You are on page 1of 18

Journal of Theoretical and Applied Information Technology

31st May 2018. Vol.96. No 10


© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

FINGERPRINT TEMPLATE PROTECTION SCHEMES:


A LITERATURE REVIEW
1
APRI SISWANTO, 2NORLIZA KATUK, 3KU RUHANA KU-MAHAMUD
1
Department of Informatic, Faculty of Engineering, Universitas Islam Riau, 28284, Perhentian Marpoyan,
Pekanbaru, Indonesia
2,3
School of Computing, College of Arts and Sciences, Universiti Utara Malaysia, 06010 UUM Sintok,
Kedah, Malaysia
E-mail: 1aprisiswanto@eng.uir.ac.id, 2k.norliza@uum.edu.my, 3ruhana@uum.edu.my

ABSTRACT

The fingerprint is the most widely used technology for identification or authentication systems, which can
be known as fingerprint authentication systems (FAS). In addition to providing security, the fingerprint is
also easy to use, very reliable and has a high accuracy for identity recognition. FAS is still exposed to
security attacks because fingerprint information is unencrypted. Therefore, fingerprint information requires
protection known as fingerprint template protection (FTP). This paper aims to provide an organized
literature on FTP. Three research questions were formulated to guide the literature analysis. First, this
analysis focuses on the types of FTP schemes; second, the metrics used for evaluating the FTP schemes;
and finally, the common datasets used for evaluating the FTP schemes. The latest information and
references are analysed and classified based on FTP methods and publication year to obtain information
related to the development and application of FTP. This study mainly surveyed 62 documents reported on
FTP schemes between the year 2000 and 2017. The results of this survey can be a source of reference for
other researchers in finding literature relevant to the FTP.

Keywords: Biometric Authentication, Fingerprint Template Protection, Template Transformation,


Fingerprint Cryptosystem, Authentication Systems

1. INTRODUCTION fingerprint scanners makes fingerprints very likely to


continue as a prominent authentication method in the
Biometric technology is used widely as an future.
authentication mechanism to overcome the
weaknesses found in traditional methods such as Although fingerprints are unique and hard to
password and security code [1]. Unlike the forge, the current fingerprint authentication systems
traditional methods, an individual user must be are still exposed to security attacks. Unencrypted
physically present during the authentication fingerprint information (i.e., fingerprint templates
process; hence, the risk of impersonation is very (FT)) stored in the database could be stolen or
low. Further, authentication using biometric captured during its transmission in the
technology does not require users to remember communication line. The method for securing the
the password or carry such tokens (e.g., smart fingerprint information is called as fingerprint
card, and keys) which makes it a mobile and template protection (FTP). To date, various methods
practical solution for authentication. and techniques have been developed by researchers
in this field including fingerprint cryptosystem (FC),
One of the most widely used biometric cancellable fingerprint (i.e., template transformation),
technology is fingerprint such those found in hybrid methods, and homomorphic encryption [3].
attendance systems, personal identification
systems, smart home systems, payment systems, Recent and previous studies by other researchers
crime detection systems and border security have reported the great amount of enhancements on
control systems [2]. Fingerprints have a unique FTP which cause an emerging of many new FTP
shape for everyone. That is, each person has a schemes. However, to our knowledge, there is no
different form of fingerprint despite being born specific work surveying the FTP schemes in the
twin. The reduction in the size and cost of modern literature. Surveying those FTP schemes may provide

2764
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

researchers with state-of-the-art in the field and Figure 1 illustrates the literature review process.
could encourage further developments. Therefore, The total of 62 documents were analysed by
this paper aims to fill the gap by reviewing the extracting information on the key findings of the FTP
literature related to FTP schemes. Three research schemes that the researchers proposed, the evaluation
questions (RQ) were formulated as below: metric, and the dataset used for evaluating the
schemes. Table 1 shows the information of the 62
RQ1: What are the types of FTP schemes that documents included in the study. It covers the year,
researchers studied? the number of citations received in Google Scholar
RQ2: What are the metrics used for evaluating the (as of February 2018) authors, titles, and types of
FTP schemes? document.
RQ3: What are the common datasets used for
evaluating the FTP schemes?

The paper is organized in the following way. Literature review focusing on FTP from
Section 2 discusses the method for conducting the 2000 to 2017
study. Then, Section 3 presents the results of the
study based on the specified RQs. Finally, Section
4 discusses the limitation of the study and
concludes the finding.
- Phase 1 searching using primary
keywords
2. METHOD
- 20 relevant documents were selected
A comprehensive electronic document search
was done using the main keyword ‘fingerprint
template protection’ to get the key findings, the
types of FTP schemes, the performance measures,
and the dataset. In addition, there are other several - Phase 2 searching using supporting
key terms such as cancellable fingerprint, keys terms
transformation template, feature transformation, - 42 relevant documents were selected
biometric cryptosystem, fingerprint cryptosystem,
fingerprint cryptography, and homomorphic
encryption were used in the search. The search
focused on English documents published between
January 2000 and December 2017. It was Summary of the key findings for the 62
conducted using academic search engine Google documents
Scholar.
In the first phase, the search was done using Figure 1: The literature review process
the main keyword ‘fingerprint template
protection’. At this stage, there were more than
3600 documents found in Google Scholar. After
the results were filtered, only 20 relevant
documents were selected. It comprises two e-
books, two doctoral theses, eleven articles from
journals and five conference articles [4-23].
In the second phase, an extended searching
was done using supporting keywords including
cancellable fingerprint, transformation template,
feature transformation, biometric cryptosystem,
fingerprint cryptosystem, fingerprint
cryptography, and homomorphic encryption. The
search returned more than a thousand documents.
After the results were filtered, 42 relevant
documents were selected. These documents
comprise 25 articles in journals and 17 conference
articles.

2765
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Table 1: List of the 62 documents included in this study

Num. Year Number of Authors Title Type of document


citations
1 2012 61 Jin, et al. Fingerprint Template Protection with Minutiae- Journal
Based Bit-String for Security and Privacy
Preserving [4]
2 2010 33 Yang, et al. Robust Minutiae Hash for Fingerprint Template Conference article
Protection [5]
3 2012 7 Yang, et al. Performance Evaluation of Fusing Protected Journal
Fingerprint Minutiae Templates on The Decision
Level [6]
4 2014 1 Subban Fingerprint Template Protection Techniques- A Conference article
Survey and Analysis [7]
5 2015 1 Krivokuca Fingerprint Template Protection Using Compact Ph.D. thesis
Minutiae Patterns [8]
6 2011 1 Choi, et al. Fingerprint Template Protection Using One-Time Journal
Fuzzy Vault [9]
7 2016 - Krivokuća and Cancellability and Diversity Analysis of Journal
Abdulla Fingerprint Template Protection Scheme Based
on Compact Minutiae Pattern [10]
8 2017 - Stanko and Skoric Minutia-Pair Spectral Representations for Journal
Fingerprint Template Protection [11]
9 2016 - Poonguzhali and A Hybrid Template Protection Technique for Conference article
Ezhilarasan Fingerprint Biometric Authentication System
[12]
10 2015 10 Tams, et al. Improved Fuzzy Vault Scheme for Alignment- Conference article
Free Fingerprint Features [13]
11 2015 - Jin Privacy-Preserving Minutia-Based Fingerprint Ph.D. thesis
Template Protection Techniques [14]
12 2016 - Kumar and Garg A Fingerprint Template Protection Using Journal
Watermarking [15]
13 2017 - Nazmul, et al. Alignment-Free Fingerprint Template Protection Conference article
Technique Based on Minutiae Neighbourhood
Information [16]
14 2005 373 Tuyls, et al. Practical Biometric Authentication with Template Conference article
Protection [17]
15 2013 25 Jain, Fingerprint Template Protection: From Theory to E-book
Nandakumar, and Practice [18]
Nagar
16 2014 - Fernandez Fingerprint Template Protection Scheme, Conference article
Security and Vulnerabilities: A Survey [19]
17 2016 1 Ashish and Sinha Biometric Template Protection [20] Journal
18 2011 17 Takahashi and Cancelable Biometrics with Provable Security Conference article
Hirata And Its Application To Fingerprint Verification
[21]
19 2009 4676 Maltoni, et al. Handbook of Fingerprint Recognition [22] E-book
20 2006 268 Uludag and Jain Securing Fingerprint Template: Fuzzy Vault Conference article
With Helper Data [23]

