Abstract
Biometric authentication systems (BASs) have various advantages over traditional authentication systems such as password based systems. In BASs, information related to individuals’ physical and psychological characteristics is employed for authentication. The leakage of such information will breach individuals’ privacy severely. To simultaneously protect privacy and achieve higher authentication accuracy, privacy preserving multibiometric authentication systems (PPMASs) have been developed. This paper provides a comprehensive review of PPMASs. Specifically, we outline the requirements of PPMASs and discuss the state-of-the-art PPMASs. We also discuss PPMASs in the context of mobile and cloud based applications. Furthermore, we show the drawbacks of the existing PPMASs and point out the future research directions of PPMASs.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Note that altering the biometric features extracted from different biometric signals cannot be carried out by the standard encryption techniques. The reason is that the matching score returned by comparing two encrypted biometric features does not reflect the similarity of the two compared biometric features. Instead, this can be done by techniques such as biohashing and indivertible transform.
References
Arandjelovic O, Hammoud R (2006) Multi-sensory face biometric fusion (for personal identification). In: Conf. comput. vision and pattern recognit., pp 1–8
Aronowitz H, Li M, Toledo-Ronen O, Harary S, Geva A, Ben-David S, Rendel A, Hoory R, Ratha N, Pankanti S, Nahamoo D (2014) Multi-modal biometrics for mobile authentication. In: IEEE Int. conf. biometrics, pp 1–8
Blanton M, Aliasgari M (2013) Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans Inf Forens Secur 8(9):1433–1445
Boyen X (2004) Reusable cryptographic fuzzy extractors. In: ACM conf. comput. and commun. security, pp 82–91
Bringer J, Chabanne H, Cohen G, Kindarji B, Zemor G (2007) Optimal iris fuzzy sketches. In: IEEE Int. conf. on biometrics: Theory, Applicat., and Syst., pp 1–6
Chetty G, Wagner M (2006) Multilevel liveness verification for face-voice biometric authentication. In: Biometrics symp.: special session on research at the biometric consortium conf., pp 1–6
Dandawate YH, Inamdar SR (2015) Fusion based multimodal biometric cryptosystem. In: Int. conf. ind. instrumentation and control, pp 1484–1489
Dass SC, Nandakumar K, Jain AK (2005) A principled approach to score level fusion in multimodal biometric systems. In: 5th Int. conf. audio and video-based biometric person authent., pp 1049–1058
Daugman J (2000) Combining multiple biometrics. [Online]. http://www.cl.cam.ac.uk/~jgd1000/combine/combine.html
Daugman J (2004) Iris recognition and anti-spoofing countermeasures. In: Int. biometrics conf
Derawi MO, Gafurov D, Larsen R, Busch C, Bours P (2010) Fusion of gait and fingerprint for user authentication on mobile devices. In: 2nd Int. Workshop security and commun. networks, pp 1–6
Gawande U, Hajari KO, Golhar YG (2014) Novel cryptographic algorithm based fusion of multimodal biometrics authentication system. In: Int. conf. comput. and commun. technol., pp 1–6
Hong L, Jain AK (1998) Integrating faces and fingerprints for personal identification. IEEE Trans Pattern Anal Mach Intell 20(12):1295–1307
Iida K, Kiya H (2016) Secure and robust identification based on fuzzy commitment scheme for JPEG images. In: IEEE Int. symp. on broadband multimedia syst. and broadcast., pp 1–5
Jain AK, Uludag U (2002) Hiding fingerprint minutiae in images. In: 3rd Workshop automatic identification advanced tech., pp 97–102
Jain AK, Uludag U, Hsu RL (2002) Hiding a face in a fingerprint image. In: Int. conf. pattern recognit., pp 756–759
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. EURASIP. J Adv Signal Process 2008:1–17
Jin ATB, Ling DN, Goh A (2008) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255
JTC1 SC27 IT Security Techniques (2011) ISO/IEC 24745: biometric information protection, Intl Organization for Standardization (ISO)
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: ACM conf. comput. and commun. security, pp 28–36
Kaur H, Khanna P (2015) Biometric template protection using cancelable biometrics and visual cryptography techniques. Multimedia Tools Appl:1–29. doi:10.1007/s11042-015-2933-6
Kumar A, Wong DC, Shen HC, Anil KJ (2003) Personal verification using palmprint and hand geometry biometric, vol 2688. Springer, Heidelberg, pp 668–678
Lam L, Suen CY (1995) Optimal combination of pattern classifiers. Pattern Recogn Lett 16(9): 945–954
Lam L, Suen CY (1997) Application of majority voting to pattern recognition: An analysis of its behavior and performance. IEEE Trans Syst Man Cybern Part A: Syst Humans 27(5):553–568
Li Q, Guo M, Chang E-C (2008) Fuzzy extractors for asymmetric biometric representations. In: IEEE workshop on biometrics (in association with CVPR), pp 1–6
