Open Access Open Access  Restricted Access Subscription or Fee Access

Irreversible Biometric Template Protection by Trigonometric Function

Fahad Layth Malallah(1*), Zaid Ahmed Aljawaryy(2), Baraa Tariq Sharef(3), Asem Khmag(4), Lway Faisal A. Razak(5)

(1) Computer Science, Cihan University, Iraq
(2) Faculty of Science and Technology University of Human Development, Iraq
(3) Ahlia University, College of Information Technology, Bahrain
(4) Computer Department Faculty of Engineering, Azzawia University, Libya
(5) Computer Science, Cihan University, Iraq
(*) Corresponding author


DOI: https://doi.org/10.15866/irecos.v11i12.11003

Abstract


A protection against biometrics fraud operations will never end because of the continuously occurring computer systems hacking attempts, in particular, the attempts to steal templates from databases related to biometrics. The objective of this paper is to propose a new technique for a biometric template protection, which is characterized as non-invertible (irreversible) template transformation for the reference biometric template inside the database. The proposed technique is based on cosine or sine trigonometric functions to exploit the periodicity property that leads to one-to-many solutions in mathematics, which is well explained in this paper, as well as tested with many attempts to revert the original template. Moreover, security analysis has been discussed in terms of several kinds of attacks such as multiplicity and brute force attacks. The analysis has given promising and fruitful results regarding the security and easiness in involving it inside the commercial work.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Biometrics; Template Protection; Security; Forensic; Trigonometric

Full Text:

PDF


References


F. L. Malallah, et al., "Online handwritten signature recognition by length normalization using up-sampling and down-sampling," International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 4, pp. 302-313, 2015.
http://dx.doi.org/10.17781/p001545

A. De Luca, et al., "I Feel Like I'm Taking Selfies All Day!: Towards Understanding Biometric Authentication on Smartphones," in Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015, pp. 1411-1414.
http://dx.doi.org/10.1145/2702123.2702141

R. L. Angell and J. R. Kraemer, "Using biometric data for a customer to improve upsale ad cross-sale of items," ed: Google Patents, 2015.
http://dx.doi.org/10.1016/b978-0-12-800216-2.00002-7

L. Hong-wei and W. Yao, "A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System," in Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on, 2012, pp. 531-534.
http://dx.doi.org/10.1109/csae.2012.6272653

H. Al-Assam and S. Jassim, "Robust biometric based key agreement and remote mutual authentication," in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012, pp. 59-65.
http://dx.doi.org/10.1109/trustcom.2012.248

Malallah, F., Ahmad, S., Yussof, S., Adnan, W., Iranmanesh, V., Arigbabu, O., A Review of Biometric Template Protection Techniques for Online Handwritten Signature Application, (2013) International Review on Computers and Software (IRECOS), 8 (12), pp. 2925-2933.
http://dx.doi.org/10.1155/2014/381469

E. Maiorana, et al., "Cancelable templates for sequence-based biometrics with application to on-line signature recognition," IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 40, pp. 525-538, 2010.
http://dx.doi.org/10.1109/tsmca.2010.2041653

S. G. Kanade, et al., "Cancelable biometrics for better security and privacy in biometric systems," in International Conference on Advances in Computing and Communications, 2011, pp. 20-34.
http://dx.doi.org/10.1007/978-3-642-22720-2_3

A. K. Jain, et al., "Biometric template security," EURASIP Journal on Advances in Signal Processing, vol. 2008, p. 113, 2008.
http://dx.doi.org/10.1155/2008/579416

M. D. J. Ghate and S. B. Patil, "Robust combination method for privacy protection using fingerprint and face biometrics," in Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions), 2015 4th International Conference on, 2015, pp. 1-6.
http://dx.doi.org/10.1109/icrito.2015.7359312

P. Baraki and V. Ramaswamy, "Bio-Metric Authentication of an User using Hand Gesture Recognition," International Journal of Applied Engineering Research, vol. 11, pp. 4118-4123, 2016.
http://dx.doi.org/10.14257/ijmue.2016.11.11.33