21 2007 22 Moon, et al. Fingerprint Template Protection Using Fuzzy Conference article
Vault [24]

22 2006 47 Teoh and Ngo Biophasor: Token Supplemented Cancellable Conference article
Biometrics [25]

2766
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

23 2007 767 Ratha, Chikkerur, Generating Cancelable Fingerprint Templates Conference article
Connell, and [26]
Bolle
24 2008 144 Nagar, Securing Fingerprint Template: Fuzzy Vault Conference article
Nandakumar, and With Minutiae Descriptors [27]
Jain
25 2007 52 Teoh and Kim Secure Biometric Template Protection in Fuzzy Journal
Commitment Scheme [28]
26 2008 100 Kholmatov and Realization of Correlation Attack Against The Conference article
Yanikoglu Fuzzy Vault Scheme [29]
27 2007 152 Boult, Scheirer, Revocable Fingerprint Biotokens: Accuracy and Conference article
and Woodworth Security Analysis [30]
28 2008 47 Chikkerur, Ratha, Generating Registration-Free Cancelable Conference article
Connell, and Bolle Fingerprint Templates [31]
29 2009 43 Yang, Jiang, and Generating Secure Cancelable Fingerprint Conference article
Kot Templates Using Local and Global Features [32]
30 2010 75 Nandakumar A Fingerprint Cryptosystem Based on Minutiae Conference article
Phase Spectrum [33]
31 2010 100 Lee and Kim Cancelable Fingerprint Templates Using Journal
Minutiae-Based Bit-Strings [34]
32 2010 24 Liu, Liang, Pang, Minutiae and Modified Biocode Fusion for Journal
Xie, and Tian Fingerprint-Based Key Generation [35]
33 2010 130 Nagar, A Hybrid Biometric Cryptosystem for Securing Journal
Nandakumar, and Fingerprint Minutiae Templates [36]
Jain
34 2011 3 Zhou, Opel, Enhanced Template Protection with Passwords Conference article
Merkle, Korte, for Fingerprint Recognition [37]
and Busch
35 2011 15 Zhe and Jin Fingerprint Template Protection with Minutia Conference article
Vicinity Decomposition [38]
36 2011 112 Ahmad, Hu, and Pair-Polar Coordinate-Based Cancelable Journal
Wang Fingerprint Templates [39]
37 2012 98 Wang and Hu Alignment-Free Cancelable Fingerprint Template Journal
Design: A Densely Infinite-To-One Mapping
(DITOM) Approach [40]
38 2012 46 Das, Karthik, and A Robust Alignment-Free Fingerprint Hashing Journal
Garai Algorithm Based on Minimum Distance Graphs
[41]
39 2012 89 Ferrara, Maltoni, Noninvertible Minutia Cylinder-Code Journal
and Cappelli Representation [42]
40 2012 50 Li, et al. An Effective Biometric Cryptosystem Combining Journal
Fingerprints with Error Correction Codes [43]
41 2013 27 Imamverdiyev, Biometric Cryptosystem Based On Discretized Journal
Teoh, and Kim Fingerprint Texture Descriptors [44]
42 2013 9 Ranjan and Singh Improved and Innovative Key Generation Conference article
Algorithms for Biometric Cryptosystems [45]
43 2014 31 Prasad and Kumar Fingerprint Template Protection Using Multiline Journal
Neighboring Relation [46]
44 2014 31 Yang, Hu, and A Delaunay Quadrangle-Based Fingerprint Journal
Wang Authentication System with Template Protection
Using Topology Code for Local Registration and
Security Enhancement [47]

2767
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

45 2015 12 Nguyen, Wang, Performance and Security-Enhanced Fuzzy Vault Journal


Ha, and Li Scheme Based on Ridge Features for Distorted
Fingerprints [48]
46 2015 6 Bansal, Sofat, and Fingerprint Fuzzy Vault Using Hadamard Conference article
Kaur Transformation [49]
47 2016 22 Li and Hu A Security-Enhanced Alignment-Free Fuzzy Journal
Vault-Based Fingerprint Cryptosystem Using
Pair-Polar Minutiae Structures [50]
48 2015 26 Murillo-Escobar, A Robust Embedded Biometric Authentication Journal
Cruz-Hernández, System Based on Fingerprint and Chaotic
Abundiz-Pérez, Encryption [51]
and López-
Gutiérrez
49 2015 11 Sandhya and K-Nearest Neighborhood Structure (K-NNS) Conference article
Prasad Based Alignment-Free Method for Fingerprint
Template Protection [52]
50 2016 17 Wang and Hu A Blind System Identification Approach to Journal
Cancelable Fingerprint Templates [53]
51 2016 4 Sandhya and Cancelable Fingerprint Cryptosystem Based on Journal
Prasad Convolution Coding [54]
52 2016 19 Jin, Teoh, Goi, Biometric Cryptosystems: A New Biometric Key Journal
and Tay Binding and Its Implementation for Fingerprint
Minutiae-Based Representation [55]
53 2010 79 Barni, et al. A Privacy-Compliant Fingerprint Recognition Conference article
System Based on Homomorphic Encryption and
Fingercode Templates [56]
54 2016 - Guo, Mao, and Non-Invertible Fingerprint Template Protection Conference article
Guo with Polar Transformations [57]

55 2016 21 Wong, Teoh, Kho, Kernel PCA Enabled Bit-String Representation Journal
and Wong for Minutiae-Based Cancellable Fingerprint
Template [58]
56 2017 - Gao Toward Constructing Cancellable Templates Journal
Using K-Nearest Neighbour Method [59]
57 2017 13 Gomez-Barrero, Multi-Biometric Template Protection Based on Journal
Maiorana, Homomorphic Encryption [60]
Galbally, and
Campisi
58 2017 - Sadhya and Singh Design of A Cancelable Biometric Template Journal
Protection Scheme for Fingerprints Based on
Cryptographic Hash Functions [61]
59 2017 3 Wang, Yang, and Design of Alignment-Free Cancelable Fingerprint Journal
Hu Templates With Zoned Minutia Pairs [62]
60 2017 - Jin, Lai, Hwang, A New and Practical Design of Cancellable Journal
Kim, and Teoh Biometrics: Index-Of-Max Hashing [63]
61 2007 172 Nandakumar, Hardening Fingerprint Fuzzy Vault Using Conference article
Nagar, and Jain Password [64]

62 2009 25 Rane, Sun, and Secure Distortion Computation Among Conference article
Vetro Untrusting Parties Using Homomorphic
Encryption [65]

2768
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

The 62 documents that have been selected in The helper data is acquired by binding a key,
this survey were classified based on the year of that is free from the fingerprint features of the FT.
publication as visualized in Figure 2. Computationally, it is difficult to decode the key or
the template with no knowledge of the user’s
fingerprint data. Techniques of error correction
coding are employed to provide tolerance to intra-
user variations in fingerprint data. However, the
application precludes the use of sophisticated
matcher, which leads to a reduction in the matching
accuracy. In general, a key-binding FC is not
designed to provide diversity and revocability in
fingerprint protected templates [67]. This approach
may be improved to take these two properties into
account, and indeed some efforts in this direction
have already been made with hybrid system. Some
Figure 2: Number of documents based on the year of of the techniques in this category are fuzzy vault,
publication fingerprint encryption, and fuzzy commitment.

