You are on page 1of 8

International Symposium on Information Technology 2008 (ITSim'08), KL, Malaysia

Biometric Template Protection Using Watermarking with Hidden Password


Encryption

Md. Rajibul Islam Md. Shohel Sayeed Andrews Samraj


Multimedia University, Multimedia University, Multimedia University,
Faculty of Information Faculty of Information Faculty of Information
Science and Technology Science and Technology Science and Technology
(FIST), Jalan Ayer Keroh (FIST), Jalan Ayer Keroh (FIST), Jalan Ayer Keroh
lama, 75450 Melaka, lama, 75450 Melaka, lama, 75450 Melaka,
Malaysia Malaysia Malaysia
md.rajibul.islam05@mmu.e shohel.sayeed@mmu.edu.my andrews.samraj@mmu
du.my .edu.my

Abstract Biometrics supplies the same level of security to all


users unlike passwords and is highly challenging to
For quite a few years the biometric recognition brute force attacks. Identification and authentication
techniques have been developed. Here, we briefly refers to two special tasks: finding the identity of a
review some of the known attacks that can be person given the biometric versus verifying the identity
encountered by a biometric system and some given the biometric data and the claimed identity.
corresponding protection techniques. We explicitly We offer a biometric authentication scheme in this
focus on threats designed to extract information about paper to address the security and privacy concerns. In
the original biometric data of an individual from the particular, two biometric features (e.g. fingerprint and
stored data as well as the entire authentication system. palmprint) are combined to obtain a non-unique
In order to address security and privacy concerns, we identifier of the individual and stored as such in a
present a biometric authentication scheme that uses central database. While the combined biometric ID is
two separate biometric features combined by reducing anxiety of security and privacy and not a
watermark embedding with hidden password unique identifier as well, we show that it can still be
encryption to obtain a non-unique identifier of the used in authenticating a person’s identity. As a
personage. Furthermore, to present the performance of particular example, we demonstrate a biometric
the authentication system we provide experimental authentication system that uses two separate biometrics
results. The transformed features and templates trek of the same individual to form a combined biometric
through insecure communication line like the Internet ID.
or intranet in the client-server environment. Our However, it is now acknowledged that biometric
projected technique causes security against attacks systems are vulnerable to attacks. One of the most
and eavesdropping because the original biometric will solemn attacks is against the stored templates. A stolen
not be exposed anywhere in the authentication system. biometric template cannot be easily revoked and it may
be used in other applications that utilize the same
biometric feature.
1. Introduction
A. Security Vulnerabilities
Now a day, in traditional verification methods
biometric systems propose numerous benefits. It is
To some possible attacks biometric authentication
unfeasible to share and complicated to replicate. Even
systems may become vulnerable. Some of those
direct secret observation will not able to obtain
security vulnerabilities are presented as follows:
Biometric information. It enhances user feasibility by
Spoofing attacks on the sensor, replay attack on the
improving the need to memorize long and random
channel between sensor and matcher, substitute attack
passwords. It sentinels against repudiation by the user.
on the storage database, tempering on storage database

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 296

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
and matcher, masquerade attack during verification the user privacy in the whole client-server model of
channel between sensor and matcher, Trojan horse biometric authentication system. Here, user needs to
attack on matcher, overriding attack and yes/no provide two biometric data during each and every
response during decision making after matching and authentication session. Hence, sometimes very
privacy issue During Decision Making after Matching. bothering. Not user - friendly.

