Browse > Article

Biometrics-based Key Generation Research: Accomplishments and Challenges  

Ha, Lam Tran (전남대학교 대학원 전자컴퓨터공학과)
Choi, Deokjai (전남대학교 전자컴퓨터공학부)
Publication Information
Smart Media Journal / v.6, no.2, 2017 , pp. 15-25 More about this Journal
Abstract
The security and privacy issues derived from unsecurely storing biometrics templates in biometric authentication/ recognition systems have opened a new research area about how to secure the stored biometric templates. Biometrics-based key generation is the newest approach that provides not only a mechanism to protect stored biometric templates in authentication/ recognition systems, but also a method to integrate biometric systems with cryptosystems. Therefore, this approach has attracted much attention from researchers worldwide. A review of current research state to summarize the achievements and remaining works is necessary for further works. In this study, we first outlined the requirements and the primary challenges when implementing these systems. We then summarize the proposed techniques and achievements in representative studies on biometrics-based key generation. From that, we give a discussion about the accomplishments and remaining works with the corresponding challenges in order to provide a direction for further researches in this area.
Keywords
Biometric Templates Protection; Biometric Cryptosystems; Key Generation, Fuzzy Extractor;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Rathgeb, Christian, and Andreas Uhl, "Context-based biometric key generation for Iris", IET computer vision 5, no. 6: 389-397, 2011.   DOI
2 Scheuermann, Dirk, Bastian Wolfgruber, and Olaf Henniger, "On biometric key generation from handwritten signatures", BIOSIG 11: 103-114, 2011.
3 Makrushin, Andrey, Tobias Scheidat, and Claus Vielhauer, "Improving reliability of biometric hash generation through the selection of dynamic handwriting features", In Transactions on Data Hiding and Multimedia Security VIII, pp. 19-41, Springer Berlin Heidelberg, 2012.
4 Sheng, Weiguo, Gareth Howells, Michael Fairhurst, Farzin Deravi, and Shengyong Chen, "Reliable and secure encryption key generation from fingerprints", Information Management & Computer Security 20, no. 3: 207-221, 2012.   DOI
5 Chin, Yong Jian, Thian Song Ong, Andrew Beng Jin Teoh, and K. O. M. Goh, "Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion", Information Fusion 18 (2014): 161-174, 2014.   DOI
6 Sedenka, Jaroslav, Kiran S. Balagani, Vir Phoha, and Paolo Gasti, "Privacy-preserving population-enhanced biometric key generation from free-text keystroke dynamics", In Biometrics (IJCB), 2014 IEEE International Joint Conference on, pp. 1-8. IEEE, 2014.
7 Sheng, Weiguo, Shengyong Chen, Gang Xiao, Jiafa Mao, and Yujun Zheng, "A biometric key generation method based on semisupervised data clustering", IEEE Transactions on Systems, Man, and Cybernetics: Systems 45, no. 9 (2015): 1205-1217, 2015.   DOI
8 Sim, Terence, Simon Baker, and Maan Bsat, "The CMU pose, illumination, and expression (PIE) database", In Automatic Face and Gesture Recognition, 2002. Proceedings. Fifth IEEE International Conference on, pp. 53-58. IEEE, 2002.
9 Phillips, P. Jonathon, Patrick J. Flynn, Todd Scruggs, Kevin W. Bowyer, Jin Chang, Kevin Hoffman, Joe Marques, Jaesik Min, and William Worek, "Overview of the face recognition grand challenge", In IEEE computer society conference on Computer vision and pattern recognition. CVPR 2005, vol. 1, pp. 947-954. IEEE, 2005.
10 "ITDv1 Database", (Online) Available from:(http://www4.comp.polyu.edu.hk/-csajaykr/IITD/Database\_Iris.htm), 2007.
11 "CASIA-IrisV3 Database", (Online) Available from:(http://www.cbsr.ia.ac.cn/english/IrisDatabase.asp), 2010.
12 "CASIA Database", (Online) Available from:(http://www.sinobiometrics.com), 2004.
13 Maio, Dario, Davide Maltoni, Raffaele Cappelli, James L. Wayman, and Anil K. Jain, "FVC2002: Second fingerprint verification competition", In . Proceedings 16th international conference on Pattern recognition, 2002, vol. 3, pp. 811-814. IEEE, 2002.
14 Maio, Dario, Davide Maltoni, Raffaele Cappelli, Jim L. Wayman, and Anil K. Jain, "FVC2004: Third fingerprint verification competition", In Biometric Authentication, pp. 1-7. Springer Berlin Heidelberg, 2004.
15 Hiew, Bee Yan, Andrew BJ Teoh, and Ying-Han Pang, "Touch-less fingerprint recognition system", In 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp. 24-29. IEEE, 2007.
16 Zhang, D, "PolyU palmprint database", Biometric Research Centre, Hong Kong Polytechnic University,(Online) Available from:(http://www.comp.polyu.edu.hk/-biometrics/), 2009.
17 Goh, Michael KO, Tee Connie, Andrew BJ Teoh, and David CL Ngo, "A fast palm print verification system", In 2006 International Conference on Computer Graphics, Imaging and Visualisation, pp. 168-172. IEEE, 2006.
