A Review on Protection and Cancelable Techniques in Biometric Systems

被引:16
|
作者
Bernal-Romero, Juan Carlos [1 ]
Ramirez-Cortes, Juan Manuel [1 ]
Rangel-Magdaleno, Jose De Jesus [1 ]
Gomez-Gil, Pilar [2 ]
Peregrina-Barreto, Hayde
Cruz-Vega, Israel [1 ]
机构
[1] Natl Inst Astrophys Opt & Elect, Dept Elect, Puebla 72840, Mexico
[2] Natl Inst Astrophys Opt & Elect, Dept Comp Sci, Puebla 72840, Mexico
关键词
Biometrics (access control); Privacy; Internet of Things; Behavioral sciences; Taxonomy; Security; Physiology; Biometric template protection (BTP); cancelable; irreversibility; privacy; security; unlinkability; TEMPLATE PROTECTION; FUZZY VAULT; RANDOM PROJECTION; FINGERPRINT; AUTHENTICATION; PRIVACY; SECURE; EFFICIENT; CRYPTOSYSTEMS; RECOGNITION;
D O I
10.1109/ACCESS.2023.3239387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is constituted by the mechanisms which provide access to a number of services or applications. Biometric techniques aim to manage the access to such systems based on personal data; however, some biometric traits are openly exposed in the daily life, and in consequence, they are not secret, e.g., voice or face in social networks. In many cases, biometric data are non-cancelable and non-renewable when compromised. This document examines the vulnerabilities and proposes hardware and software countermeasures for the protection and confidentiality of biometric information using randomly created supplementary information. Consequently, a taxonomy is proposed according to the operating principle and the type of supplementary information supported by protection techniques, analyzing the security, privacy, revocability, renewability, computational complexity, and distribution of biometric information. The proposed taxonomy has five categories: 1) biometric cryptosystems; 2) cancelable biometrics; 3) protection schemes based on machine learning or deep learning; 4) hybrid protection schemes; and 5) multibiometric protection schemes. Furthermore, this document proposes quantitative evaluation measures to compare the performance of protection techniques. Likewise, this research highlights the advantages of injective and linear mapping for the protection of authentication and identification systems, allowing the non-retraining of these systems when the protected biometric information is canceled and renewed. Finally, this work mentions commercial products for cancelable biometric systems and proposes future directions for adaptive and cancelable biometric systems in low-cost IoT devices.
引用
收藏
页码:8531 / 8568
页数:38
相关论文
共 50 条
  • [21] Cancelable biometric filters for face recognition
    Savvides, M
    Kumar, BVKV
    Khosla, PK
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, 2004, : 922 - 925
  • [22] A Survey on Different Techniques for Biometric Template Protection
    Jayapriya, P.
    Manimegalai, R. R.
    Kumar, R. Lakshmana
    Kadry, Seifedine
    Seo, Sanghyun
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1347 - 1362
  • [23] Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates
    Kaur, Harkeerat
    Khanna, Pritee
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 432 - 435
  • [24] Cancelable biometric authentication system based on ECG
    Mohamed Hammad
    Gongning Luo
    Kuanquan Wang
    Multimedia Tools and Applications, 2019, 78 : 1857 - 1887
  • [25] A Variant of Cancelable Iris Biometric based on BioHashing
    Meetei, Thiyam Churjit
    Begum, Shahin Ara
    2016 INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (ICONSIP), 2016,
  • [26] Cancelable biometric authentication system based on ECG
    Hammad, Mohamed
    Luo, Gongning
    Wang, Kuanquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) : 1857 - 1887
  • [27] Generating Cancelable Biometric Templates Using a Projection Line
    Ahmad, Tohari
    Hu, Jiankun
    11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV 2010), 2010, : 7 - 12
  • [28] Biometric Techniques in Identity Management Systems
    Volner, R.
    Bores, P.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2009, (07) : 55 - 58
  • [29] Cancelable biometric schemes for Euclidean metric and Cosine metric
    Jiang, Yubing
    Shen, Peisong
    Zeng, Li
    Zhu, Xiaojie
    Jiang, Di
    Chen, Chi
    CYBERSECURITY, 2023, 6 (01)
  • [30] Cancelable biometric schemes for Euclidean metric and Cosine metric
    Yubing Jiang
    Peisong Shen
    Li Zeng
    Xiaojie Zhu
    Di Jiang
    Chi Chen
    Cybersecurity, 6