Cancellable biometrics and user-dependent multi-state discretization in BioHash

Research output: Contribution to journalArticle

22 Citations (Scopus)

Abstract

Although the use of biometrics for security access is convenient and easy to be implemented, it also introduced privacy and other security concerns when the original biometric templates are compromised. BioHash was introduced as a form of cancellable or replaceable biometrics through the integration of a set of user-specific random numbers with biometric features to address these concerns. However, the main drawback of the original form of BioHash is its inferior performance when an imposter obtains a legitimate token and uses it to claim as a genuine user (also known as the stolen-token scenario). In this paper, the problem is circumvented by a user-dependent multi-state discretization method. The experimental results on fingerprint database FVC2002 demonstrated a promising performance improvement on the stolen-token scenario when this discretization method was incorporated in the BioHash scheme. Moreover, the discretization method can render a long bit string, which is a useful feature to resist brute-force attacks. Some desired properties such as one-way transformation and diversity are also analyzed.

Original languageEnglish
Pages (from-to)301-307
Number of pages7
JournalPattern Analysis and Applications
Volume13
Issue number3
DOIs
Publication statusPublished - 2010 Jan 1

Fingerprint

Biometrics

All Science Journal Classification (ASJC) codes

  • Computer Vision and Pattern Recognition
  • Artificial Intelligence

Cite this

@article{f567a1b09311443f8f5185bf25d694a2,
title = "Cancellable biometrics and user-dependent multi-state discretization in BioHash",
abstract = "Although the use of biometrics for security access is convenient and easy to be implemented, it also introduced privacy and other security concerns when the original biometric templates are compromised. BioHash was introduced as a form of cancellable or replaceable biometrics through the integration of a set of user-specific random numbers with biometric features to address these concerns. However, the main drawback of the original form of BioHash is its inferior performance when an imposter obtains a legitimate token and uses it to claim as a genuine user (also known as the stolen-token scenario). In this paper, the problem is circumvented by a user-dependent multi-state discretization method. The experimental results on fingerprint database FVC2002 demonstrated a promising performance improvement on the stolen-token scenario when this discretization method was incorporated in the BioHash scheme. Moreover, the discretization method can render a long bit string, which is a useful feature to resist brute-force attacks. Some desired properties such as one-way transformation and diversity are also analyzed.",
author = "Teoh, {Andrew Beng Jin} and Yip, {Wai Kuan} and Toh, {Kar Ann}",
year = "2010",
month = "1",
day = "1",
doi = "10.1007/s10044-009-0158-x",
language = "English",
volume = "13",
pages = "301--307",
journal = "Pattern Analysis and Applications",
issn = "1433-7541",
publisher = "Springer London",
number = "3",

}

Cancellable biometrics and user-dependent multi-state discretization in BioHash. / Teoh, Andrew Beng Jin; Yip, Wai Kuan; Toh, Kar Ann.

In: Pattern Analysis and Applications, Vol. 13, No. 3, 01.01.2010, p. 301-307.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Cancellable biometrics and user-dependent multi-state discretization in BioHash

AU - Teoh, Andrew Beng Jin

AU - Yip, Wai Kuan

AU - Toh, Kar Ann

PY - 2010/1/1

Y1 - 2010/1/1

N2 - Although the use of biometrics for security access is convenient and easy to be implemented, it also introduced privacy and other security concerns when the original biometric templates are compromised. BioHash was introduced as a form of cancellable or replaceable biometrics through the integration of a set of user-specific random numbers with biometric features to address these concerns. However, the main drawback of the original form of BioHash is its inferior performance when an imposter obtains a legitimate token and uses it to claim as a genuine user (also known as the stolen-token scenario). In this paper, the problem is circumvented by a user-dependent multi-state discretization method. The experimental results on fingerprint database FVC2002 demonstrated a promising performance improvement on the stolen-token scenario when this discretization method was incorporated in the BioHash scheme. Moreover, the discretization method can render a long bit string, which is a useful feature to resist brute-force attacks. Some desired properties such as one-way transformation and diversity are also analyzed.

AB - Although the use of biometrics for security access is convenient and easy to be implemented, it also introduced privacy and other security concerns when the original biometric templates are compromised. BioHash was introduced as a form of cancellable or replaceable biometrics through the integration of a set of user-specific random numbers with biometric features to address these concerns. However, the main drawback of the original form of BioHash is its inferior performance when an imposter obtains a legitimate token and uses it to claim as a genuine user (also known as the stolen-token scenario). In this paper, the problem is circumvented by a user-dependent multi-state discretization method. The experimental results on fingerprint database FVC2002 demonstrated a promising performance improvement on the stolen-token scenario when this discretization method was incorporated in the BioHash scheme. Moreover, the discretization method can render a long bit string, which is a useful feature to resist brute-force attacks. Some desired properties such as one-way transformation and diversity are also analyzed.

UR - http://www.scopus.com/inward/record.url?scp=77955557689&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77955557689&partnerID=8YFLogxK

U2 - 10.1007/s10044-009-0158-x

DO - 10.1007/s10044-009-0158-x

M3 - Article

AN - SCOPUS:77955557689

VL - 13

SP - 301

EP - 307

JO - Pattern Analysis and Applications

JF - Pattern Analysis and Applications

SN - 1433-7541

IS - 3

ER -