A Review on Protection and Cancelable Techniques in Biometric Systems

被引:16
|
作者
Bernal-Romero, Juan Carlos [1 ]
Ramirez-Cortes, Juan Manuel [1 ]
Rangel-Magdaleno, Jose De Jesus [1 ]
Gomez-Gil, Pilar [2 ]
Peregrina-Barreto, Hayde
Cruz-Vega, Israel [1 ]
机构
[1] Natl Inst Astrophys Opt & Elect, Dept Elect, Puebla 72840, Mexico
[2] Natl Inst Astrophys Opt & Elect, Dept Comp Sci, Puebla 72840, Mexico
关键词
Biometrics (access control); Privacy; Internet of Things; Behavioral sciences; Taxonomy; Security; Physiology; Biometric template protection (BTP); cancelable; irreversibility; privacy; security; unlinkability; TEMPLATE PROTECTION; FUZZY VAULT; RANDOM PROJECTION; FINGERPRINT; AUTHENTICATION; PRIVACY; SECURE; EFFICIENT; CRYPTOSYSTEMS; RECOGNITION;
D O I
10.1109/ACCESS.2023.3239387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is constituted by the mechanisms which provide access to a number of services or applications. Biometric techniques aim to manage the access to such systems based on personal data; however, some biometric traits are openly exposed in the daily life, and in consequence, they are not secret, e.g., voice or face in social networks. In many cases, biometric data are non-cancelable and non-renewable when compromised. This document examines the vulnerabilities and proposes hardware and software countermeasures for the protection and confidentiality of biometric information using randomly created supplementary information. Consequently, a taxonomy is proposed according to the operating principle and the type of supplementary information supported by protection techniques, analyzing the security, privacy, revocability, renewability, computational complexity, and distribution of biometric information. The proposed taxonomy has five categories: 1) biometric cryptosystems; 2) cancelable biometrics; 3) protection schemes based on machine learning or deep learning; 4) hybrid protection schemes; and 5) multibiometric protection schemes. Furthermore, this document proposes quantitative evaluation measures to compare the performance of protection techniques. Likewise, this research highlights the advantages of injective and linear mapping for the protection of authentication and identification systems, allowing the non-retraining of these systems when the protected biometric information is canceled and renewed. Finally, this work mentions commercial products for cancelable biometric systems and proposes future directions for adaptive and cancelable biometric systems in low-cost IoT devices.
引用
收藏
页码:8531 / 8568
页数:38
相关论文
共 50 条
  • [31] Security performance evaluation for biometric template protection techniques
    Isobe, Yoshiaki
    Ohki, Tetsushi
    Komatsu, Naohisa
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2013, 5 (01) : 53 - 72
  • [32] An overview of steganography techniques applied to the protection of biometric data
    Mandy Douglas
    Karen Bailey
    Mark Leeney
    Kevin Curran
    Multimedia Tools and Applications, 2018, 77 : 17333 - 17373
  • [33] An overview of steganography techniques applied to the protection of biometric data
    Douglas, Mandy
    Bailey, Karen
    Leeney, Mark
    Curran, Kevin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 17333 - 17373
  • [34] A Spoofing Attack against a Cancelable Biometric Authentication Scheme
    Izu, Tetsuya
    Sakemi, Yumi
    Takenaka, Masahiko
    Torii, Naoya
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 234 - 239
  • [35] Cancelable Biometric Recognition With ECGs: Subspace-Based
    Wu, Shun-Chi
    Chen, Peng-Tzu
    Swindlehurst, A. Lee
    Hung, Pei-Lun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1323 - 1336
  • [36] Deep Face Image Retrieval for Cancelable Biometric Authentication
    Jang, Young Kyun
    Cho, Nam Ik
    2019 16TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2019,
  • [37] Application of MACE filter with DRPE for cancelable biometric authentication
    Aya G. Elsheikh
    Ghada M. El-Banby
    Atef Abou Elazm
    Walid El-Shafai
    Fathi E. Abd El-Samie
    Ensherah A. Naeem
    Journal of Optics, 2024, 53 : 101 - 116
  • [38] Random Slope method for generation of cancelable biometric features
    Kaur, Harkeerat
    Khanna, Pritee
    PATTERN RECOGNITION LETTERS, 2019, 126 : 31 - 40
  • [39] Cancelable Biometric Based Key Generation for Symmetric Cryptography
    Sarkar, Arpita
    Singh, Binod Kr
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2017, : 404 - 409
  • [40] Application of MACE filter with DRPE for cancelable biometric authentication
    Elsheikh, Aya G.
    El-Banby, Ghada M.
    Abou Elazm, Atef
    El-Shafai, Walid
    Abd El-Samie, Fathi E.
    Naeem, Ensherah A.
    JOURNAL OF OPTICS-INDIA, 2024, 53 (01): : 101 - 116