18 Jain, Anil K., Karthik Nandakumar, and Abhishek Nagar, "Biometric template security", EURASIP Journal on advances in signal processing, 2008.
19 Fairhurst, Michael, Sanaul Hoque, Gareth Howells, and Farzin Deravi, "Evaluating biometric encryption key generation", In Proc. 3rd Cost 275 Workshop Biometrics Internet, pp. 93-96. 2005.
20 Mario, R. lvarez, F. Hernndez lvarez, and L. Hernndez Encinas, "A crypto-biometric scheme based on iris-templates with fuzzy extractors", Journal of Information Sciences 195 (2012): 91-102.   DOI
21 Choi Se Ill, "A Study on the Future of eCommerce Systems", Smart Media Journal, vol.4, no.3, pp.68-73, 2015.
22 Lee Jongsu, Hwang Eunhan, Song Sangseob, "LDPC Generation and Decoding concatenated to Viterbi Decoder based on Sytematic Convolutional Encoder", Smart Media Journal, v.2, no.2, pp.39-43, 2013.
23 Juels, Ari, and Martin Wattenberg, "A fuzzy commitment scheme", In Proceedings of the 6th ACM conference on Computer and communications security, pp. 28-36. ACM, 1999.
24 Cavoukian, Ann, Alex Stoianov, and Fred Carter, "Keynote paper: biometric encryption: technology for strong authentication, security and privacy", In Policies and research in identity management, pp. 57-77. Springer US, 2008.
25 Boyen, Xavier, "Reusable cryptographic fuzzy extractors", In Proceedings of the 11th ACM conference on Computer and communications security, pp. 82-91, ACM, 2004.
26 Dodis, Yevgeniy, Leonid Reyzin, and Adam Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data", In International conference on the theory and applications of cryptographic techniques, pp. 523-540. Springer Berlin Heidelberg, 2004.
27 Dodis, Yevgeniy, Leonid Reyzin, and Adam Smith, "Fuzzy Extractors-A Brief Survey of Results from 2004 to 2006", 2008.
28 Natgunanathan, Iynkaran, Abid Mehmood, Yong Xiang, Gleb Beliakov, and John Yearwood, "Protection of privacy in biometric data", IEEE access 4 (2016): 880-892, 2016.   DOI
29 O'Gorman, Lawrence, "Comparing passwords, tokens, and biometrics for user authentication", Proceedings of the IEEE 91, no. 12 (2003): 2021-2040, 2013.   DOI
30 Morelos-Zaragoza, Robert H, "The art of error correcting coding", John Wiley & Sons, 2006.
31 Breebaart, Jeroen, Bian Yang, Ileana Buhan-Dulman, and Christoph Busch, "Biometric template protection", Datenschutz und Datensicherheit-DuD 33, no. 5 (2009): 299-304, 2009.   DOI
32 E. Bingham, and H. Mannila, "Random projection in dimensionality reduction: applications to image and text data", In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 245-250. ACM, 2001.
33 Belhumeur, Peter N., Joƒo P. Hespanha, and David J. Kriegman, "Eigenfaces vs. fisherfaces: Recognition using class specific linear projection", IEEE Transactions on pattern analysis and machine intelligence 19, no. 7 (1997): pp. 711-720, 1997   DOI
34 Jiang, Xudong, Bappaditya Mandal, and Alex Kot, "Eigenfeature regularization and extraction in face recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence 30, no. 3 (2008): pp. 383-394, 2008   DOI
35 Lim, Meng-Hui, and Andrew Beng Jin Teoh, "Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization", KSII Transactions on Internet & Information Systems 5, no. 2, 2011.
36 Chin, Yong Jian, Thian Song Ong, Andrew Beng Jin Teoh, and Michael KO Goh, "Multimodal biometrics based bit extraction method for template security", In 2011 6th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1971-1976. IEEE, 2011.
37 Rathgeb, Christian, and Andreas Uhl. "A survey on biometric cryptosystems and cancelable biometrics", EURASIP Journal on Information Security, 2011.
38 Lim, Meng-Hui, and Andrew Beng Jin Teoh, "Linearly separable subcode: A novel output label with high separability for biometric discretization", In the 5th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 290-294, IEEE, 2010.
39 Lim, Meng-Hui, and Andrew Beng Jin Teoh, "An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation", EURASIP Journal on Advances in Signal Processing 2011, no. 1, 2011.
40 Jain, Anil K., Karthik Nandakumar, and Arun Ross, "50 years of biometric research: Accomplishments, challenges, and opportunities", Pattern Recognition Letters 79: 80-105, 2016.   DOI
41 Lim, Meng-Hui, Andrew Beng Jin Teoh, and Kar-Ann Toh, "An efficient dynamic reliability-dependent bit allocation for biometric discretization", Pattern Recognition 45, no. 5: 1960-1971, 2012.   DOI
42 Sadkhan, Eng Sattar B., Baheeja K. Al-Shukur, and Ali K. Mattar, "Survey of biometrie based key generation to enhance security of cryptosystems", In Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), pp. 1-6, IEEE, 2016.