Abstract
The cancelable biometric system is susceptible to a variety of attacks aimed at deteriorating the integrity of the authentication procedure. These attacks are intended to either ruin the security afforded by the system or deter the normal functioning of the authentication system. This paper describes various threats that can be encountered by a cancelable biometric system. It specifically focuses on preventing the attacks designed to extract information about the transformed biometric data of an individual, from the template database. Furthermore, we provide experimental results pertaining to a system combining the cancelable biometrics with segment-based visual cryptography, which converts traditional biocode into novel structures called shares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patel, V.M., Ratha, N. K., Chellappa, R.: Cancelable Biometrics: A Review. Signal Processing Magazine, IEEE 32.5, 54–65 (2015)
Soutar, C., Roberge, A., Vijaya Kumar, B.V.K.: Biometric Encryption using Image Processing. SPIE: 178188 (1998)
Bolle, R.M., Connel, J.H., Ratha, N.K.: Biometrics Perils and Patches. Elsevier Pattern Recognition 35: 27272738 (2002)
Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.: Generating cancelable fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, pp. 561–572 (2007)
Jeong, M.Y., Teoh, A.B.: Cancellable Face Biometrics System by Combining Independent Component Analysis Coefficient. Springer Berlin Heidelberg (2011)
Rathgeb, C., Busch, C.: Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. Computers & Security, vol. 42, pp. 1–12 (2014)
Jain, A.K., Uludag, U., Hsu R.L.: Hiding a Face in a Fingerprint Image. Pattern Recognition, IEEE (2002)
Vatsa, M., Singh R., Noore A., Houck M.M.: Robust Biometric Image Watermarking for Fingerprint and Face Template Protection. IEICE Electronics Express 3.2 (2006)
Li, S., Kot, A.: Fingerprint Combination for Privacy Protection. IEEE Transactions on Information Forensics and Security, vol. 8, no. 2, pp. 350–360 (2013)
Ross, A., Othman, A.: Visual Cryptography for Biometric Privacy, IEEE Transactions on Information Forensics and Security, vol.6, no.1, pp. 70–81 (2011)
Daugman, J.: High Confidence Visual Recognition of Persons by a Test of Statistical Independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148–1161 (1993)
Hollingsworth, K., Bowyer, K., Flynn, P.: The Best Bits in an Iriscode. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 6, pp. 964–973 (2009)
Osama, O., Tsumura, N., Nakaguchi, T.: Bioencoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting iris-codes. IEICE Transactions on Information and Systems (2010)
Borchert, B.: Segment-based visual cryptography. http://www.bibliographie.uni-tuebingen.de (2007)
Naor, M., Shamir, A.: Visual cryptography. Advances in Cryptology, In: Eurocrypt 1994. Springer, Heidelberg (1995)
IIT Delhi Iris Database version 1.0, http://web.iitd.ac.in/~biometrics/Database_Iris.htm
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Punithavathi, P., Geetha, S. (2017). Cancelable Biometric Template Security Using Segment-Based Visual Cryptography. In: Raman, B., Kumar, S., Roy, P., Sen, D. (eds) Proceedings of International Conference on Computer Vision and Image Processing. Advances in Intelligent Systems and Computing, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-10-2104-6_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-2104-6_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2103-9
Online ISBN: 978-981-10-2104-6
eBook Packages: EngineeringEngineering (R0)