Abstract
Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two different approaches for the protection of on-line signature biometric templates. In the first one, cryptographic techniques are employed to protect signature features, making impossible to derive the original biometrics from the stored templates. In the second one, data hiding techniques are used to design a security scalable authentication system, embedding some dynamic signature features into a static representation of the signature itself. Extensive experimental results are provided to show the effectiveness of the presented protection methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine 1, 33–42 (2003)
Ratha, N., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proc. Int. Conf. Audio and Video-based Biometric Person Authentication (2001)
Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)
Maiorana, E., Campisi, P., Neri, A.: Biometric Signature Authentication Using Radon Transform-Based watermarking Techniques. In: IEEE Biometric Symposium, Baltimore, MD, USA (2007)
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. In: EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics (2008)
Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Trans. on Inf. Forensics and Security 2(3) (2007)
Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: 6th ACM Conf. Computer and Communication Security, Singapore, pp. 28–36 (1999)
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings IEEE on International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)
Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. on Pattern Analysis and Machine Intelligence 28(12) (2006)
Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on PAMI 29(4) (2007)
Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric Hash based on statistical Features of online Signatures. In: Int. Conf. on Pattern Recognition, vol. 1 (2002)
Feng, H., Chan, C.W.: Private Key Generation from On-line Handwritten Signatures. In: Information Management and Computer Security, pp. 159–164 (2002)
Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic key generation using handwritten signature. In: SPIE, Defense and Security Symposium, Biometric Technologies for Human Identification, vol. 6202, pp. 225–231 (2006)
Van der Veen, M., Kevenaar, T., Schrijen, G.-J., Akkermans, T.H., Zuo, F.: Face biometrics with renewable templates. In: SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents, vol. 6072 (2006)
Maiorana, E., Campisi, P., Neri, A.: User Adaptive Fuzzy Commitment for Signature Templates Protection and Renewability. SPIE Journal of Electronic Imaging, Special Issue on Biometrics (2008)
Campisi, P., Maiorana, E., Neri, A.: On-line signature based authentication: template security issues and countermeasures. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications. Wiley/IEEE (in print, May 2008)
Maiorana, E., Campisi, P., Neri, A.: On-line signature authentication: user adaptive template protection and renewability. In: SPIE Defense and Security, Mobile Multimedia/Image Processing, Security, and Applications, Orlando, vol. 6982 (2008)
Purser, M.: Introduction to Error-Correcting Codes. Artech House, Boston (1995)
Vielhauer, C., Steinmetz, R.: Handwriting: Feature Correlation Analysis for Biometric Hashes. EURASIP Journal on Applied Signal Processing, Special Issue on Biometric 4, 542–558 (2004)
Do, M.N., Vetterli, M.: The Finite Ridgelet Transform for Image Representation. IEEE Transactions on Image Processing 12(1), 16–28 (2003)
Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Methods for Digital Watermarking and Information embedding. IEEE Transactions on Information Theory 47 (2001)
Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maiorana, E., Campisi, P., Neri, A. (2008). Template Protection for On-Line Signature-Based Recognition Systems. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-89991-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89990-7
Online ISBN: 978-3-540-89991-4
eBook Packages: Computer ScienceComputer Science (R0)