Li C, Hu J, Pieprzyk J, Susilo W (2015) A new biocryptosystem-oriented security analysis framework and implementation of multibiometric cryptosystems based on decision level fusion. IEEE Trans Inf Forens Secur 10(6):1193–1206
Liu Y, Hatzinakos D (2015) Biohashing for human acoustic signature based on random projection. Cand J Elect Comput Eng 38(3):66–273
Nagar A, Nandakumar K, Jain AK (2012) Multibiometric cryptosystems based on feature-level fusion. IEEE Trans Inf Forens Secur 7(1):255–268
Nandakumar K, Jain AK (2008) Multibiometric template security using fuzzy vault. In: IEEE Int. conf. biometrics: theory, applicat. and syst., pp 1–6
Nandakumar K, Jain AK (2015) Biometric template protection: bridging the performance gap between theory and practice. IEEE Signal Process Mag 32(5):88–100
Nandakumar K, Jain AK, Pankanti S (2007) Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans Inf Forens Secur 2(4):744–757
Natgunanathan I, Xiang Y, Rong Y, Zhou W, Guo S (2012) Robust patchwork-based embedding and decoding scheme for digital audio watermarking. IEEE Trans Audio Speech Lang Process 20(8):2232–2239
Natgunanathan I, Xiang Y, Rong Y, Peng D (2013) Robust patchwork-based watermarking method for stereo audio signals. Multimedia Tools Appl 72(2):1–24
Nguyen TH, Wang Y, Ha Y, Li R (2013) Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrics 2(2):48–55
Nguyen TAT, Dang TK (2015) Combining fuzzy extractor in biometric-kerberos based authentication protocol. In: Int. conf. on advanced comput. and appl., pp 1–6
Ong TS, Teng JH, Muthu KS, Teoh ABJ (2013) Multi-instance finger vein recognition using minutiae matching. In: Int. congress on image and signal process., pp 1730–1735
Ramalho MB, Correia PL, Soares LD (2012) Hand-based multimodal identification system with secure biometric template storage. IET Comput Vis 6 (3):165–173
Ratha NK, Connell JH, Bok RM (2000) Secure data hiding in wavelet compressed fmgerprint images. In: ACM Multimedia workshops, pp 127–130
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614–634
Ratha NK, Chikkerur S, Connell JH, Bolle RM (2007) Generating cancelable fingerprint templates. IEEE Trans Pattern Anal Mach Intell 29(4):561–572
Ross A, Jain AK (2003) Information fusion in biometrics. Pattern Recogn Letts 24:2125–2215
Rudrakshi PG, Hatture SKM (2014) A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem. In: Int. conf. computer and commun. technol., pp 169–174
Safie SI, Nurfazira H, Azavitra Z, Soraghan JJ, Petropoulakis L (2014) Pulse active transform: a non-invertible transformation with application to ECG biometric authentication. In: Region 10 symp., pp 667–671
Sim T, Jankiraman R, Kumar S (2007) Continuous verification using multimodal biometrics. IEEE Trans Pattern Anal Mach Intell 29(4):687–700
Sun D, Li Q, Liu T, He B, Qiu Z (2005) A secure multimodal biometric verification scheme. In: Advances in biometric person authentication (lecture notes computer science), vol 3781, pp 233–240
Sutcu Y, Li Q, Memon N (2007) Secure biometric templates from fingerprint-face features. In: IEEE conf. comput. vision and pattern recognit., pp 1–6
Tams B (2016) Unlinkable minutiae-based fuzzy vault for multiple fingerprints. IET Biometrics 5(3):170–180
Teoh ABJ, Yuang CT (2007) Cancelable biometrics realization with multispace random projections. IEEE Trans Syst Man Cybern Part B 37(5):840–854
Teoh A, Kim J (2007) Secure biometric template protection in fuzzy commitment scheme. IEICE Electron Express 4(23):724–730
Teoh AB, Kuan YW, Lee S (2008) Cancellable biometrics and annotations on biohash. Pattern Recogn 41(6):2034–2044
Thepade SD, Bhondave RK (2015) Novel multimodal identification technique using iris & palmprint traits with various matching score level proportions using BTC of bit plane slices. In: Int. conf. pervasive comput., pp 1–4
Vatsa M, Singh R, Mitra P, Noore A (2004) Digital watermarking based secure multimodal biometric system. In: IEEE Int. conf. syst., man, and cybernetics, pp 2983–2987
Vildjiounaite E, Makela S-M, Lindholm M, Kyllonen V, Ailisto H (2007) Increasing security of mobile devices by decreasing user effort in verification. In: 2nd Int. conf. syst. and networks commun., pp 80–86
Wang D, Li J, Memik G (2009) Authentication scheme of DRM system for remote users based on multimodal biometrics, watermarking and smart cards. In: Global congress intell. syst., pp 530–534
Whitelam C, Osia N, Bourlai T (2013) Securing multimodal biometric data through watermarking and steganography. In: IEEE Int. conf. tech. for homeland security, pp 61–66
Xu L, Krzyzak A, Suen CY (1992) Methods for combining multiple classifiers and their applications to handwriting recognition. IEEE Trans Syst Man Cybern 22 (3):418–435
Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circ Syst Video Technol 25(5):717–729
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Natgunanathan, I., Mehmood, A., Xiang, Y. et al. An overview of protection of privacy in multibiometrics. Multimed Tools Appl 77, 6753–6773 (2018). https://doi.org/10.1007/s11042-017-4596-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4596-y