In key generation FC, the based idea is to


3. RESULTS directly produce a cryptographic key from the
3.1 What are the types of FTP schemes that fingerprint data, instead of binding an existing key
researchers studied? with the FT as in key binding fingerprint
cryptosystems [67]. This means the helper data is
FTP schemes can be categorized into four derived only from the FT, and the cryptographic
major groups that are fingerprint cryptosystem, key is directly generated from the helper data and
template transformation, hybrid methods, and the query fingerprint features [68]. Direct key
homomorphic encryption such as shown in Figure generation of fingerprints is an attractive FTP
3. approach that can also be very useful in
cryptographic applications. However, it is difficult
to generate keys that can provide stability and
entropy along with intra-user variations in
templates. It is difficult to develop a scheme
generating the same key for different templates of
the same individual, and at the same time has a very
different key for different individuals, for example,
quantization schemes and secure sketch.

In the second category that is the template


transformation approach, transformation function is
Figure 3: Categorization of FTP schemes
used to convert user templates (T) listed in the
system into a protected template (T’). The
transform function (F) is characterized by a set of
In the first category that is fingerprint user-specific parameters, which usually come from
cryptosystems (FC), helper data is used to describe a random external keys or random password (K).
additional information of FT stored in the database After that, only the protected template, F (T, K), is
[66]. The helper data is required to extract a stored in the system database. Matching process is
cryptographic key from the query fingerprint performed in the transformed domain. Salting and
features during matching. It does not expose non-invertible transforms are the two most popular
significant information about the original schemes in feature transformation approaches.
fingerprint. Matching is done indirectly by Schematically, the authentication process in a FTP
verifying the truth of the extracted key. Typically, based on feature transformation is depicted in
error correction coding techniques are used to Figure 4.
handle intra-user variations. Based on how the
helper data derived, the FC are divided into key
binding and key generation system.

2769
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

different users are unrelated after transformation.


However, the transformation must also be non-
invertible. Thus, an adversary is not able to collect
any information about the original FT from its
protected counterpart.
Ratha, et al. [70] proposed a cancellable
fingerprint using non-invertible transforms for
producing cancellable FT. It can change the raw FT
Figure 4: The authentication process in a fingerprint by using either feature or signal domain
recognition system employing feature transformation transformations. The three transformation functions
[68] include Cartesian transformation, polar
transformation, and functional transformation.
Salting is one of FTP approaches that uses a Figure 5 shows Ratha, et al.’s scheme.
two-factor authentication scheme, where an
unprotected FT is converted to a protected template
through a function defined by an external key or a
specific user key. As long as key authentication
should be kept or remembered safely by the user
because the transformation can be reversed, for the
most part. This requires additional information on
the form of keys that increase the entropy of the FT
and hence make it difficult for the opponent to
guess the template [68]. The salting approach has a
particular limitation in that the security depends on
the secrecy of the password or key [22, 69].
However, using the memory of users for protecting
complex secret keys reveals the weakness of
password-based schemes. Because matching is Figure 5: Ratha, et al.’s schemes using Cartesian,
directly performed in the transformed domain, the polar and functional transformation
salting functions must not have an adverse effect on
the performance of recognition. This is important,
specifically when there are large intra-user The third category is hybrid techniques that can
variations. Generally, salting methods employ be designed by combining feature transformation
quantization to handle intra-user variability during and FC. Some of the systems incorporate the
matching in the transformed domain. functions of traditional cryptographic hashing into
Meanwhile, in non-invertible transform the FTP, such as an application-specific key
approach, a one-way function non-invertible releases scheme that retrieves a cryptographic key
transform applying to secure the FT. The intruder bound to a biohashed fingerprint, combining salting
cannot reconstruct the original FT if the with keybinding methods [71]. Nandakumar, et al.
transformation parameters are compromised. Due [64] proposed hardening a fingerprint-based fuzzy
to intra-class variations, the transformation has to vault with a user-specific password, combined key
align FT to run an effective comparison. This binding with salting approach.
reduces the authentication performance. A non-
invertible transform indicates the impossibility of The last category is homomorphic encryption.
obtaining the original data of fingerprint from the This technique allows calculations on encrypted
transformed version. The transformation function data. It combines homomorphic encryption with
parameters are specified by a key; however, fingerprint recognition system [72]. Rane, et al.
knowledge of the key and/or the transformed [65] presented Hamming distance calculation for
template does not promote the recovery of the their FTP scheme. Exploiting cryptosystems, Barni,
original template of fingerprint [67, 68]. The non- et al. [56] revealed a distributed biometric system,
invertible transformation method has a limitation homomorphic encryption on FT in a semi-honest
related to the difficulty in the design of a good one- model.
way function. The function of transformation has to The detail information about the all studies
ensure that the features of a fingerprint from the categorized into these four groups is shown in
same user maintain a high similarity in the Table 2.
transformed space. Meanwhile, features from

2770
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Table 2: Summary of the types of FTP schemes

Authors FTP categories Dataset Key findings

Jin, et al. [4] Non-Invertible FVC2002 DB1, DB2 and The stage techniques used in this scheme can
Transform FVC2004 DB1, DB2 prove the nature of diversity, revocability, and
performance, but have the disadvantage of the
Equal Error Rate (EER) evaluation in the token
scenarios that reach 15%.
Yang, et al. [5] Non-Invertible FVC2002DB2 This scheme achieves self-geometric alignment
Transform in the local minutiae area and imparts
randomness around minutia to achieve
diversification and encryption effects. This
scheme also has a high security and compact
template size.
Yang, et al. [6] Hybrid multi-sensor fingerprint This scheme provides a multi-biometric
Technique database with 71,994 template protection system employing decision
samples level fusion of multiple protected fingerprint
templates.
Pradheeba and Review paper This paper reviewed the pitfalls in the existing
Subban [7] FTP algorithms and suggested for research
development in hybrid methodologies to
achieve better results.
Krivokuca [8] Non-Invertible fingerprint database was This work proposed a single N-node pattern
Transform constructed using constructed using a small subset of N minutiae
fingerprints provided 100 from the corresponding minutiae template.
volunteers The scheme fulfilled the FTP properties that
are non-invertibility, cancellability, diversity,
and performance
Choi, et al. [9] Fuzzy Vault DB1 of FVC2002 The study employed One Time Fuzzy Vault
(OTFV) and add chaff minutiae to improve
fingerprint fuzzy vault security and prevent
correlation attack. The security level of this
scheme increases 1034 times as compared to the
counterpart.
Krivokuca and Non-Invertible Fingerprint database was The research produced a new fingerprint
Abdulla [10] Transform constructed using construction, based on the presentation of
fingerprints provided 100 fingerprints with a compact minutiae pattern,
volunteers meeting the cancellation and diversity
characteristics of the ideal FTP scheme.
Stanko and Non-Invertible Verifinger database and the This scheme has the advantage that it does not
Scoric [11] Transform MCYT database discard the phase information of the spectral
functions, then the speed also improved and the
EER is comparable to that of the original
spectral minutiae representation.
N. Poonguzhali Hybrid FVC2002 DB_1A, DB_2A This scheme provides FT protection and also
and M. Technique and DB_3A enables template discriminability.
Ezhilarasan [12]
Tams, et al. [13] Fuzzy Vault FVC 2002 DB1 This scheme improved fuzzy vault scheme for
three fusions of alignment-free fingerprint
feature types.
Jin Zhe [14] Non-Invertible FVC2002 DB1, DB2 and This scheme implemented the cancellable
Transform FVC2004 DB1, DB2 biometrics and biometric encryption to
transform fingerprint data into irreversibly
transformed FT. The scheme resolved FT
reissue problem.
Kumar, et al. Hybrid PSNR and NC The scheme employed watermarking
[15] Technique techniques for FT using Discrete Wavelet
Transform (DWT) and Singular Value
Decomposition (SVD). The scheme is
imperceptible, more secure, and robust.