B. Sketch of some Biometric Template 2. Proposed Watermarking with Hidden


Security Approaches password Encryption (WHPE)
Numerous researchers have proposed some Our projected scheme consists of four main steps as
approaches, which are summarized below. Here, a little shown in Figure 1. First of all, performed
briefing of their manner, qualities and negative aspects preprocessing and DWT (Discrete Wavelet Transform)
are sketched below. of the fingerprint image to make it prepared for the
In Encryption [14], Template is encrypted using watermark embedding process. Second step is
well-known cryptographic techniques. The main palmprint classification, so that the system can get a
advantage is Matching algorithm and accuracy are hidden password that we have fixed according to six
unaffected and limitation is Template is exposed categories of palmprint. In third step, two different
during every authentication attempt. One-way function biometric images derived from the same user are
is applied to the biometric features in Non-invertible applied to the watermark embedding process. The
transform template security approach. The benefit is embedded template is then secured by the
matcher need not be redesigned since transformation watermarking based on DWT. Finally, the
occurs in the same feature space. The weakness is it watermarked template is encrypted using the hidden
usually leads to increase in the FRR. In Hardening / password derived after palmprint classification from
Salting [16], User-specific external randomness is the second step. In this work, we call this approach
added to the biometric features. It increases the entropy “Watermarking with Hidden Password Encryption
of biometric features resulting in low FAR but if the (WHPE)”.
user-specific random information is compromised,
there is no gain in entropy. In Secure sketch [12], a A. Palmprint classification
sketch is derived from the template; sketch is secure
because template can be reconstructed only if a A novel algorithm for the automatic classification
matching biometric query is presented. It is more of low-resolution palmprints using principle lines has
tolerant to intra-user variations in biometric data; can been proposed by Wu et al [1]. The algorithm has the
be used for securing external data such as ability to classify palmprints into six categories
cryptographic keys. Limitation is template is exposed according to the number of principal lines and the
during successful authentication and Non-uniform number of their intersections. The principal lines of the
nature of biometric data reduces security. A key is palmprint are identified first using their position and
derived directly from biometric features in Key thickness. Then a set of directional line detectors is
generation [13]. It is most efficient and scalable developed. After that they extract potential beginnings
approach. Constraints are tolerance to intra-user (“line initials”) of the principal lines and then, a
variations is limited, resulting in high FRR. Hardened recursive process is applied to extract the principal
fuzzy vault [15], a hybrid approach where the lines in their entirety based on these line initials. The
biometric features are hardened (using password) proportions of these six categories (1–6) in the
before a secure sketch (vault) is constructed. Here, database containing 13,800 samples [2] are 0.36%,
hardening increases the entropy thereby improving the 1.23%, 2.83%, 11.81%, 78.12% and 5.65%,
vault security; also enhances user privacy but not user- respectively. They have shown 96.03% of accuracy to
friendly, user needs to provide both the password and classify palmprints.
the biometric during authentication. In proposed
Watermarking with Hidden Password Encryption B. Watermarking Algorithm
(WHPE), we present an upgraded approach where two
biometric features are synthesized and encrypted with a For watermarking, the fingerprint image is used
hidden password which is derived from the biometric as the base or the cover image and the palmprint
classification. The advantage is biometric templates are features are used as the watermark [4][5]. These
never exposed anywhere in the biometric system. Thus features are the palmprint template obtained by
improves the security of the biometric template and convolving the palmprint image with preprocessing.

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 297

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
better resistance against attacks on the WHPE
Watermark Embedding Algorithm: Let FPuni be template. Moreover, the additional variability
the unique fingerprint image of size s × s and FPdwt (i, introduced by hidden password-based watermark
j) be the corresponding four level discrete wavelet embedding reduces the similarity between WHPE
transformed image, where i = 1,2,3,4 denotes the templates of different users. This decreases the False
wavelet decomposition level and j = a, h, v, d denotes Accept Rate (FAR) of the system significantly. If we
the approximation, horizontal, vertical and diagonal imagine client-server structural design for the
sub-bands respectively. Let PPuni be the unique biometric system where preprocessing, feature
palmprint image of size t × t, where s ! t and PPdwt (i, extraction and watermark embedding are applied at the
j) be the corresponding two level wavelet transformed client side and hidden password encryption, matching
image with i=1,2. At level-2, the coefficients of is performed at the server, the server never watch the
approximation band of the palmprint image are original template. Only the watermark embedded
embedded into the detail sub-bands of the fingerprint template would be exposed during successful
image. A Hidden Password F1 is used to embed the decryption and the original template is never exposed
coefficients in the possible 3*S*S locations, where S is at the server.
the length and width of the sub-bands. Embedding at Two common methods for cracking a users’
level-2 is described in Equation (1). password are, dictionary attacks and social engineering
Next, the approximation band in the second level of techniques. In the proposed system, hidden password is
the palmprint image is further decomposed to the third implicitly verified during authentication by matching
level. At level-3, the coefficients of the approximation the WHPE biometric features. Even if an adversary
band of the palmprint image are embedded into the attempts to guess the hidden password, it is not
detail sub-bands of the fingerprint image using another possible to verify the guess without knowledge of the
auto generate key F2 whose upper bound is 3*T*T. T user’s biometric data. This provides resistance against
is the height and width of sub-bands at level-3. dictionary attacks to learn the hidden password.
Equation (2) describes the watermark embedding However, it is still possible to glean the hidden
process at level-3. password through social engineering techniques.
The inverse wavelet transformation is performed on Therefore, hidden password based transformation
the modified FPdwt (i, j) to obtain the final watermarked alone is not sufficient to ensure the security of the
fingerprint image FPwm. Figure 1 shows the process of biometric template. Due to this reason, we use the
embedding palmprint image in the fingerprint image. watermark embedding process to secure the biometric
template. Note that the hidden password used in
constructing the watermark embedding that secures the
FPdwt (2, j)= { PPdwt (2, a) according to F1
FPdwt (2, j) elsewhere
transformed template is fixed forever. Therefore, if the
hidden password is compromised, the security of the
WHPE is not affected and it is computationally hard
for an attacker to obtain the original biometric
FPdwt (3, j)= { PPdwt (3, a) according to F2
FPdwt (3, j) elsewhere template. Because of the template is however
synthesized by watermarking. Finally, the watermarked
template is encrypted using a hidden password derived
C. Watermarked Template binding by
from the palmprint classification. This prevents
Hidden Password Encryption substitution attacks against the watermarked template
because an adversary cannot modify the watermarked
Hidden password improves user privacy to template without knowing the hidden password or the
encryption of the watermarked template because it key derived from it.
enables the creation of revocable templates and
prevents cross matching of templates across different
applications. The distribution of WHPE template is
statistically more similar to uniform distribution than
the distribution of original template. This recommends

