A Review on Biometric Template Security (original) (raw)

Securing the Biometric template: A Survey

Authentication is considered as the most important security goal that demands attention. Many methods such as the use of passwords, smart cards, passcodes, biometrics etc. have been under use as authenticators. However of all these techniques biometrics are proved to be the best techniques of the all. Many organizations around the globe have deployed systems that make use of biometrics as authenticators. However, the main concern about such systems is the security of the biometric template that is stored in the database within the same system along with many other templates. The compromise of a biometric template is irreversible which is why it is of utmost importance that these templates are made secure. Many techniques and methods have already been proposed by researchers around the world to secure such templates. As everything comes with its pros and cons, this paper provides a critical overview of these techniques.

IJERT-Review Paper on Biometric Template Security

International Journal of Engineering Research and Technology (IJERT), 2021

https://www.ijert.org/review-paper-on-biometric-template-security https://www.ijert.org/research/review-paper-on-biometric-template-security-IJERTV10IS060164.pdf An accurate authentication plays a main job in secure communication. Conventional personal authentication methods were based on passwords and identity documents which fails to meet the performance and security of several important applications like E-commerce, banking, health care and many other fields where critical authentication is needed. The biometric authentication system works on features like fingerprint, voice and Iris. But the direct storage of fingerprint details he said that to the identity of the user which raises various privacy concerns. To address these problems various techniques have been introduced in recent years. These techniques have been introduced as a template protection mechanism to improve the confidentiality of the template. All this issues made the biometric authentication a highly desirable technique. Biometric Cryptosystems represents the emerging technologies in the biometric template protection schemes to address these threats. Biometric Cryptosystems is the combination of biometric with cryptography. In this literature review several aspects of biometric template generations and the security of the generated template are explained.

A Survey on Biometric Template Protection

Biometric authentication offers most reliable approach to person authentication. This authentication approach is based on the "what you are" security measure. However, biometric templates are vulnerable to different types of attacks and any data leakage cause privacy risks. Unlike passwords, stolen biometric data cannot be revoked or reissued hence biometric templates must be protected and any leakage of biometric information must be prevented. This paper surveys various biometric template protection schemes.

Assessment of vulnerabilities of the biometric template protection mechanism

International Journal of Advanced Technology and Engineering Exploration

In the ever-changing world of global data transmission, the security of data and individual privacy are the growing fears in today's human life worldwide. The major concerns are the protection of the biometric templates in the biometric identification and authentication process. Storage of the biometric template in the database raises the chance of compromising it, hence lead to serious threats and abuse of the person's identity. When an individual's registered biometric data is disclosed, their security and privacy can be compromised. Therefore, public acceptance of biometrics will depend on the system designer's ability to demonstrate that the systems are robust, with low error rates, and tamper proof. If someone's biometric template inside the database is compromised, that consequently might imply identification robbery of that individual. In the recent past, a considerable number of methods for biometric template protection have been published. This article explains, a thorough valuation on numerous attacks and threats associated with the biometric system alongside the biometric template protection, elucidating the measures anticipated to address the threats, to the performance gap and establish the status quo of the current biometric template protection for public acceptance.

Biometric template security: Challenges and solutions

2005

ABSTRACT A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These attacks are intended to either circumvent the security afforded by the system or to deter the normal functioning of the system. We describe the various threats that can be encountered by a biometric system. We specifically focus on attacks designed to elicit information about the original biometric data of an individual from the stored template.

A Survey on Different Techniques for Biometric Template Protection

Journal of Internet Technology, 2020

Biometric applications are based on the static and nonstatic biometric characteristics such as voice, palm, and finger vein, gait, DNA, hand geometry, iris, fingerprint etc. This paper presents an overview of the two types of template protection techniques, namely, (i) feature transformation or cancelable biometric, and (ii) biocryptosystems. Combining both the techniques, i.e. feature transformation and bio-cryptosystems, provide a set of hybrid template protection schemes. Multimodal biometric templates are also protected using hybrid template protection schemes. This paper mainly focuses on providing a comprehensive overview of the template protection techniques and multimodal biometric systems for user authentication. In addition to this, the paper gives the overview of various attacks, issues and challenges in biometric recognition system.

Biometric Template Security

Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

An Overview of Biometric Template Security Techniques

Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.

Comparative Study on Biometric Template Protection Schemes

2015

Biometric cryptosystem is the combination of cryptography and biometrics to enhance the security as misuse of biometric data can be avoided by using cryptosystem. In order to overcome the problems of unibiometric that is non-uviversality and less accuracy, multibiometrics seems to be more reliable. Multibiometric system means using more than one trait (eg. Fingerprint, iris, face, palmprint etc.) for identification of a person. This system increases security and is more accurate. However, multibiometric for each user needs to be stored as separate entities which in turn increases the risk to user privacy and security of the system. Therefore, fusion scheme is applied to ensure user's privacy and system security and biometric cryptosystem is applied for template protection. Two well known biometric cryptosystem namely key generation and key binding are studied. A significant amount of approaches for both fusion scheme and template protection has been published in the previous yea...

Enhancing the Security of Transformation Based Biometric Template Protection Schemes

2018 International Conference on Cyberworlds (CW), 2018

Template protection is a crucial issue in biometrics. Many algorithms have been proposed in the literature among secure computing approaches, crypto-biometric algorithm and feature transformation schemes. The BioHashing algorithm belongs to this last category and has very interesting properties. Among them, we can cite its genericity since it could be applied on any biometric modality, the possible cancelability of the generated BioCode and its efficiency when the secret is not stolen by an impostor. Its main drawback is its weakness face to a combined attack (zero effort with the stolen secret scenario). In this paper, we propose a transformation-based biometric template protection scheme as an improvement of the BioHashing algorithm where the projection matrix is generated by combining the secret and the biometric data. Experimental results on two biometric modalities, namely digital fingerprint and finger knuckle print images, show the benefits of the proposed method face to attacks while keeping a good efficiency.