N. Sae-Bae, et al., "Biometric-rich gestures: a novel approach to authentication on multi-touch devices," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2012, pp. 977-986.
http://dx.doi.org/10.1145/2207676.2208543

P. Griffin, "Biometric knowledge extraction for multi-factor authentication and key exchange. unpublished. Retrieved July 1, 2015," ed.
http://dx.doi.org/10.1016/j.procs.2015.09.150

N. K. Ratha, et al., "Enhancing security and privacy in biometrics-based authentication systems," IBM systems Journal, vol. 40, pp. 614-634, 2001.
http://dx.doi.org/10.1147/sj.403.0614

A. B. Teoh, et al., "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," IEEE transactions on pattern analysis and machine intelligence, vol. 28, pp. 1892-1901, 2006.
http://dx.doi.org/10.1109/tpami.2006.250

Y. Lu, et al., "An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem," Journal of Medical Systems, vol. 39, pp. 1-8, 2015.
http://dx.doi.org/10.1007/s10916-015-0221-7

W. J. Wong, et al., "Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template," Pattern Recognition, vol. 51, pp. 197-208, 2016.
http://dx.doi.org/10.1016/j.patcog.2015.09.032

H. Kaur and P. Khanna, "Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates," Procedia Computer Science, vol. 54, pp. 661-670, 2015.
http://dx.doi.org/10.1016/j.procs.2015.06.077

N. K. Ratha, et al., "Generating cancelable fingerprint templates," IEEE transactions on pattern analysis and machine intelligence, vol. 29, pp. 561-572, 2007.
http://dx.doi.org/10.1109/tpami.2007.1004

S. V. Gaddam and M. Lal, "Development of Bio-Crypto Key From Fingerprints Using Cancelable Templates," International Journal on Computer Science and Engineering, vol. 3, pp. 775-783, 2011.
http://dx.doi.org/10.1109/iccsit.2009.5234801

V. Supriya and R. Manjunatha, "Chaotic Maps for Biometric Template Protection-A Proposal," Journal of Biometrics & Biostatistics, vol. 6, p. 1, 2015.
http://dx.doi.org/10.4172/2155-6180.1000216

C. Prathipa and L. Latha, "A Survey of Biometric Fusion and Template Security Techniques."
http://dx.doi.org/10.5120/11832-7547

B. V Evelyn, "Biometric Template Security using Dorsal Hand Vein Fuzzy Vault," Journal of Biometrics & Biostatistics, 2012.
http://dx.doi.org/10.4172/2155-6180.1000145

Y.-L. Lai, et al., "Cancellable iris template generation based on Indexing-First-One hashing," Pattern Recognition, vol. 64, pp. 105-117, 2017.
http://dx.doi.org/10.1016/j.patcog.2016.10.035

S. Wang, et al., "A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations," Pattern Recognition, vol. 61, pp. 447-458, 2017.
http://dx.doi.org/10.1016/j.patcog.2016.08.017

M. Gomez-Barrero, et al., "Unlinkable and irreversible biometric template protection based on bloom filters," Information Sciences, vol. 370, pp. 18-32, 2016.
http://dx.doi.org/10.1016/j.ins.2016.06.046

Z. Jin, et al., "Rank Correlation Measure: A Representational Transformation for Biometric Template Protection," arXiv preprint arXiv:1607.06902, 2016.
http://dx.doi.org/10.2172/1172555

D. Alba, "China's tianhe-2 caps top 10 supercomputers," IEEE Spectrum, Retrieved June, vol. 19, 2013.
http://dx.doi.org/10.1109/mspec.2012.6117842

S. M. S. Ahmad, et al., "SIGMA-A Malaysian signatures’ database," in 2008 IEEE/ACS International Conference on Computer Systems and Applications, 2008, pp. 919-920.
http://dx.doi.org/10.1109/aiccsa.2008.4493644


Refbacks

  • There are currently no refbacks.



Please send any questions about this web site to info@praiseworthyprize.com
Copyright © 2005-2017 Praise Worthy Prize