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 298

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
(a) Client
Webcam

Palmprint Acquisition Fingerprint Acquisition

Wu’s Classification Fingerprint


Algorithm Preprocessing

Palmprint
Preprocessing
DWT

Cat1 Cat2
Embedding Auto Generate Key F2
Palm Template
Hidden password F1 in Fingerprint
Cat4 Cat3
IDWT

Cat5 Cat6 Watermarked


Fingerprint
Template

Encrypted
Database Template

(b) Server

Figure 1(a): Enrolment phase- Proposed Watermarking with Hidden password Encryption (WHPE)

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 299

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
(a) Client
Webcam

Palmprint Acquisition Fingerprint Acquisition

Wu’s Classification Fingerprint


Algorithm Preprocessing

Palmprint
Preprocessing
DWT

Cat1 Cat2
Embedding Auto Generate Key F2
Palm Template
Hidden password F1 in Fingerprint
Cat4 Cat3
IDWT

Cat5 Cat6 Watermarked


Fingerprint
Template

Yes/no
Decrypted Matching
Database Template

(b) Server

Figure 1(b): Verification phase- Proposed Watermarking with Hidden password Encryption (WHPE)

3. Experimental Result and Discussion A. Experiments and Results

The proposed watermarking with hidden password Our webcam database is a database with 1000
encryption (WHPE) scheme has been tested on the images (100 fingers × 5 impressions/finger and 100
webcam database. palms × 5 impressions/palm) of size 480×580. We
followed the standard of FVC2000 [6], FVC2002 [7],
FVC2004 [8] fingerprint databases where each
database contains fingerprints from 110 fingers. The

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 300

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
experiments are designed and performed to study
effects of the watermarking on the performance of the We classified our test in three different experiments
proposed secure fingerprint-based authentication and our experiments representing the performances of
system. In this experiment the compassion of the authentication system using original fingerprint
watermarking schemes on biometric images is database for matching in the experiment 1 and the
analyzed. matching performance between the original fingerprint
To carry out the tests, we watermarked the 1000 data with watermarked fingerprints obtained by WHPE
images from our database including both 500 in the experiment 2 and finally the matching using the
fingerprints and 500 palmprints, ran feature extraction same set of watermarked fingerprint database with
and recognition on the watermarked images, and watermarked fingerprint data in experiment 3. We
compared the results to that of using the original performed all these experiments and obtained the
fingerprints. In order to perform watermark-embedding results that are revealed in table 1.
process we used each impression of palmprint on each From a visual inspection of the matching results
fingerprint impression, which are obtained from the generated in our final experiments, we observed that
same individual. And by following this process, we got experiment 1 and experiment 3 had no significant
six watermark embedded templates for single effects on the performance of the authentication
individual and like this in the whole database we got system, where experiment 2 had significant and
500 templates from 100 individuals. First, to obtain a undesirable effect. This is because, in WHPE scheme
baseline performance of the authentication system, the watermark embedding affects a significant number
each fingerprint is matched with rest of the fingerprint of pixels in a local neighborhood so that some minutiae
database i.e., 499 fingerprints to obtain 499 normalized cannot be extracted during matching session. As a
matching scores. Among the normalized matching result experiment 2 obtained awful matching results.
scores obtained for a fingerprint, one would expect 4 These results have demonstrated that the watermarked
high scores and 495 low scores. For each hypothesized images can obtain approximately the same accuracy as
threshold matching score, the performance of the the original unwatermarked fingerprints in the
system was characterized by the true rejects (TR) and matching/authentication session on our proposed
the True accepts (TA). secure authentication system.

