Geometric-Aligned Cancelable Fingerprint Templates

  • Bian Yang
  • Christoph Busch
  • Mohammad Derawi
  • Patrick Bours
  • Davrondzhon Gafurov
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5716)


A minutiae encryption algorithm based on geometric transformation of minutiae positions is proposed to generate cancelable fingerprint templates. A geometric transformation is used for alignment. A parameter-controlled minutiae encryption is performed within a local area to generate a cancelable minutiae template, and then all local encryption results are superimposed to form a protected template. Parameters to control the minutiae encryption are generated independent of the geometric-aligned minutiae, which ensures solid non-invertibility compared to those cancelable template generating algorithms with to-be-encrypted minutiae information as parameters.


template protection cancelable fingerprint template fingerprint alignment coordinate encryption 


  1. 1.
    Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: Sixth ACM Conference on Computer and Communications Security, Singapore, pp. 28–36 (1999)Google Scholar
  2. 2.
    Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: IEEE Inter. Symp. on Information Theory, Lausanne, Switzerland (2002)Google Scholar
  3. 3.
    Savvides, M., Kumar, B.V.K.V.: Cancellable Biometric Filters for Face Recognition. In: IEEE Inter. Conf. on Pattern Recognition, Cambridge, UK, vol. 3, pp. 922–925 (2004)Google Scholar
  4. 4.
    Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical Biometric Authentication with Template Protection. In: Inter. Conf. on Audio- and Video-Based Biometric Person Authentication, USA, pp. 436–446 (2005)Google Scholar
  5. 5.
    Sutcu, Y., Sencar, H.T., Memon, N.: A Secure Biometric Authentication Scheme Based on Robust Hashing. In: ACM Multimedia and Security Workshop, USA, pp. 111–116 (2005)Google Scholar
  6. 6.
    Nagar, A., Nandakumar, K., Jain, A.K.: Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors. In: Inter. Conf. on Pattern Recognition, Tampa, Florida, USA (2008)Google Scholar
  7. 7.
    Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. on Pattern Analysis and Machine Intelligence 28(12), 1892–1901 (2006)CrossRefGoogle Scholar
  8. 8.
    GenKey: System, Portable Device and Method for Digital Authenticating, Crypting and Signing by Generating Short-Lived Cryptokeys. US Patent 2006/0198514A1 (2006)Google Scholar
  9. 9.
    Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Trans. on Pattern Analysis and Machine Intelligence 29(4), 561–572 (2007)CrossRefGoogle Scholar
  10. 10.
    Kelkboom, E.J.C., Gkberk, B., Kevenaar, T.A.M., Akkermans, A.H.M., Van der Veen, M.: “3D Face”: Biometric Template Protection for 3D Face Recognition. In: 2nd Inter. Conf. on Biometrics, Seoul, South Korea (2007)Google Scholar
  11. 11.
    Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric Key Binding: Fuzzy Vault Based on Iris Images. In: 2nd Inter. Conf. on Biometrics, Seoul, South Korea, pp. 800–808 (2007)Google Scholar
  12. 12.
    Scheirer, W.J., Boult, T.E.: Cracking Fuzzy Vaults and Biometric Encryption. In: Biometrics Symposium (2007)Google Scholar
  13. 13.
    Arakala, A., Jeffers, J., Horadam, K.J.: Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. In: 2nd Inter. Conf. on Biometrics, Seoul, South Korea (2007)Google Scholar
  14. 14.
    Chang, E.C., Roy, S.: Robust Extraction of Secret Bits From Minutiae. In: 2nd Inter. Conf. on Biometrics, Seoul, South Korea (2007)Google Scholar
  15. 15.
    Yang, B., Busch, C., Bours, P., Gafurov, D.: Non-Invertible Geometrical Transformation for Fingerprint Minutiae Template Protection. In: 1st Inter. Workshop on Security and Communication Networks, Trondheim, Norway (2009)Google Scholar
  16. 16.
    Lee, C., Choi, J.Y., Toh, K.A., Lee, S., Kim, J.: Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information. IEEE Trans. on Systems, Man, and Cybernetics – Part B: Cybernetics 37(4), 980–992 (2007)CrossRefGoogle Scholar
  17. 17.
    Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable Fingerprint Biotokens: Accuracy and Security Analysis. In: IEEE Inter. Conf. on Comput. Vis. & Patt. Recog., USA (2007)Google Scholar
  18. 18.
    Breebaart, J., Busch, C., Grave, J., Kindt, E.: A Reference Architecture for Biometric Template Protection Based on Pseudo Identities. In: BIOSIG 2008, GI-LNI (2008)Google Scholar
  19. 19.
    Delvaux, N., Chabanne, H., Bringer, J., Kindarji, B., Lindeberg, P., Mdgren, J., Breebaart, J., Akkermans, T., Van der Veen, M., Vedhuis, R., Kindt, E., Simoens, K., Busch, C., Bours, P., Gafurov, D., Yang, B., Stern, J., Rust, C., Cucinelli, B., Skepastianos, D.: Pseudo Identities Based on Fingerprint Characteristics. In: IEEE Inter. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1063–1068 (2008)Google Scholar
  20. 20.
    Bazen, A.M., Veldhuis, R.N.J.: Likelihood-Ratio-Based Biometric Verification. IEEE Trans. on Circuits and Systems for Video Technology 14(1), 86–94 (2004)CrossRefGoogle Scholar
  21. 21.
    ISO Standard. Information Technology - Biometric Data Interchange Formats - Part 8: Finger Pattern Skeletal Data. ISO/IEC 19794-8 (2006) Google Scholar
  22. 22.
  23. 23.
    VeriFinger Software,

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Bian Yang
    • 1
  • Christoph Busch
    • 1
  • Mohammad Derawi
    • 2
  • Patrick Bours
    • 1
  • Davrondzhon Gafurov
    • 1
  1. 1.Norwegian Information Security Laboratory at Gjøvik University CollegeGjøvikNorway
  2. 2.Informatics and Mathematical Modelling at Technical University of DenmarkKongens LyngbyDenmark

Personalised recommendations