2771
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Nazmul, Islam, Non-Invertible FVC2002 DB1-B This scheme proposed an alignment-free FTP
and Chowdhury, Transform which extracts the rotation and translation
[16] invariant features from the neighbouring region
of each minutia and then exploits the
neighbourhood information to achieve the non-
invertible property.
Tuyls, et al. [17] Fuzzy FVC2000 This scheme applied Gabor filtering to make a
Commitment fixed length FT, then converted the FT to
binary used quantize scheme. Finally, error
correction coding is applied to the binary
representation. The scheme achieved an EER
of approximately 4.2% .
Jain, et al. [18] Review paper The study reviewed three basic theoretical
frameworks for FTP that are encryption,
template transformation, and biometric
cryptosystems and addressed the practical
problems involved in applying these
techniques to secure FT.
Fernandez [19] Review Paper The analysed the types of attacks on FT to
obtain the original FT and the security
provided for the fuzzy vault and non-invertible
template protection model.
Ashish and Hybrid FVC2004DB1 The study proposed an FTP method using the
Sinha [20] Technique Gabor filter processing approach and the
orientation estimation algorithm in finding the
ridge tip and bifurcation estimation.
Takahashi [21] Non-Invertible Veridicom 5th This scheme focuses on the revocability
Transform Sense properties; the algorithm used to overcome this
issue is correlation-invariant random filtering
(CIRF) and chip matching algorithm.
Maltoni, et al. Handbook of Fingerprint Recognition The book provides general information for FTP
[22] and evaluation metrics.
Uludag and Jain Fuzzy Vault DB2 database of FVC 2002 This scheme has the advantage of tolerant to
[23] intra-user variations. However, it has low
matching accuracy.
Moon, et al. Fuzzy Vault The dataset was collected This scheme modifies the fuzzy vault to protect
[24] from 400 individuals by fingerprint templates and to perform
using the optical fingerprint verification with the protected
fingerprint sensor template at the same time.
Teoh and Ngo Salting FVC 2002 (Set A), DB1 This scheme excels in the false accept rate
[25] and DB2 (FAR) measure context, but the template is no
longer secure if the user key is compromised.
Ratha, et al. Non-Invertible IBM-99 optical database This study proposed feature-level cancellable
[26] Transform biometric construction by comparing the
performance of Cartesian, polar, and surface
folding transformations of the minutiae
positions. It achieved revocability and
prevented cross-matching of biometric
databases.
Nagar, et al. Fuzzy Vault FVC2002 DB2 The study proposed a fuzzy commitment
[27] scheme that encrypts FT using minutiae
descriptors which capture orientation and ridge
frequency information in a minutia’s
neighbourhood. In overall, it improved FT
security and matching accuracy.
Teoh and Kim Fuzzy FVC2002 DB1 Based on the false rejection rate (FRR)
[28] Commitment evaluation, this scheme indicated that only 9
out of 1000 correct Id are failed to be
generated, and the recovery success rate is up
to 99.10%.
Kholmatov and Fuzzy Vault Database of 400 fuzzy This scheme unlocked 59% of the vaults

2772
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Yanikoglu [29] vaults created using different impressions of the same


fingerprint.
Boult, et al. [30] Hybrid Method FVC2000, 2002 and 2004, This scheme provided privacy and security and
DB1 and DB2 improve the accuracy of the underlying
biometrics.
Chikkerur, et al. Non-Invertible Database of 188 fingerprint This scheme provided a viable solution to
[31] Transform images acquired from an address the privacy and security concerns
optical sensor around biometric authentication.
Yang, et al. [32] Non-Invertible FVC 2002 This scheme achieved revocability and security
Transform properties.
Nandakumar Fuzzy FVC2002-DB1 and DB2 This scheme provided high fingerprint
[33] Commitment matching accuracy.
Lee and Kim Non-Invertible FVC2004 database This study proposed a method to produce bit-
[34] Transform strings by mapping minutiae into a predefined
3D array using the coordinates of each minutia.
Liu, et al. [35] Key Generating FVC2002 DB1 and DB2 This scheme changed features of fingerprint
into the features that can be handled by some
known secure sketch construction.
Nagar, et al. Hybrid Method FVC2002 DB2 The performance and security matching of the
[36] fingerprint fuzzy vault can be enhanced by
combining minutiae descriptors.
Zhou, et al. [37] Fuzzy Vault NIST SD 14 database The proposed scheme reduced false match rate
(FMR) and significantly improved resistance
against polynomial reconstruction attacks.
Zhe and Jin [38] Non-Invertible FVC2002 DB2 This scheme achieved performance accuracy,
Transform revocation and template irreversibility.
Ahmad, et al. Non-Invertible FVC2002DB1, This scheme met the requirements for FTP. On
[39] Transform FVC2002DB2 and the other hand, performance degradation
FVC2002DB3 happenned in the case of very low
transformation.
Wang and Hu Non-Invertible FVC2002 DB1, DB2 and This scheme provided FT security because the
[40] Transform DB3 transformation and stored templates remain,
and the raw FT cannot be recovered. But
cancellable properties have not been reached.
Das, et al. [41] Non-Invertible FVC2002-DB1a and This scheme captured the minutia positional
Transform FVC2002-DB2a variations across users. However, fingerprint
hash generation and matching processes were
relatively low.
Ferrara, et al. Non-Invertible FVC2002 datasets and on This scheme proposed a reverse Minutia
[42] Transform FVC2006 DB2 Cylinder-Code (MCC) that is recovering
original minutiae positions and angles. It
provided acceptable accuracy, protection for
minutiae information, and robust against
masquerade attacks.
Li, et al. [43] Fuzzy FX3000 database, This scheme used binary length-fixed feature
Commitment FVC2002 DB1, FVC2002 generation method of fingerprint for fuzzy
DB2 commitment. The scheme outperformed most
of the existing scheme in terms of ZeroFAR
and security strength.
Imamverdiyev, Fuzzy FVC2000 DB2a This approach experienced a significant
et al. [44] Commitment degradation in accuracy and computationally
difficult to retrieve the original cryptographic
key or template.
Ranjan and Key Generating Key generation This scheme applied the divide-and-conquer
Singh [45] management method of biometric authentication. It had high
security and addressed the problem of
biometric variation of a person.
Prasad and Non-Invertible FVC 2002 DB1, DB2, and This scheme proposed alignment-free
Kumar [46] Transform DB3 cancellable template generation. It achieved
the FTP properties that are non-invertible,
accuracy, diversity and revocability.

