Skip to main content

Template Protection for On-Line Signature-Based Recognition Systems

  • Conference paper
Biometrics and Identity Management (BioID 2008)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5372))

Included in the following conference series:

  • 1309 Accesses

Abstract

Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two different approaches for the protection of on-line signature biometric templates. In the first one, cryptographic techniques are employed to protect signature features, making impossible to derive the original biometrics from the stored templates. In the second one, data hiding techniques are used to design a security scalable authentication system, embedding some dynamic signature features into a static representation of the signature itself. Extensive experimental results are provided to show the effectiveness of the presented protection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Prabhakar, S., Pankanti, S., Jain, A.K.: Biometric Recognition: Security and Privacy Concerns. IEEE Security & Privacy Magazine 1, 33–42 (2003)

    Article  Google Scholar 

  2. Ratha, N., Connell, J.H., Bolle, R.M.: An analysis of minutiae matching strength. In: Proc. Int. Conf. Audio and Video-based Biometric Person Authentication (2001)

    Google Scholar 

  3. Jain, A.K., Uludag, U.: Hiding Biometric Data. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  4. Maiorana, E., Campisi, P., Neri, A.: Biometric Signature Authentication Using Radon Transform-Based watermarking Techniques. In: IEEE Biometric Symposium, Baltimore, MD, USA (2007)

    Google Scholar 

  5. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. In: EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics (2008)

    Google Scholar 

  6. Sutcu, Y., Li, Q., Memon, N.: Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Trans. on Inf. Forensics and Security 2(3) (2007)

    Google Scholar 

  7. Juels, A., Wattenberg, M.: A Fuzzy Commitment Scheme. In: 6th ACM Conf. Computer and Communication Security, Singapore, pp. 28–36 (1999)

    Google Scholar 

  8. Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings IEEE on International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)

    Google Scholar 

  9. Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. on Pattern Analysis and Machine Intelligence 28(12) (2006)

    Google Scholar 

  10. Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Transactions on PAMI 29(4) (2007)

    Google Scholar 

  11. Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric Hash based on statistical Features of online Signatures. In: Int. Conf. on Pattern Recognition, vol. 1 (2002)

    Google Scholar 

  12. Feng, H., Chan, C.W.: Private Key Generation from On-line Handwritten Signatures. In: Information Management and Computer Security, pp. 159–164 (2002)

    Google Scholar 

  13. Freire-Santos, M., Fierrez-Aguilar, J., Ortega-Garcia, J.: Cryptographic key generation using handwritten signature. In: SPIE, Defense and Security Symposium, Biometric Technologies for Human Identification, vol. 6202, pp. 225–231 (2006)

    Google Scholar 

  14. Van der Veen, M., Kevenaar, T., Schrijen, G.-J., Akkermans, T.H., Zuo, F.: Face biometrics with renewable templates. In: SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents, vol. 6072 (2006)

    Google Scholar 

  15. Maiorana, E., Campisi, P., Neri, A.: User Adaptive Fuzzy Commitment for Signature Templates Protection and Renewability. SPIE Journal of Electronic Imaging, Special Issue on Biometrics (2008)

    Google Scholar 

  16. Campisi, P., Maiorana, E., Neri, A.: On-line signature based authentication: template security issues and countermeasures. In: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakou, E. (eds.) Biometrics: Theory, Methods, and Applications. Wiley/IEEE (in print, May 2008)

    Google Scholar 

  17. Maiorana, E., Campisi, P., Neri, A.: On-line signature authentication: user adaptive template protection and renewability. In: SPIE Defense and Security, Mobile Multimedia/Image Processing, Security, and Applications, Orlando, vol. 6982 (2008)

    Google Scholar 

  18. Purser, M.: Introduction to Error-Correcting Codes. Artech House, Boston (1995)

    MATH  Google Scholar 

  19. Vielhauer, C., Steinmetz, R.: Handwriting: Feature Correlation Analysis for Biometric Hashes. EURASIP Journal on Applied Signal Processing, Special Issue on Biometric 4, 542–558 (2004)

    Article  Google Scholar 

  20. Do, M.N., Vetterli, M.: The Finite Ridgelet Transform for Image Representation. IEEE Transactions on Image Processing 12(1), 16–28 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  21. Chen, B., Wornell, G.: Quantization Index Modulation: a Class of Provably Good Methods for Digital Watermarking and Information embedding. IEEE Transactions on Information Theory 47 (2001)

    Google Scholar 

  22. Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Heidelberg (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maiorana, E., Campisi, P., Neri, A. (2008). Template Protection for On-Line Signature-Based Recognition Systems. In: Schouten, B., Juul, N.C., Drygajlo, A., Tistarelli, M. (eds) Biometrics and Identity Management. BioID 2008. Lecture Notes in Computer Science, vol 5372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89991-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89991-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89990-7

  • Online ISBN: 978-3-540-89991-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics