A Security Analysis of Biometric Template Protection Schemes View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2009

AUTHORS

Xuebing Zhou , Stephen D. Wolthusen , Christoph Busch , Arjan Kuijper

ABSTRACT

Biometric features provide considerable usability benefits. At the same time, the inability to revoke templates and likelihood of adversaries being able to capture features raise security concerns. Recently, several template protection mechanisms have been proposed, which provide a one-way mapping of templates onto multiple pseudo-identities. While these proposed schemes make assumptions common for cryptographic algorithms, the entropy of the template data to be protected is considerably lower per bit of key material used than assumed owing to correlations arising from the biometric features. We review several template protection schemes and existing attacks followed by a correlation analysis for a selected biometric feature set and demonstrate that these correlations leave the stream cipher mechanism employed vulnerable to, among others, known plaintext-type attacks. More... »

PAGES

429-438

References to SciGraph publications

Book

TITLE

Image Analysis and Recognition

ISBN

978-3-642-02610-2
978-3-642-02611-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43

DOI

http://dx.doi.org/10.1007/978-3-642-02611-9_43

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1028391692


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhou", 
        "givenName": "Xuebing", 
        "id": "sg:person.010665102115.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010665102115.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Royal Holloway University of London", 
          "id": "https://www.grid.ac/institutes/grid.4970.a", 
          "name": [
            "Norwegian Information Security Laboratory, Gj\u00f8vik University College, P.O. Box 191, N-2802, Gj\u00f8vik, Norway", 
            "Information Security Group, Department of Mathematics, Royal Holloway, University of London, Egham Hill, TW20 0EX, Egham, UK"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wolthusen", 
        "givenName": "Stephen D.", 
        "id": "sg:person.014146415751.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014146415751.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Norwegian University of Science and Technology", 
          "id": "https://www.grid.ac/institutes/grid.5947.f", 
          "name": [
            "Norwegian Information Security Laboratory, Gj\u00f8vik University College, P.O. Box 191, N-2802, Gj\u00f8vik, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Busch", 
        "givenName": "Christoph", 
        "id": "sg:person.011143356603.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kuijper", 
        "givenName": "Arjan", 
        "id": "sg:person.015632044271.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015632044271.26"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/j.patcog.2004.04.011", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003858561"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11623-009-0089-0", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007266807", 
          "https://doi.org/10.1007/s11623-009-0089-0"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s102070100006", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008722744", 
          "https://doi.org/10.1007/s102070100006"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s0031-3203(02)00030-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020841916"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/319709.319714", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024621046"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11527923_114", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028863910", 
          "https://doi.org/10.1007/11527923_114"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11527923_114", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028863910", 
          "https://doi.org/10.1007/11527923_114"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-25976-3_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035408784", 
          "https://doi.org/10.1007/978-3-540-25976-3_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-25976-3_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035408784", 
          "https://doi.org/10.1007/978-3-540-25976-3_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-24676-3_31", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040263189", 
          "https://doi.org/10.1007/978-3-540-24676-3_31"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-24676-3_31", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040263189", 
          "https://doi.org/10.1007/978-3-540-24676-3_31"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/0-387-23483-7_108", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052523866", 
          "https://doi.org/10.1007/0-387-23483-7_108"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpami.2007.1004", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061743143"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iih-msp.2009.237", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093812138"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/bcc.2007.4430534", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093860991"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/itw.1998.706492", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095200302"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "Biometric features provide considerable usability benefits. At the same time, the inability to revoke templates and likelihood of adversaries being able to capture features raise security concerns. Recently, several template protection mechanisms have been proposed, which provide a one-way mapping of templates onto multiple pseudo-identities. While these proposed schemes make assumptions common for cryptographic algorithms, the entropy of the template data to be protected is considerably lower per bit of key material used than assumed owing to correlations arising from the biometric features. We review several template protection schemes and existing attacks followed by a correlation analysis for a selected biometric feature set and demonstrate that these correlations leave the stream cipher mechanism employed vulnerable to, among others, known plaintext-type attacks.", 
    "editor": [
      {
        "familyName": "Kamel", 
        "givenName": "Mohamed", 
        "type": "Person"
      }, 
      {
        "familyName": "Campilho", 
        "givenName": "Aur\u00e9lio", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-02611-9_43", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-02610-2", 
        "978-3-642-02611-9"
      ], 
      "name": "Image Analysis and Recognition", 
      "type": "Book"
    }, 
    "name": "A Security Analysis of Biometric Template Protection Schemes", 
    "pagination": "429-438", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1028391692"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-02611-9_43"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "8740a73699f656bd244454631864c63ddb8017af70ee977e10f9bd469ac0b636"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-02611-9_43", 
      "https://app.dimensions.ai/details/publication/pub.1028391692"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T07:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000353_0000000353/records_45357_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-642-02611-9_43"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-02611-9_43'


 

This table displays all metadata directly associated to this object as RDF triples.