2773
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Yang, et al. [47] Key Generating FVC2002 DB1, FVC2002 This scheme employed Delaunay quadrangle-
DB2, FVC2002 DB3 and based fingerprint authentication. It achieved
FVC2004 DB2 better recognition performance compared to
authentication systems that use absolute
geometric measurements in local registration.
Nguyen, et al. Fuzzy Vault FVC2002-DB2A, This scheme proposed fingerprint fuzzy vault
[48] FVC2004-DB3A scheme based on ridge features. It had good
performance and provided FT security.
Bansal, et al. Fuzzy Vault FVC2002-DB1_B This scheme used Hadamard transformation to
[49] achieve revocability, diversity, and security.
Li and Hu [50] Fuzzy Vault FVC 2000 (DB1), FVC This scheme proposed an alignment-free fuzzy
2002 (DB1, DB2, DB3, vault using highly discriminative pair-polar (P-
DB4), FVC 2004 (DB2) P) minutiae structures. It provided strong
and FVC 2006 (DB2, DB3) security against brute force and cross-matching
attacks.
Murillo- Non-Invertible This scheme verifies and The scheme used chaotic encryption by
Escobar, et al. Transform justify in security aspects combining the logistic map and Murillo-
[51] and its implementation in Escobar’s algorithm. The scheme is secure,
real applications embedded effective and low cost.
systems.
Sandhya and Non-Invertible FVC2002 The scheme constructed k-Nearest
Prasad [52] Transform Neighbourhood Structure (k - NNS) for
minutiae points for FT. It has a satisfactory
performance in terms of EER and also in terms
of d-prime and K-S test values obtained.
Wang and Hu Non-Invertible FVC2002 DB1, DB2 and This method has satisfactory performance
[53] Transform DB3 compared to the existing alignment-free
cancellable template schemes. However, the
performance of cancellable templates not
achieved.
Sandhya and Hybrid Method FVC 2002 DB1, DB2, and This technique has good accuracy and strong
Prasad [54] DB3 security, then also has cancellable properties.
Jin, et al. [55] Hybrid Method FVC2002 and FVC2004 This scheme has good and strong accuracy
against some major security and privacy
attacks.
Barni, et al. [56] Homomorphic Public fingerprint dataset This method has advantages in terms of data
Encryption confidentiality but low accuracy.
Guo, et al. [57] Non-Invertible FVC2002 (OBI, DB2) and This scheme achieved security, diversity, and
Transform FVC2004 (OBI, DB2) revocability. However, this scheme still
experiences stolen-token scenario.
Wong, et al. Non-Invertible FVC Datasets This scheme achieved the non-invertible and
[58] Transform revocable properties of the cancellable
template.
Gao [59] Non-Invertible FVC2000 DB1B, This scheme allowed FT recognition to be
Transform FVC2002 DB1B, performed more accurately than the original
FVC2004 DB1 templates.
Gomez-Barrero, Homomorphic Chimeric databases The scheme met FTP on irreversibility analysis
et al. [60] Encryption and unlinkability.
Sadhya and Salting FVC2002 DB1, DB2, This scheme achieved unlinkability,
Singh [61] FVC2004 DB1, DB2 cancelability and diversity requirements.
Wang, et al. Non-Invertible FVC2002 DB1, FVC2002 This scheme reduced the risk of attack via
[62] Transform DB2, FVC2002 DB3 record multiplicity (ARM). However,
FVC2004 DB2 recognition efficiency and accuracy are still
lacking.
Jin, et al. [63] Salting FVC2002 and FVC2004 This scheme has good accuracy and also meets
the non-linkability and revocability FTP.
Further research is needed for the use of this
scheme in the identification setting.
Nandakumar, et Fuzzy Vault FVC2002-DB2 and MSU- The scheme increased the entropy, improved
al. [64] DBI fingerprint databases the vault security; and enhanced user privacy.
Rane, et al. [65] Homomorphic a proprietary database of The scheme used Hamming distance,

2774
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Encryption 1035 fingers Euclidean distance, and homomorphic


encryption to enable the two parties to compute
the distortion in encrypted form without
revealing their inputs to each other.
Based on Table 2, template transformation was the remains unrecoverable when the protected FT is
most frequent type of FTP schemes studied by the compromised.
researchers. It is followed by fingerprint In revocability measures, if the stored FT is
cryptosystem, a hybrid method, and homomorphic compromised, it should be possible to cancel that
encryption. The bar chart in Figure 6 shows the FT and reissue a new one. Furthermore, the newly
number of documents based on the types of FTP issued FT should not match with the previously
scheme. compromised FT. There are two general approaches
to the revocability analysis of FTP schemes. The
first approach, which has become less common
with the progress of this field of research, involves
simply stating that the FT may be canceled because
of the possibility of altering irreversible
transformation or a set of external parameters used
on protected generation templates. The second
approach involves evaluating a revocable method
by generating multiple protected templates from
unprotected templates and then trying to match
them. If the probability of matching is low (e.g.,
Figure 6: FTP schemes frequency using by researchers approximately equal to the probability of matching
two protected templates derived from unprotected
templates), it serves as evidence that the FTP
3.2 What are the metrics used for evaluating the scheme is effectively able to establish a different
FTP schemes? identity from the same fingerprint; Therefore, it is
concluded that the FTP scheme can be canceled.
The FTP schemes can be measured using the In the evaluation of diversity, it should be
following evaluation metric [68]: possible to issue different FT for different
1. Security: Computationally, it must be difficult applications related to the same user. The FT
to obtain the original FT from the secure FT. should not match with each other and should make
2. Revocability: The scheme must be able to cross-matching impossible. It prevents tracking of
revoke the compromised FT from the same the templates. Because of their similarity with the
fingerprint data. nature of the cancellation, it is generally considered
3. Diversity: To ensure user privacy, the secured to be synonymous with decline. As a result, a
FT must not be cross-matched. similar analysis is performed to prove that the FTP
4. Performance: The scheme should not degrade scheme meets the cancellation and diversity
the accuracy of the recognition system. requirements. If the probability of two protected FT
from the same fingerprint matches is very low, the
Security is measured in terms of information appropriate FTP scheme is considered to meet the
leakage levels or computational complexity which requirements of diversity and cancellation.
is involved in the recovery of original templates Evaluating the diversity of FTP schemes should
from safe sketches or transformed templates [73, adopt a more stringent definition of diversity,
74]. There are three approaches to evaluate the stating that two protected FT from the same
security property. The first approach involves fingerprint can only be considered truly diverse if
quantifying security evaluation by estimating the they cannot be fully resolved. This is where
number of guesses needed to recover the original disconnection is considered at the level deeper than
FT from the protected FT via brute force [26, 75]. implied by direct matching.
The second approach involves providing proof by
showing that the forward mapping is many-to-one Performance is usually measured through the
and thus that the reverse mapping is one-to-many matching process with specific metrics called False
[4, 76, 77]. The third approach for evaluating the Accept Rate (FAR) and Genuine Accept Rate
security property of FTP schemes involves (GAR). Because of the intra-user variability in
computing the percentage of the original FT which fingerprint images; in general, there is a trade-off
between FAR/GAR and security in most template

