] Tulyakov S, Farooq F, Mansukhani P, Govindaraju V. Symmetric hash functions for secure fingerprint biometric systems. Pattern Recognition Letters, 2007,28(16):2427-2436.
    [36] Jain A, Ross A, Pankanti S. Biometrics: A tool for information security. IEEE Trans. on Information Forensics and Security, 2006, 1(2):125-143.
    [37] Moon D, Gil Y, Ahn D, Pan S, Chung Y, Park C. Fingerprint-Based authentication for USB token systems. In: Chae K, Yung M, eds. Proc. of the WISA 2003. LNCS 2908, Berlin: Springer-Verlag, 2004. 355-364.
    [38] Soutar C, Roberge D, Stoianov A, Gilroy R, Vijaya K. Biometric encryption. ICSA Guide to Cryptography, McGraw-Hill, 1999, http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
    [39] Davida G, Frankel Y, Matt B. On enabling secure applications through off-line biometric identification. In: Proc. the IEEE Symp. Privacy and Security, New Jersey: IEEE Computer Society, 1998. 148-157.
    [40] Juels A, Wattenberg M. A fuzzy commitment scheme. In: Proc. of the 6th ACM Conf. Computer and Comm. Security (CCCS). New York: ACM, 1999. 28-36.
    [41] Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. IEEE Trans. on Computers, 2006,55(9): 1081-1088.
    [42] Juels A, Sudan M. A fuzzy vault scheme. In: Lapidoth A, Teletar E, eds. Proc. IEEE Int'l Symp. on Information Theory. Institute of Electrical and Electronics Engineers, Inc., 2002. 408.
    [43] Clancy T, Kiyavash N, Lin D. Secure smartcard-based fingerprint authentication. In: Proc. of the ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop. Association for Computing Machinery, Inc., 2003. 45-52.
    [44] Yang S, Verbauwhede I. A secure fingerprint matching technique. In: Bebis G, Bourbakis N. Proc. of the WBMA 2003. Association for Computing Machinery, Inc., 2003. 89-94.
    [45] Yang S, Verbauwhede I. Secure fuzzy vault based fingerprint verification system. In: Proc. of the Record of the 28th Asilomar Conf. on Signals, Systems and Computers. Institute of Electrical and Electronics Engineers Computer Society, 2004. 577-581.
    [46] Yang S, Verbauwhede I. Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proc. of the IEEE Int'l Conf. on Acoustics, Speech, and Signal (ICASSP 2005), Vol.5. Institute of Electrical and Electronics Engineers Inc., 2005. 609-612.
    [47] Uludag U, Pankanti S. Jain A. Fuzzy Vault for Fingerprints. In: Kanade T, Jai AK, Ratha NK. Proc. of the 5th Int'l Conf. on AVBPA. Berlin: Springer-Verlag, 2005. 310-319.
    [48] Uludag U, Jain A. Securing fingerprint template: Fuzzy vault with helper data. In: Bhanu B, Ratha N. Proc. of the 2006 Conf. on Computer Vision and Pattern Recognition Workshop (CVPRW 2006). New Jersey: IEEE Computer Society 2006. 163.
    [49] Nandakumar K, Nagar A, Jain A. Hardening fingerprint fuzzy vault using password. In: Lee SW, Li SZ. Proc. of the ICB 2007. LNCS 4642, Berlin: Springer-Verlag, 2007. 927-937.
    [50] Nandakumar K, Jain A, Pankanti S. Fingerprint-Based fuzzy vault: Implementation and performance. IEEE Trans. on Information Forensics and Security, 2007,2(4):744-757.
    [51] Li Q, Liu Z, Niu X. Analysis and problems on fuzzy vault scheme. In: Proc. of the Int'l Conf. on Intelligent Information Hiding and Multimedia Signal (IIH-MSP 2006). New Jersey: IEEE Computer Society, 2006. 244-250.
    [52] Li J, Tian J, Yang X, Shi P, Li P. Topological structure-based alignment for fingerprint fuzzy vault. In: Proc. of the Int'l Conf. on Pattern Recognition, 2006.
    [53] Nyang D, Lee K. Fuzzy Face Vault. How to implement fuzzy vault with weighted features. In: Proc. of the Universal Access in HCI, (HCII 2007), LNCS 4554, Berlin: Springer-Verlag, 2007. 491-496.
    [54] Wang Y, Plataniotis K. Fuzzy vault for face based cryptographic key generation. In: Proc. of the Biometrics Symp. Berlin: Springer-Verlag, 2007. 1-6.
    [55] Lee Y, Bae K, Lee S, Park K, Kim J. Biometric key binding: Fuzzy vault based on iris images. In: Lee SW, Li SZ eds. Proc. of the ICB 2007. LNCS 4642, Berlin: Springer-Verlag, 2007. 800-808.
    [56] Scheirer W, Boult T. Cracking fuzzy vaults and biometric encryption. In: Proc. of the Biometrics Symp. 2007. 1-6.
    [57] Kholmatov A, Yanikoglu B. Realization of correlation attack against the fuzzy vault scheme. In: Proc. of the 2008 SPIE/ Biometrics, Security, Forensics, Steganography, and Watermarking of Multimedia Contents. 2008. http://citeseerx.ist.psu.edu/ viewdoc/download-doi=10.1.1.92.250&rep=rep1&type=pdf
    [58] Mihailescu P. The fuzzy vault for fingerprints is vulnerable to brute force attack. http://arxiv.org/abs/0708.2974v1
    [59] Chang E, Shen R, Teo F. Finding the original point set hidden among chaff. In: Proc. of the ASIACCS 2006. New York: ACM, 2006. 182-188.
    [60] Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin C, Camenisch J, eds. Proc. Eurocrypt. Berlin: Springer-Verlag, 2004. 2004. 523-540.
    [61] Dodis Y, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-Crypto, 2006. 232-250.
    [62] Buhan I, Doumen J, Hartel P, Veldhuis R. Fuzzy extractors for continuous distributions. In: Bao F, Miller S. Proc. of the ASIACCS 2007. New York: ACM, 2007. 353-355.
    [63] Boyen X. Reusable cryptographic fuzzy extractors. In: Proc. of the 11th ACM Conf. on Computer and Communications Security (CCS 2004). 2004. http://eprint.iacr.org/2004/358/
    [64] Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A. Secure remote authentication using biometric data. In: Cramer R, ed. Proc. of Advances in Cryptology 24th Annual International Conf. on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005). Springer-Verlag, 2005. 147-163.
    [65] Li Q, Sutcu Y, Memon N. Secure sketch for biometric templates. In: Lai XJ, Chen KF. Proc. of Advances in Cryptology 12th Int'l Conf. on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2006). 2006. 99-113.
    [66] Sutcu Y, Li Q, Memon N. Protecting biometric templates with sketch: Theory and practice. IEEE Trans. on Information Forensics and Security, 2007,2(3):503-512.
    [67] Tong V, Sibert H, Lecoeur J, Girault M. Biometric fuzzy extractors made practical: A proposal based on FingerCodes. In: Lee SW, Li SZ. Proc. of the ICB 2007. LNCS 4642, Berlin: Springer-Verlag, 2007. 604-613,
    [68] Arakala A, Jeffers J, Horadam K. Fuzzy extractors for minutiae-based fingerprint authentication. In: Lee SW, Li SZ. Proc. of the ICB 2007. LNCS 4642, Berlin: Springer-Verlag, 2007. 760-769.
    [69] Zhang F, Feng D, Sun Z. An iris authentication scheme based on fuzzy extractor. Journal of Computer Research and Development, 2008,45(6):1036-1042 (in Chinese with English abstract).
    [70] Menezes A, Oorschot P. Vanstone S. Handbook of Applied Cryptography. CRC Press, 1996.
    [71] Luo X, Tian J, Wu Y. A Minutia Matching Algorithm in Fingerprint Verification. In: Proc. of the 15th Int'l Conf. on Pattern Recognition (ICPR 2000). New Jersey: IEEE Computer Society, 2000. 833-836. 附中文参考文献: [1] 田捷,杨鑫.生物特征识别技术理论与应用.北京:电子工业出版社,2005.
    [10] 王星明,田捷,武岩.融合自动指纹认证的安全密码体制在网络安全中的应用.计算机应用,2000,2:53-54.
    [69] 张凡,冯登国,孙哲男.一种基于模糊提取的虹膜鉴别方案.计算机研究与发展,2008,45(6):1036-1042.
引用本文

李鹏,田捷,杨鑫,时鹏,张阳阳.生物特征模板保护.软件学报,2009,20(6):1553-1573

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2008-09-01
  • 最后修改日期:2008-11-28
文章二维码
您是第19727256位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号