Table 1: Standard results obtained from the tests

Tests Matching Phase TA (%) TR (%) Matched


TA (%)
Experiment 1 Original image Original image 90.8 9.2 94.1
Experiment 2 Original image Watermarked image 52.6 47.4 53.1
Experiment 3 Watermarked image Watermarked image 89.3 10.7 91.9

The averaged matched true acceptance for biometric is not obtained. Such an attacker, fully
experiment 1 and experiment 3 is around 90%. So we familiar with the system and exploiting its weaknesses,
have proved that our WHPE scheme will perform will not be doing just a watermark extraction process in
successfully and better. The security level also order to break the embedded template. As a substitute,
remaining strong because in our proposed scheme the he will develop different attacks that can be run in a
original biometric is not exposed anywhere. realistic time frame. The WHPE must be flexible
against those on-line attacks.
Here, we discuss the security of the above scheme.
B. Discussions First, we cite the security framework of the proposed
authentication scheme. If challengers’ success to steal
Although numerous techniques have been proposed the template stored in the database, they can get the
to enhance the security and privacy of the biometric encrypted template. Subsequently they attempt to
authentication system, but still it’s a risky issue. It has extract the template and ruin the file so that it may no
been largely disregarded the study of potential longer be useful. Hans Georg Schaathun, [3] presented
vulnerability of Biometric Authentication against some attacks in watermarking layer. A real
attacks. That means a complicated attacker could watermarking scheme cannot be expected to be
achieve access to both the embedded templates and the infallible. The attacks are, (1) Non-collusive
whole attack phases described in section. But a user’s watermarking attack: Non-collusive watermarking

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 301

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
attacks can be applied to any mark. By garbling the replay attack on the proposed authentication scheme. If
segment, the pirates cause the extraction algorithm to the adversaries can snoop to the communication from
fail with some probability. (2) Collusive watermarking the proposed scheme, and obtain the information of
attack: A collusive watermarking attack applies to any embedded template or encrypted data or decrypted
detectable marks. By combining different versions of data, when they reuse this information, the client and
the same mark, for instance by averaging, the pirates the database can detect replay attack by verifying the
can weaken the watermark and cause extraction to fail difference among the information of the data used in
with some probability. (3) Cropping a segment: A WHPE scheme.
pirate can crop the file by removing certain segments. Only the attack will be established possibly when
If the pirates use a very strong watermarking attack or the user’s biometric as well as according to our scheme
extensive cropping, they will also ruin the file, because the attacker compromises the fingerprint and the
they have no information about the hidden password, palmprint both.
which is used for embedding and encryption. Suppose,
the hidden password is compromised then they can 4. Conclusion
become impostor of the decryption and they will able
to obtain a watermarked template which is still secured We proposed the authentication scheme to protect
in the authentication scheme because the original the biometric templates and to improve the security
template will never be exposed any where in the and privacy level of biometric authentication system in
system, even in the matching process. this paper. The main concept of the proposed
However, even if adversaries hijack the whole authentication scheme is that stolen biometric
database, because it receives no personal information, information is not reusable, in every authentication for
of course including the original template and the even same person. In the scheme we used hidden
extracted feature, the takeover does not threaten the password, which was derived from palmprint
user’s privacy. Then we consider the case of a classifications. The hidden password concept is very
malicious authentication server collects information. In similar to the password concept [15] but here user
this structure, it receives watermark embedded and needs to remember the password and also the password
encrypted transformed data. As abovementioned, they is very easy to guess. Finally, we obtained the view of
imply no information before extraction the embedded the security of our proposed authentication scheme
and encrypted data. Besides, the malicious sever against the attacks described in section 1(a). The
cannot know the corresponding watermark embedded performance of the authentication scheme is presented
process, hidden password and encryption process. by the experiments and results.
Hence, the malicious server obtains no information
about original templates. 5. References
Next, we consider security of the information
transformed by WHPE against hill-climbing attack [9] [1]. X. Wu, D. Zhang, K. Wang and B. Huang, “Palmprint
[10], replay attack [11], collusion attack. Hill-climbing classification using principle lines,” Pattern Recognition,
attack [11] uses of replied matching score in order to Vol. 37, No. 10, pp 1987-1998, 2004.
make a fake. When the application server sends the
matching score to client or adversary as shown in Fig. [2]. Palmprint database from Biometric Research Center,
3, the adversary transforms embedded feature data The Hong Kong Polytechnic University.
selected from database that the adversary constructs. Available:http://www4.comp.polyu.edu.hk/~biometrics/
The adversary sends the transformed features to the [3]. Hans Georg Schaathun, “On watermarking/
authentication server for matching. Because this fingerprinting for copyright protection,” Proc. of First
system used the hidden password to seek the International Conference on Innovative Computing,
corresponding data, it is difficult for the adversary to Information and Control (ICICIC '06), Vol. 3, pp. 50- 53,
improve the fake from the replied matching score. 2006.
Therefore, the probability of the adversary’s success on
our proposed authentication scheme becomes less than [4]. Yeung M. and Pankanti S., “Verification Watermarks on
conventional biometric authentication. Fingerprint Recognition and Retrieval,” Journal of Electronic
Normally, replay attack is impossible, if previously Imaging, vol. 9, no. 4, pp.468-476, 2000.
obtained information is not reusable. When adversaries
eavesdrop on the communication between the client [5]. M.M. Yeung and F.C. Mintzer, “Invisible watermarking
and the authentication server, they obtain only for image verification,” Journal of Electronic Imaging, Vol.
embedded transformed features or encrypted data, 7(03), pp. 578-591, 1998.
which are not reusable. Hence, no adversary successes