2775
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

protection schemes. Lower security schemes tend to database Studies


have higher FAR/GARs and vice versa. In addition, FVC2000 This fingerprint database was [17, 30, 44,
developed for Fingerprint 50, 59]
there is also evaluation of matching performance Verification Competition 2000
using equal error rate (EER). The EER indicates (website:
that the proportion of false acceptances is equal to http://bias.csr.unibo.it/fvc2000/
that of false rejections [78]. The lower EER means, #). It consists of four different
databases; DB1, DB2, DB3,
the higher accuracy of the scheme. and DB4 which the fingerprints
Analysis of the FTP scheme in Table 2 were captured using the low-
revealed that FAR/FMR is the most widely used cost optical sensor, low-cost
evaluation metric followed by FRR, GAR, and capacitive sensor, an optical
sensor, and synthetic generator
EER. Table 3 lists the studies and the evaluation respectively.
metric applied to the FTP schemes. FVC2002 This fingerprint database was [4, 5, 8, 9,
developed for Fingerprint 12, 13, 16,
Table 3: Metrics for evaluating FTP schemes Verification Competition 2002 21, 23, 25,
Metrics Sources/Studies (website: 27, 28, 30,
Security [5, 8, 16, 17, 21, 33, 35, http://bias.csr.unibo.it/fvc2002/ 32, 33, 35,
#). It consists of four different 36, 38-42,
36, 38, 40, 41, 46-48, 50, databases; DB1, DB2, DB3 and 46-50, 52-
52-55, 63] DB4 which the fingerprints 55, 57-59,
Revocability [4, 8, 10, 21, 26, 34, 38-41, were captured using optical 61, 63, 64]
46, 50, 52-55, 59-61, 63] sensor, capacitive sensor, and
Diversity [4, 8, 10, 21, 29, 38, 39, SFinGe v2.51 sensor
50, 52, 60, 61] respectively.
False Accept Rate (FAR)/ [4, 6, 8, 9, 12, 13, 16, 17, FVC2004 This fingerprint database was [4, 30, 34,
developed for Fingerprint 48, 50, 55,
False Match Rate (FMR) 21, 23, 27, 32, 34-37, 40- Verification Competition 2004 57-59, 61,
44, 46-48, 50, 52, 53, 55- (website: 63]
57, 59, 64] http://bias.csr.unibo.it/fvc2004/
Genuine Accept Rate [9, 12, 13, 16, 23, 27, 31, #). It consists of four different
(GAR) 35, 36, 41, 44, 48, 49, 53, databases; DB1, DB2, DB3,
55, 64] and DB4 which the fingerprints
Equal Error Rate (EER) [4, 5, 8, 16, 17, 25, 30, 32, were captured using an optical
sensor, thermal sweeping
38-41, 44, 46, 47, 50, 52-
sensor, and SFinGe v3.0 sensor
54, 56, 57, 60, 61, 63] respectively.
False Rejection Rate [6, 8, 12, 16, 17, 21, 28, FVC2006 This fingerprint database was [50]
(FRR)/ False Non 32, 37, 40, 42, 43, 46, 47, developed for Fingerprint
Matching Rate (FNMR) 50, 52, 55, 57] Verification Competition 2006
(website:
http://http://bias.csr.unibo.it/fvc
2006/#). It consists of four
3.3 What are the common datasets used for different databases; DB1, DB2,
evaluating the FTP schemes? DB3, and DB4 which the
fingerprints were captured
using electric field sensor, an
The FTP schemes were evaluated using standard optical sensor, thermal
sweeping sensor, and SFinGe
datasets that are made available by researchers. The
v3.0 sensor respectively.
majority of the dataset was taken from the Database of This fingerprint database [29]
Fingerprint Verification Competition (FVC); a 400 consists of 400 fingerprint
series of competition that aims to establish a fingerprint images (2 different impressions
benchmark for improving fingerprint recognition impressions for each of 200 different
fingers) acquired with an
systems [79-82]. Apart from the FVC datasets, optical sensor and with
researchers also created their own fingerprint manually labelled minutiae
database for evaluating the FTP schemes. There are points
also other fingerprint databases that include NIST Database of The fingerprints were captured [48]
188 using an optical sensor.
SD 14, and IBM-99. Table 4 shows the description fingerprint
of the dataset and the studies that utilized them images
respectively. acquired from
an optical
sensor.
Table 4: List of fingerprint dataset used in FTP
NIST SD 14 This fingerprint database was [37]
schemes database developed by FBI. The
Fingerprint Description of the dataset Sources/ complete database consists of

2776
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

27,000 pairs of fingerprints 5. CONCLUSION


(https://www.fbibiospecs.cjis.g
ov/). This paper reviewed studies pertaining FTP
IBM-99 This database consists of 188 [83] schemes published between the year of 2000 and
optical fingerprint pairs, after rejecting
database poor quality fingerprints.
2017. 62 studies were collected and analysed in
dataset Cross This fingerprint database is [84] terms of the types of the FTP scheme, the metric
Match obtained from crossMatch used for evaluation of the schemes and the dataset
Verifier 300 Verifier 300 sensor. The dataset used for the evaluation. The literature review
contains 8 images for each
presented in this paper can be a source of reference
individual. The owner is
neurotechnology. for researchers in the area and could lead the
GUC100 The GUC100 fingerprint [6] researchers to focus their work on a particular area
Database database contains fingerprint of the FTP schemes for a specialized study.
samples collected in Norway in The rapid growth of the Internet technology
the winter-spring season of
2008 for TURBINE project. has expanded the use of fingerprint into a larger
Veringer The Verifnger database [11, 13] application boundary. For example, the fingerprint
database and contains fingerprints from six is a common authentication method for mobile
the MCYT individual persons, ten fingers applications nowadays. With the features of
database per individual, eight images per
finger. The MCYT database smartphones and wireless connection, FTP schemes
contains fingerprints from 100 definitely need to be designed to suit the mobility
individuals, 10 fingers per features and the smartphones limited resources.
individual, 12 images per Further, the evolve of the Internet of Things (IoT)
finger.
Veridicom 5th This dataset consists of 181 [21]
has also been a reason that requires FTP schemes to
Sense pairs of fingerprint images be designed in such a way that they achieve the
captured through a capacitive four desired properties; security, revocability,
sensor diversity, and performance. Hence, there is a great
opportunity to work and study FTP schemes for the
Based on the list in Table 4, it can be emerging ICT particularly the mobile application
concluded that FVC2002, FVC2004 and FVC2000 and IoT.
are the top three frequently used datasets. The
major reason leads to the selection of the database
could be due to their availability. These databases REFERENCES:
were developed for FVC competition where experts
from industry and academics participated in the [1] V. Jain, "Information Technology Issues &
competition. Only a study used FVC2006 dataset. Challenges," Pioneer Institute of Professional
Other databases such as NIST SD, IBM-99, Studies, Indore, 2009.
verifier300, GUC100, verifinger, MYCT and [2] D. Dasgupta, A. Roy, and A. Nag, "Advances
veridicom 5t sense database were infrequently used. in User Authentication," Springer2017.
On the other hand, researchers constructed their [3] M. Sandhya and M. V. Prasad, "Biometric
own fingerprint dataset. Figure 7 summarizes the Template Protection: A Systematic Literature
usage of fingerprint datasets. Review of Approaches and Modalities," in
Biometric Security and Privacy, ed: Springer,
2017, pp. 323-370.
[4] Z. Jin, A. B. J. Teoh, T. S. Ong, and C. Tee,
"Fingerprint template protection with minutiae-
based bit-string for security and privacy
preserving," Expert systems with applications,
vol. 39, pp. 6157-6167, 2012.
[5] B. Yang, C. Busch, P. Bours, and D. Gafurov,
"Robust minutiae hash for fingerprint template
protection," in Media Forensics and Security
II, 2010, p. 75410R.
[6] B. Yang, C. Busch, K. De Groot, H. Xu, and R.
N. Veldhuis, "Performance evaluation of
Figure 7: The fingerprint dataset usage fusing protected fingerprint minutiae templates
on the decision level," Sensors, vol. 12, pp.
5246-5272, 2012.

2777
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

[7] R. Subban, "Fingerprint template protection to practice," in Security and Privacy in


