One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding

One-Factor Cancellable Fingerprint Template Protection Based on Index Self-Encoding

Yalan Feng, Huabin Wang, Dailei Zhang, Jiahao Li, Liang Tao
Copyright: © 2023 |Pages: 18
DOI: 10.4018/JDM.321546
Article PDF Download
Open access articles are freely available for download

Abstract

The existing one-factor cancellable biometrics algorithms generally require random sequences to reorder the biometrics, which reduces the discrimination of the transformed biometrics. Some algorithms hide and transmit the random sequence by XORing the random sequence with original biometrics, which may cause the leakage of the original biometrics. Therefore, this paper proposes a one-factor cancellable fingerprint template protection based on index self-encoding. First, the integer sequence generated by the hash function is used as the index. The random sequence is automatically encoded directly by the index value, and the generated binary sequence retains the original biological characteristics to the greatest extent. Second, self-encoding binary sequence and random binary sequence are XORed to obtain the encoded key without directly storing binary factor sequences. Experiments are implemented on the fingerprint database of FVC2002 and FVC2004, the results show that the recognition rate is enhanced; meanwhile, it fits the design criteria of cancellable biometrics.
Article Preview
Top

Introduction

Today, due to the progress of technology in daily life, a variety of data security issues emerge one after another (Dong et al.,2022). People begin to pay attention to data security and privacy protection (Turesson et al., 2021), and information security has become increasingly important in daily life (Bollle et al., 2002; Lin et al., 2020). In identity management, people are also paying increasing attention to the identification and protection of biometrics. Common biometrics include fingerprint (Yang et al., 2022), iris (Lai et al., 2017), finger vein (Kirchgasser et al., 2019), and so on. Fingerprint identification technology (Wang & Hu, 2016) is the most convenient and widely used biometric technology with strong adaptability, easy operation, and high stability. At the same time, there are some problems with biometric templates that are worth noting: because biometric features are irrevocable, they cannot be reissued once they are damaged, and the authors need to ensure that the generated cancellable biological template is reproducible; in addition, biometrics are unique, and new biometrics cannot be generated if user characteristics are stolen (Ratha et al., 2001). Therefore, biometric template protection is a pivotal and urgent matter.

Biometric template protection falls into two types, including the two-factor cancellable method and the one-factor cancellable method. The two-factor cancellable biometric template protection algorithm needs an extra specific parameter from the user, which is a token or password, along with biometrics as input, to guarantee the unlinkability and revocability of the converted template. For example, reference (Teoh et al., 2004, 2006) generated a binary vector by the inner product of a feature vector and a user-specific nonsquare orthogonal random matrix and then performed threshold binarization to generate a scheme of cancellable biometric template, Biohash. Reference (Wang et al., 2017) proposed a cancellable fingerprint template using the local Hadamard transform method, which used a randomly generated token JDM.321546.m01 to construct a submatrix of a Hadamard matrix for local Hadamard transformation to obtain a cancellable biometric template. An original approach is proposed in the reference (Wang & Hu, 2017) and used a randomly generated token matrix JDM.321546.m02 to further hide the original biometric information. In a typical two-factor cancellable scheme, user-specific parameters (password or token) are important input factors, but there are also some problems caused by external factors (user-specific parameters): (i) it is necessary to keep the token or remember the password. (ii) External factors may be lost, forgotten, or stolen. (iii) The exposure of user-specific parameters may lead to the risk of conversion template intrusion, especially for some salt-based schemes.

Complete Article List

Search this Journal:
Reset
Volume 35: 1 Issue (2024)
Volume 34: 3 Issues (2023)
Volume 33: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 32: 4 Issues (2021)
Volume 31: 4 Issues (2020)
Volume 30: 4 Issues (2019)
Volume 29: 4 Issues (2018)
Volume 28: 4 Issues (2017)
Volume 27: 4 Issues (2016)
Volume 26: 4 Issues (2015)
Volume 25: 4 Issues (2014)
Volume 24: 4 Issues (2013)
Volume 23: 4 Issues (2012)
Volume 22: 4 Issues (2011)
Volume 21: 4 Issues (2010)
Volume 20: 4 Issues (2009)
Volume 19: 4 Issues (2008)
Volume 18: 4 Issues (2007)
Volume 17: 4 Issues (2006)
Volume 16: 4 Issues (2005)
Volume 15: 4 Issues (2004)
Volume 14: 4 Issues (2003)
Volume 13: 4 Issues (2002)
Volume 12: 4 Issues (2001)
Volume 11: 4 Issues (2000)
Volume 10: 4 Issues (1999)
Volume 9: 4 Issues (1998)
Volume 8: 4 Issues (1997)
Volume 7: 4 Issues (1996)
Volume 6: 4 Issues (1995)
Volume 5: 4 Issues (1994)
Volume 4: 4 Issues (1993)
Volume 3: 4 Issues (1992)
Volume 2: 4 Issues (1991)
Volume 1: 2 Issues (1990)
View Complete Journal Contents Listing