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 302

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.
[6]. FVC2000 fingerprint database, Available:
http://bias.csr.unibo.it/fvc2000/databases.asp

[7]. FVC2002 fingerprint database, Available:


http://bias.csr.unibo.it/fvc2002/databases.asp

[8]. Maio, D. Maltoni, R. Cappelli, J. L. Wayman and A. K.


Jain, “FVC2004: Third Fingerprint Verification
Competition,” Proc. International Conference on Biometric
Authentication (ICBA), pp. 1-7, Hong Kong, 2004.

[9]. Soutar, “Biometric System Security,” Secure No. 5, pp.


46-49, 2002. Available:
http://www.silicontrust.com/pdf/secure_5/46_techno_4.pdf

[10]. Dimovski, D. Gilogoroski, “Generating highly nonlinear


Boolean functions using a genetic algorithm,” Proc. IEEE 6th
International Conference on Telecommunications in Modern
Satellite, Cable and Broadcasting Service (TELSIKS 2003),
pp. 604-607, 2003.

[11]. K. Jain, A. Ross, and U. Uludag, “Biometric template


security: challenges and solutions,” Proc. 13th European
Signal Processing Conference (EUSIPCO ’05), Antalya,
Turkey, 2005.

[12]. Y. Sutcu, Q. Li and N. Memon, “Protecting Biometric


Templates with Sketch: Theory and Practice,” IEEE Trans.
on Information Forensics and Security, vol. 2, pp. 503-512,
2007.

[13]. S.W. Sun, C.S. Lu, and P.C. Chang, “Biometric


Template Protection: a Key-Mixed Template Approach,”
Proc. IEEE Intl. Conf. Consumer Electronics 2007, pp. 1-2,
Las Vegas, NV, 2007.

[14]. Colin Soutar, Danny Roberge, Alex Stoianov, Rene


Gilroy, and B.V.K. Vijaya Kumar “Biometric Encryption™,”
Bioscrypt Inc. , ICSA Guide to Cryptography, edited by
Randall K. Nichols, McGraw-Hill (1999), chapter 22.

[15]. Karthik Nandakumar, Abhishek Nagar and Anil K. Jain,


“Hardening Fingerprint Fuzzy Vault Using Password,” Proc.
International Conference on Biometrics, 2007.

[16]. A.B.J. Teoh, A. Goh and D.C.L. Ngo, “Random


Multispace Quantization as an Analytic Mechanism for
BioHashing of Biometric and Random Identity Inputs,” IEEE
Trans. on PAMI, Vol. 28, No. 12, pp. 1892-1901, 2006.

978-1-4244-2328-6/08/$25.00 © 2008 IEEE 303

Authorized licensed use limited to: IEEE Xplore. Downloaded on November 27, 2008 at 02:06 from IEEE Xplore. Restrictions apply.

You might also like