Spiral Cube for Biometric Template Protection

  • Chouaib Moujahdi
  • Sanaa Ghouzali
  • Mounia Mikram
  • Mohammed Rziza
  • George Bebis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7340)


In this paper we present a new approach for biometric template protection. Our objective is to build a preliminary non-invertible transformation approach, based on random projection, which meets the requirements of revocability, diversity, security and performance. We use the chaotic behavior of logistic map to build the projection vectors using a new technique that makes the construction of the projection matrix depend on the biometric template and its identity. Experimental results conducted on several face databases show the ability of our technique to preserve and increase the performance of protected systems. Moreover, we demonstrate that the security of our approach is sufficiently robust to possible attacks.


Template protection random projection logistic map revocability security 


  1. 1.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: An Analysis of Minutiae Matching Strength. In: Bigun, J., Smeraldi, F. (eds.) AVBPA 2001. LNCS, vol. 2091, pp. 223–228. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing (2008)Google Scholar
  3. 3.
    Syverson, P.: A taxonomy of replay attacks. In: The Computer Security Foundations Workshop (1994)Google Scholar
  4. 4.
    Adler, A.: Vulnerabilities in Biometric Encryption Systems. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 1100–1109. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Adler, A.: Images can be regenerated from quantized biometric match score data. In: The Canadian Conference on Electrical and Computer Engineering (2004)Google Scholar
  6. 6.
    Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal (2004)Google Scholar
  7. 7.
    Breebaart, J., Yang, B., Buhan-Dulman, I., Busch, C.: Biometric Template Protection: The need for open standards. Privacy and Data Security Journal (2009)Google Scholar
  8. 8.
    Lam, K., Beth, T.: Timely authentication in distributed systems. In: The European Symposium on Research in Computer Security (1992)Google Scholar
  9. 9.
    Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition (2002)Google Scholar
  10. 10.
    Teoh, A.B.J., Toh, K.-A., Yip, W.K.: 2N Discretisation of BioPhasor in Cancellable Biometrics. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 435–444. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  11. 11.
    Yang, B., Hartung, D., Simoens, K., Busch, C.: Dynamic Random Projection for Biometric Template Protection. In: The 7th Framework Programme of the European Union, Project TURBINE, ICT-2007-216339 (2010)Google Scholar
  12. 12.
    Goel, N., Bebis, G., Nefian, A.: Face Recognition Experiments with Random Projection. In: SPIE Defense and Security Symposium (Biometric Technology for Human Identification), Orlando, FL, March 28-April 1 (2005)Google Scholar
  13. 13.
    Wang, Y., Plataniotis, K.N.: Face Based Biometric Authentication with Changeable and Privacy Preservable templates. In: Biometrics Symposium (2007)Google Scholar
  14. 14.
    Achlioptas, D.: Database-friendly random projections. In: ACM Symposium on the Principles of Database Systems, pp. 274–281 (2001)Google Scholar
  15. 15.
    Gu, S., Tan, Y., He, X.: Laplacian Smoothing Transform for Face Recognition. Science in China Series F-Information Sciences (2009)Google Scholar
  16. 16.
    Gu, S., Tan, Y., He, X.: Discriminant Analysis via Support Vectors. Neurocomputing (2009)Google Scholar
  17. 17.
    Nagar, A., Nandakumar, K., Jain, A.K.: Biometric Template Transformation: A Security Analysis. SPIE Digital Library (2010)Google Scholar
  18. 18.
    Moujahdi, C., Ghouzali, S., Mikram, M., Abdul, W., Rziza, M.: Inter-communication classification for multi-view face recognition. In: International Conference on Multimedia Computing and Systems (ICMCS), Tangier, Morocco (2012)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Chouaib Moujahdi
    • 1
  • Sanaa Ghouzali
    • 1
    • 2
  • Mounia Mikram
    • 1
    • 3
  • Mohammed Rziza
    • 1
  • George Bebis
    • 4
  1. 1.LRIT, Faculty of SciencesMohammed V-Agdal UniversityRabatMorocco
  2. 2.Information Technology Department, CCISKing Saud UniversitySaudi Arabia
  3. 3.The School of Information SciencesRabatMorocco
  4. 4.Dept of Computer Science and EngineeringUniversity of NevadaRenoUSA

Personalised recommendations