techniques—A survey and analysis," in Biometrics, ed: Springer, 2013, pp. 187-214.
Computational Intelligence and Computing [19] R. S. Fernandez, "Fingerprint template
Research (ICCIC), 2014 IEEE International protection scheme, security and vulnerabilities:
Conference on, 2014, pp. 1-6. A survey," presented at the 3rd International
[8] V. Krivokuca, "Fingerprint Template Conference & Exhibition on Biometrics &
Protection using Compact Minutiae Patterns," Biostatistics
ResearchSpace@ Auckland, 2015. Hilton Baltimore - BWI Airport, USA, 2011.
[9] W. Y. Choi, Y. Chung, J.-W. Park, and D. [20] M. Ashish and G. Sinha, "Biometric Template
Hong, "Fingerprint Template Protection Using Protection," J Biostat Biometric App, vol. 1, p.
One-Time Fuzzy Vault," KSII Transactions on 202, 2016.
Internet & Information Systems, vol. 5, 2011. [21] K. Takahashi and S. Hirata, "Cancelable
[10] V. Krivokuća and W. Abdulla, "Cancellability biometrics with provable security and its
and diversity analysis of fingerprint template application to fingerprint verification," IEICE
protection scheme based on compact minutiae transactions on fundamentals of electronics,
pattern," Information Security Journal: A communications and computer sciences, vol.
Global Perspective, vol. 25, pp. 109-123, 2016. 94, pp. 233-244, 2011.
[11] T. Stanko and B. Skoric, "Minutia-pair spectral [22] D. Maltoni, D. Maio, A. Jain, and S.
representations for fingerprint template Prabhakar, Handbook of fingerprint
protection," arXiv preprint arXiv:1703.06811, recognition: Springer Science & Business
2017. Media, 2009.
[12] N. Poonguzhali and M. Ezhilarasan, "A Hybrid [23] U. Uludag and A. Jain, "Securing fingerprint
Template Protection Technique for Fingerprint template: Fuzzy vault with helper data," in
Biometric Authentication System," in Computer Vision and Pattern Recognition
Proceedings of the International Conference Workshop, 2006. CVPRW'06. Conference on,
on Informatics and Analytics, 2016, p. 43. 2006, pp. 163-163.
[13] B. Tams, J. Merkle, C. Rathgeb, J. Wagner, U. [24] D. Moon, S. Lee, S. Jung, Y. Chung, M. Park,
Korte, and C. Busch, "Improved fuzzy vault and O. Yi, "Fingerprint template protection
scheme for alignment-free fingerprint using fuzzy vault," in International Conference
features," in Biometrics Special Interest Group on Computational Science and Its
(BIOSIG), 2015 International Conference of Applications, 2007, pp. 1141-1151.
the, 2015, pp. 1-12. [25] A. B. Teoh and D. C. Ngo, "Biophasor: Token
[14] Z. Jin, "Privacy Preserving Minutia-Based supplemented cancellable biometrics," in
Fingerprint Template Protection Techiniques," Control, Automation, Robotics and Vision,
UTAR, 2015. 2006. ICARCV'06. 9th International
[15] S. Kumar and A. Garg, "A Fingerprint Conference on, 2006, pp. 1-5.
Template Protection using Watermarking," [26] N. K. Ratha, S. Chikkerur, J. H. Connell, and
International Journal of Computer R. M. Bolle, "Generating cancelable fingerprint
Applications, vol. 149, 2016. templates," IEEE Transactions on pattern
[16] R. Nazmul, M. R. Islam, and A. R. analysis and machine intelligence, vol. 29,
Chowdhury, "Alignment-Free Fingerprint 2007.
Template Protection Technique Based on [27] A. Nagar, K. Nandakumar, and A. K. Jain,
Minutiae Neighbourhood Information," in "Securing fingerprint template: Fuzzy vault
International Conference on Applications and with minutiae descriptors," in Pattern
Techniques in Cyber Security and Intelligence, Recognition, 2008. ICPR 2008. 19th
2017, pp. 256-265. International Conference on, 2008, pp. 1-4.
[17] P. Tuyls, A. H. Akkermans, T. A. Kevenaar, [28] A. B. J. Teoh and J. Kim, "Secure biometric
G.-J. Schrijen, A. M. Bazen, and R. N. template protection in fuzzy commitment
Veldhuis, "Practical biometric authentication scheme," IEICE Electronics Express, vol. 4,
with template protection," in International pp. 724-730, 2007.
Conference on Audio-and Video-Based [29] A. Kholmatov and B. Yanikoglu, "Realization
Biometric Person Authentication, 2005, pp. of correlation attack against the fuzzy vault
436-446. scheme," in Proc. SPIE, 2008, pp. 1-7.
[18] A. K. Jain, K. Nandakumar, and A. Nagar, [30] T. E. Boult, W. J. Scheirer, and R. Woodworth,
"Fingerprint template protection: From theory "Revocable fingerprint biotokens: Accuracy

2778
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

and security analysis," in Computer Vision and based on minimum distance graphs," Pattern
Pattern Recognition, 2007. CVPR'07. IEEE Recognition, vol. 45, pp. 3373-3388, 2012.
Conference on, 2007, pp. 1-8. [42] M. Ferrara, D. Maltoni, and R. Cappelli,
[31] S. Chikkerur, N. K. Ratha, J. H. Connell, and "Noninvertible minutia cylinder-code
R. M. Bolle, "Generating registration-free representation," IEEE Transactions on
cancelable fingerprint templates," in Information Forensics and Security, vol. 7, pp.
Biometrics: Theory, Applications and Systems, 1727-1737, 2012.
2008. BTAS 2008. 2nd IEEE International [43] P. Li, X. Yang, H. Qiao, K. Cao, E. Liu, and J.
Conference on, 2008, pp. 1-6. Tian, "An effective biometric cryptosystem
[32] H. Yang, X. Jiang, and A. C. Kot, "Generating combining fingerprints with error correction
secure cancelable fingerprint templates using codes," Expert Systems with Applications, vol.
local and global features," in Computer Science 39, pp. 6562-6574, 2012.
and Information Technology, 2009. ICCSIT [44] Y. Imamverdiyev, A. B. J. Teoh, and J. Kim,
2009. 2nd IEEE International Conference on, "Biometric cryptosystem based on discretized
2009, pp. 645-649. fingerprint texture descriptors," Expert Systems
[33] K. Nandakumar, "A fingerprint cryptosystem with Applications, vol. 40, pp. 1888-1901,
based on minutiae phase spectrum," in 2013.
Information Forensics and Security (WIFS), [45] R. Ranjan and S. K. Singh, "Improved and
2010 IEEE International Workshop on, 2010, innovative key generation algorithms for
pp. 1-6. biometric cryptosystems," in Advance
[34] C. Lee and J. Kim, "Cancelable fingerprint Computing Conference (IACC), 2013 IEEE 3rd
templates using minutiae-based bit-strings," International, 2013, pp. 943-946.
Journal of Network and Computer [46] M. V. Prasad and C. S. Kumar, "Fingerprint
Applications, vol. 33, pp. 236-246, 2010. template protection using multiline
[35] E. Liu, J. Liang, L. Pang, M. Xie, and J. Tian, neighboring relation," Expert Systems with
"Minutiae and modified biocode fusion for Applications, vol. 41, pp. 6114-6122, 2014.
fingerprint-based key generation," Journal of [47] W. Yang, J. Hu, and S. Wang, "A Delaunay
Network and Computer Applications, vol. 33, quadrangle-based fingerprint authentication
pp. 221-235, 2010. system with template protection using topology
[36] A. Nagar, K. Nandakumar, and A. K. Jain, "A code for local registration and security
hybrid biometric cryptosystem for securing enhancement," IEEE transactions on
fingerprint minutiae templates," Pattern Information Forensics and Security, vol. 9, pp.
Recognition Letters, vol. 31, pp. 733-741, 1179-1192, 2014.
2010. [48] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li,
[37] X. Zhou, A. Opel, J. Merkle, U. Korte, and C. "Performance and security-enhanced fuzzy
Busch, "Enhanced template protection with vault scheme based on ridge features for
passwords for fingerprint recognition," in distorted fingerprints," IET Biometrics, vol. 4,
Security and Communication Networks pp. 29-39, 2015.
(IWSCN), 2011 Third International Workshop [49] D. Bansal, S. Sofat, and M. Kaur, "Fingerprint
on, 2011, pp. 67-74. fuzzy vault using hadamard transformation," in
[38] J. Zhe and A. T. B. Jin, "Fingerprint template Advances in Computing, Communications and
protection with minutia vicinity Informatics (ICACCI), 2015 International
decomposition," in Biometrics (IJCB), 2011 Conference on, 2015, pp. 1830-1834.
International Joint Conference on, 2011, pp. 1- [50] C. Li and J. Hu, "A security-enhanced
7. alignment-free fuzzy vault-based fingerprint
[39] T. Ahmad, J. Hu, and S. Wang, "Pair-polar cryptosystem using pair-polar minutiae
coordinate-based cancelable fingerprint structures," IEEE Transactions on Information
templates," Pattern Recognition, vol. 44, pp. Forensics and Security, vol. 11, pp. 543-555,
2555-2564, 2011. 2016.
[40] S. Wang and J. Hu, "Alignment-free cancelable [51] M. Murillo-Escobar, C. Cruz-Hernández, F.
fingerprint template design: A densely infinite- Abundiz-Pérez, and R. López-Gutiérrez, "A
to-one mapping (DITOM) approach," Pattern robust embedded biometric authentication
Recognition, vol. 45, pp. 4129-4137, 2012. system based on fingerprint and chaotic
[41] P. Das, K. Karthik, and B. C. Garai, "A robust encryption," Expert Systems with Applications,
alignment-free fingerprint hashing algorithm vol. 42, pp. 8198-8211, 2015.

