Skip to main content

Advertisement

Log in

An overview of protection of privacy in multibiometrics

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Biometric authentication systems (BASs) have various advantages over traditional authentication systems such as password based systems. In BASs, information related to individuals’ physical and psychological characteristics is employed for authentication. The leakage of such information will breach individuals’ privacy severely. To simultaneously protect privacy and achieve higher authentication accuracy, privacy preserving multibiometric authentication systems (PPMASs) have been developed. This paper provides a comprehensive review of PPMASs. Specifically, we outline the requirements of PPMASs and discuss the state-of-the-art PPMASs. We also discuss PPMASs in the context of mobile and cloud based applications. Furthermore, we show the drawbacks of the existing PPMASs and point out the future research directions of PPMASs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. Note that altering the biometric features extracted from different biometric signals cannot be carried out by the standard encryption techniques. The reason is that the matching score returned by comparing two encrypted biometric features does not reflect the similarity of the two compared biometric features. Instead, this can be done by techniques such as biohashing and indivertible transform.

References

  1. Arandjelovic O, Hammoud R (2006) Multi-sensory face biometric fusion (for personal identification). In: Conf. comput. vision and pattern recognit., pp 1–8

  2. Aronowitz H, Li M, Toledo-Ronen O, Harary S, Geva A, Ben-David S, Rendel A, Hoory R, Ratha N, Pankanti S, Nahamoo D (2014) Multi-modal biometrics for mobile authentication. In: IEEE Int. conf. biometrics, pp 1–8

  3. Blanton M, Aliasgari M (2013) Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans Inf Forens Secur 8(9):1433–1445

    Article  Google Scholar 

  4. Boyen X (2004) Reusable cryptographic fuzzy extractors. In: ACM conf. comput. and commun. security, pp 82–91

  5. Bringer J, Chabanne H, Cohen G, Kindarji B, Zemor G (2007) Optimal iris fuzzy sketches. In: IEEE Int. conf. on biometrics: Theory, Applicat., and Syst., pp 1–6

  6. Chetty G, Wagner M (2006) Multilevel liveness verification for face-voice biometric authentication. In: Biometrics symp.: special session on research at the biometric consortium conf., pp 1–6

  7. Dandawate YH, Inamdar SR (2015) Fusion based multimodal biometric cryptosystem. In: Int. conf. ind. instrumentation and control, pp 1484–1489

  8. Dass SC, Nandakumar K, Jain AK (2005) A principled approach to score level fusion in multimodal biometric systems. In: 5th Int. conf. audio and video-based biometric person authent., pp 1049–1058

  9. Daugman J (2000) Combining multiple biometrics. [Online]. http://www.cl.cam.ac.uk/~jgd1000/combine/combine.html

  10. Daugman J (2004) Iris recognition and anti-spoofing countermeasures. In: Int. biometrics conf

  11. Derawi MO, Gafurov D, Larsen R, Busch C, Bours P (2010) Fusion of gait and fingerprint for user authentication on mobile devices. In: 2nd Int. Workshop security and commun. networks, pp 1–6

  12. Gawande U, Hajari KO, Golhar YG (2014) Novel cryptographic algorithm based fusion of multimodal biometrics authentication system. In: Int. conf. comput. and commun. technol., pp 1–6

  13. Hong L, Jain AK (1998) Integrating faces and fingerprints for personal identification. IEEE Trans Pattern Anal Mach Intell 20(12):1295–1307

    Article  Google Scholar 

  14. Iida K, Kiya H (2016) Secure and robust identification based on fuzzy commitment scheme for JPEG images. In: IEEE Int. symp. on broadband multimedia syst. and broadcast., pp 1–5

  15. Jain AK, Uludag U (2002) Hiding fingerprint minutiae in images. In: 3rd Workshop automatic identification advanced tech., pp 97–102

  16. Jain AK, Uludag U, Hsu RL (2002) Hiding a face in a fingerprint image. In: Int. conf. pattern recognit., pp 756–759

  17. Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP. J Adv Signal Process 2008:1–17

    Google Scholar 

  18. Jin ATB, Ling DN, Goh A (2008) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255

    Article  Google Scholar 

  19. JTC1 SC27 IT Security Techniques (2011) ISO/IEC 24745: biometric information protection, Intl Organization for Standardization (ISO)

  20. Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: ACM conf. comput. and commun. security, pp 28–36

  21. Kaur H, Khanna P (2015) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools Appl:1–29. doi:10.1007/s11042-015-2933-6

  22. Kumar A, Wong DC, Shen HC, Anil KJ (2003) Personal verification using palmprint and hand geometry biometric, vol 2688. Springer, Heidelberg, pp 668–678

    MATH  Google Scholar 

  23. Lam L, Suen CY (1995) Optimal combination of pattern classifiers. Pattern Recogn Lett 16(9): 945–954

    Article  Google Scholar 

  24. Lam L, Suen CY (1997) Application of majority voting to pattern recognition: An analysis of its behavior and performance. IEEE Trans Syst Man Cybern Part A: Syst Humans 27(5):553–568

    Article  Google Scholar 

  25. Li Q, Guo M, Chang E-C (2008) Fuzzy extractors for asymmetric biometric representations. In: IEEE workshop on biometrics (in association with CVPR), pp 1–6

  26. Li C, Hu J, Pieprzyk J, Susilo W (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans Inf Forens Secur 10(6):1193–1206

    Article  Google Scholar 

  27. Liu Y, Hatzinakos D (2015) Biohashing for human acoustic signature based on random projection. Cand J Elect Comput Eng 38(3):66–273

    Google Scholar 

  28. Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forens Secur 7(1):255–268

    Article  Google Scholar 

  29. Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: IEEE Int. conf. biometrics: theory, applicat. and syst., pp 1–6

  30. Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100

    Article  Google Scholar 

  31. Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forens Secur 2(4):744–757

    Article  Google Scholar 

  32. Natgunanathan I, Xiang Y, Rong Y, Zhou W, Guo S (2012) Robust patchwork-based embedding and decoding scheme for digital audio watermarking. IEEE Trans Audio Speech Lang Process 20(8):2232–2239

    Article  Google Scholar 

  33. Natgunanathan I, Xiang Y, Rong Y, Peng D (2013) Robust patchwork-based watermarking method for stereo audio signals. Multimedia Tools Appl 72(2):1–24

    Google Scholar 

  34. Nguyen TH, Wang Y, Ha Y, Li R (2013) Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrics 2(2):48–55

    Article  Google Scholar 

  35. Nguyen TAT, Dang TK (2015) Combining fuzzy extractor in biometric-kerberos based authentication protocol. In: Int. conf. on advanced comput. and appl., pp 1–6

  36. Ong TS, Teng JH, Muthu KS, Teoh ABJ (2013) Multi-instance finger vein recognition using minutiae matching. In: Int. congress on image and signal process., pp 1730–1735

  37. Ramalho MB, Correia PL, Soares LD (2012) Hand-based multimodal identification system with secure biometric template storage. IET Comput Vis 6 (3):165–173

    Article  MathSciNet  Google Scholar 

  38. Ratha NK, Connell JH, Bok RM (2000) Secure data hiding in wavelet compressed fmgerprint images. In: ACM Multimedia workshops, pp 127–130

  39. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634

    Article  Google Scholar 

  40. Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572

    Article  Google Scholar 

  41. Ross A, Jain AK (2003) Information fusion in biometrics. Pattern Recogn Letts 24:2125–2215

    Google Scholar 

  42. Rudrakshi PG, Hatture SKM (2014) A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem. In: Int. conf. computer and commun. technol., pp 169–174

  43. Safie SI, Nurfazira H, Azavitra Z, Soraghan JJ, Petropoulakis L (2014) Pulse active transform: a non-invertible transformation with application to ECG biometric authentication. In: Region 10 symp., pp 667–671

  44. Sim T, Jankiraman R, Kumar S (2007) Continuous verification using multimodal biometrics. IEEE Trans Pattern Anal Mach Intell 29(4):687–700

    Article  Google Scholar 

  45. Sun D, Li Q, Liu T, He B, Qiu Z (2005) A secure multimodal biometric verification scheme. In: Advances in biometric person authentication (lecture notes computer science), vol 3781, pp 233–240

  46. Sutcu Y, Li Q, Memon N (2007) Secure biometric templates from fingerprint-face features. In: IEEE conf. comput. vision and pattern recognit., pp 1–6

  47. Tams B (2016) Unlinkable minutiae-based fuzzy vault for multiple fingerprints. IET Biometrics 5(3):170–180

    Article  Google Scholar 

  48. Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern Part B 37(5):840–854

    Article  Google Scholar 

  49. Teoh A, Kim J (2007) Secure biometric template protection in fuzzy commitment scheme. IEICE Electron Express 4(23):724–730

    Article  Google Scholar 

  50. Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recogn 41(6):2034–2044

    Article  MATH  Google Scholar 

  51. Thepade SD, Bhondave RK (2015) Novel multimodal identification technique using iris & palmprint traits with various matching score level proportions using BTC of bit plane slices. In: Int. conf. pervasive comput., pp 1–4

  52. Vatsa M, Singh R, Mitra P, Noore A (2004) Digital watermarking based secure multimodal biometric system. In: IEEE Int. conf. syst., man, and cybernetics, pp 2983–2987

  53. Vildjiounaite E, Makela S-M, Lindholm M, Kyllonen V, Ailisto H (2007) Increasing security of mobile devices by decreasing user effort in verification. In: 2nd Int. conf. syst. and networks commun., pp 80–86

  54. Wang D, Li J, Memik G (2009) Authentication scheme of DRM system for remote users based on multimodal biometrics, watermarking and smart cards. In: Global congress intell. syst., pp 530–534

  55. Whitelam C, Osia N, Bourlai T (2013) Securing multimodal biometric data through watermarking and steganography. In: IEEE Int. conf. tech. for homeland security, pp 61–66

  56. Xu L, Krzyzak A, Suen CY (1992) Methods for combining multiple classifiers and their applications to handwriting recognition. IEEE Trans Syst Man Cybern 22 (3):418–435

    Article  Google Scholar 

  57. Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circ Syst Video Technol 25(5):717–729

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iynkaran Natgunanathan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Natgunanathan, I., Mehmood, A., Xiang, Y. et al. An overview of protection of privacy in multibiometrics. Multimed Tools Appl 77, 6753–6773 (2018). https://doi.org/10.1007/s11042-017-4596-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4596-y

Keywords

Navigation