2779
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

[52] M. Sandhya and M. V. Prasad, "k-Nearest [63] Z. Jin, Y.-L. Lai, J.-Y. Hwang, S. Kim, and A.
Neighborhood Structure (k-NNS) based B. J. Teoh, "A New and Practical Design of
alignment-free method for fingerprint template Cancellable Biometrics: Index-of-Max
protection," in Biometrics (ICB), 2015 Hashing," arXiv preprint arXiv:1703.05455,
International Conference on, 2015, pp. 386- 2017.
393. [64] K. Nandakumar, A. Nagar, and A. K. Jain,
[53] S. Wang and J. Hu, "A blind system "Hardening fingerprint fuzzy vault using
identification approach to cancelable password," in International conference on
fingerprint templates," Pattern Recognition, Biometrics, 2007, pp. 927-937.
vol. 54, pp. 14-22, 2016. [65] S. D. Rane, W. Sun, and A. Vetro, "Secure
[54] M. Sandhya and M. V. Prasad, "Cancelable distortion computation among untrusting
fingerprint cryptosystem based on convolution parties using homomorphic encryption," in
coding," in Advances in Signal Processing and Image Processing (ICIP), 2009 16th IEEE
Intelligent Recognition Systems, ed: Springer, International Conference on, 2009, pp. 1485-
2016, pp. 145-157. 1488.
[55] Z. Jin, A. B. J. Teoh, B.-M. Goi, and Y.-H. [66] A. Vetro and N. Memon, "Biometric system
Tay, "Biometric cryptosystems: A new security," in Tutorial presented at Second
biometric key binding and its implementation International Conference on Biometrics, Seoul,
for fingerprint minutiae-based representation," South Korea, 2007.
Pattern Recognition, vol. 56, pp. 50-62, 2016. [67] D. Maltoni, D. Maio, A. K. Jain, and S.
[56] M. Barni, T. Bianchi, D. Catalano, M. Di Prabhakar, "Securing Fingerprint Systems,"
Raimondo, R. D. Labati, P. Failla, et al., "A Handbook of Fingerprint Recognition, pp. 371-
privacy-compliant fingerprint recognition 416, 2009.
system based on homomorphic encryption and [68] A. K. Jain, K. Nandakumar, and A. Nagar,
fingercode templates," in Biometrics: theory "Biometric template security," EURASIP
applications and systems (BTAS), 2010 Fourth Journal on Advances in Signal Processing, vol.
IEEE International Conference on, 2010, pp. 2008, p. 113, 2008.
1-7. [69] L. Nanni and A. Lumini, "Cancellable
[57] L. Guo, Y. Mao, and Y. Guo, "Non-invertible biometrics: problems and solutions for
fingerprint template protection with polar improving accuracy," Biometrics: Methods,
transformations," in 2016 14th Annual Applications and Analyses, 2010.
Conference on Privacy, Security and Trust [70] N. K. Ratha, J. H. Connell, and R. M. Bolle,
(PST), 2016, pp. 730-735. "Enhancing security and privacy in biometrics-
[58] W. J. Wong, A. B. Teoh, Y. H. Kho, and M. D. based authentication systems," IBM systems
Wong, "Kernel PCA enabled bit-string Journal, vol. 40, pp. 614-634, 2001.
representation for minutiae-based cancellable [71] T. S. Ong, A. T. B. Jin, and D. C. L. Ngo,
fingerprint template," Pattern Recognition, vol. "Application-Specific Key Release Scheme
51, pp. 197-208, 2016. from Biometrics," IJ Network Security, vol. 6,
[59] Q. Gao, "Toward Constructing Cancellable pp. 127-133, 2008.
Templates using K-Nearest Neighbour [72] S. Ye, Y. Luo, J. Zhao, and S.-C. Cheung,
Method," 2017. "Anonymous biometric access control,"
[60] M. Gomez-Barrero, E. Maiorana, J. Galbally, EURASIP Journal on Information Security,
P. Campisi, and J. Fierrez, "Multi-biometric vol. 2009, p. 865259, 2009.
template protection based on Homomorphic [73] T. Ignatenko and F. M. Willems, "Biometric
Encryption," Pattern Recognition, vol. 67, pp. systems: Privacy and secrecy aspects," IEEE
149-163, 2017. Transactions on Information Forensics and
[61] D. Sadhya and S. K. Singh, "Design of a Security, vol. 4, pp. 956-973, 2009.
cancelable biometric template protection [74] L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-
scheme for fingerprints based on cryptographic security tradeoffs in reusable biometric security
hash functions," Multimedia Tools and systems," in Acoustics Speech and Signal
Applications, pp. 1-25, 2017. Processing (ICASSP), 2010 IEEE International
[62] S. Wang, W. Yang, and J. Hu, "Design of Conference on, 2010, pp. 1722-1725.
Alignment-Free Cancelable Fingerprint [75] S. Wang and J. Hu, "Design of alignment-free
Templates with Zoned Minutia Pairs," Pattern cancelable fingerprint templates via curtailed
Recognition, vol. 66, pp. 295-301, 2017.

2780
Journal of Theoretical and Applied Information Technology
31st May 2018. Vol.96. No 10
© 2005 – ongoing JATIT & LLS

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

circular convolution," Pattern Recognition,


vol. 47, pp. 1321-1329, 2014.
[76] D. Moon, J. H. Yoo, and M. K. Lee, "Improved
cancelable fingerprint templates using
minutiae‐based functional transform," Security
and Communication Networks, vol. 7, pp.
1543-1551, 2014.
[77] W.-j. Wong, M.-l. D. Wong, and Y.-h. Kho,
"Multi-line code: A low complexity revocable
fingerprint template for cancelable biometrics,"
Journal of Central South University, vol. 20,
pp. 1292-1297, 2013.
[78] C. Rathgeb, A. Uhl, and P. Wild, Iris
biometrics: from segmentation to template
security vol. 59: Springer Science & Business
Media, 2012.
[79] D. Maio, D. Maltoni, R. Cappelli, J. L.
Wayman, and A. K. Jain, "FVC2000:
Fingerprint verification competition," IEEE
Transactions on Pattern Analysis and Machine
Intelligence, vol. 24, pp. 402-412, 2002.
[80] D. Maio, D. Maltoni, R. Cappelli, J. L.
Wayman, and A. K. Jain, "FVC2002: Second
fingerprint verification competition," in
Pattern recognition, 2002. Proceedings. 16th
international conference on, 2002, pp. 811-
814.
[81] D. Maio, D. Maltoni, R. Cappelli, J. L.
Wayman, and A. K. Jain, "FVC2004: Third
fingerprint verification competition," in
Biometric Authentication, ed: Springer, 2004,
pp. 1-7.
[82] R. Cappelli, M. Ferrara, A. Franco, and D.
Maltoni, "Fingerprint verification competition
2006," Biometric Technology Today, vol. 15,
pp. 7-9, 2007.
[83] Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim,
and D. Ahn, "Automatic alignment of
fingerprint features for fuzzy fingerprint vault,"
in CISC, 2005, pp. 358-369.
[84] U. Uludag and A. K. Jain, "Fuzzy fingerprint
vault," in Proc. Workshop: Biometrics:
Challenges arising from theory to practice,
2004, pp. 13-16.

2781

You might also like