144 TRIPLES      23 PREDICATES      40 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-02611-9_43 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N7b2d3214086b45b49ca9bf66dc8e7961
4 schema:citation sg:pub.10.1007/0-387-23483-7_108
5 sg:pub.10.1007/11527923_114
6 sg:pub.10.1007/978-3-540-24676-3_31
7 sg:pub.10.1007/978-3-540-25976-3_15
8 sg:pub.10.1007/s102070100006
9 sg:pub.10.1007/s11623-009-0089-0
10 https://doi.org/10.1016/j.patcog.2004.04.011
11 https://doi.org/10.1016/s0031-3203(02)00030-4
12 https://doi.org/10.1109/bcc.2007.4430534
13 https://doi.org/10.1109/iih-msp.2009.237
14 https://doi.org/10.1109/itw.1998.706492
15 https://doi.org/10.1109/tpami.2007.1004
16 https://doi.org/10.1145/319709.319714
17 schema:datePublished 2009
18 schema:datePublishedReg 2009-01-01
19 schema:description Biometric features provide considerable usability benefits. At the same time, the inability to revoke templates and likelihood of adversaries being able to capture features raise security concerns. Recently, several template protection mechanisms have been proposed, which provide a one-way mapping of templates onto multiple pseudo-identities. While these proposed schemes make assumptions common for cryptographic algorithms, the entropy of the template data to be protected is considerably lower per bit of key material used than assumed owing to correlations arising from the biometric features. We review several template protection schemes and existing attacks followed by a correlation analysis for a selected biometric feature set and demonstrate that these correlations leave the stream cipher mechanism employed vulnerable to, among others, known plaintext-type attacks.
20 schema:editor Nd74c26e13e5e460aae71118c60137677
21 schema:genre chapter
22 schema:inLanguage en
23 schema:isAccessibleForFree false
24 schema:isPartOf Nc1ced61448e84e30853a005ad4de59c3
25 schema:name A Security Analysis of Biometric Template Protection Schemes
26 schema:pagination 429-438
27 schema:productId N2b57a2c880a549aabfea190f4070929b
28 N303b7906dca1448b91008fedaaa7601b
29 Nc0b5c829eb144ccd8ac7d929e961986f
30 schema:publisher N16e005c849904338958fd06b3772be26
31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028391692
32 https://doi.org/10.1007/978-3-642-02611-9_43
33 schema:sdDatePublished 2019-04-16T07:13
34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
35 schema:sdPublisher N2428dcdd404e4099b4a85615d70fa4e0
36 schema:url https://link.springer.com/10.1007%2F978-3-642-02611-9_43
37 sgo:license sg:explorer/license/
38 sgo:sdDataset chapters
39 rdf:type schema:Chapter
40 N0f0aec3e2dd54053afe7f4ca25a6bc66 schema:name Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany
41 rdf:type schema:Organization
42 N16e005c849904338958fd06b3772be26 schema:location Berlin, Heidelberg
43 schema:name Springer Berlin Heidelberg
44 rdf:type schema:Organisation
45 N1b7c5b54fc134ca188618c291d514c8b rdf:first sg:person.011143356603.69
46 rdf:rest Ne0b9b7adb386454a9b5069f00858887e
47 N2428dcdd404e4099b4a85615d70fa4e0 schema:name Springer Nature - SN SciGraph project
48 rdf:type schema:Organization
49 N2b57a2c880a549aabfea190f4070929b schema:name readcube_id
50 schema:value 8740a73699f656bd244454631864c63ddb8017af70ee977e10f9bd469ac0b636
51 rdf:type schema:PropertyValue
52 N303b7906dca1448b91008fedaaa7601b schema:name dimensions_id
53 schema:value pub.1028391692
54 rdf:type schema:PropertyValue
55 N69f7ce1e699c484087fcab0e5e9d7ccd schema:name Fraunhofer Institute for Computer Graphic Research IGD, Fraunhoferstr. 5, 64283, Darmstadt, Germany
56 rdf:type schema:Organization
57 N7b2d3214086b45b49ca9bf66dc8e7961 rdf:first sg:person.010665102115.35
58 rdf:rest Nbc64536b526649c6ba7a584f93fe5718
59 N9fd52706a68c4ab999a234aa8c52faff schema:familyName Kamel
60 schema:givenName Mohamed
61 rdf:type schema:Person
62 Nbc64536b526649c6ba7a584f93fe5718 rdf:first sg:person.014146415751.52
63 rdf:rest N1b7c5b54fc134ca188618c291d514c8b
64 Nc0b5c829eb144ccd8ac7d929e961986f schema:name doi
65 schema:value 10.1007/978-3-642-02611-9_43
66 rdf:type schema:PropertyValue
67 Nc1ced61448e84e30853a005ad4de59c3 schema:isbn 978-3-642-02610-2
68 978-3-642-02611-9
69 schema:name Image Analysis and Recognition
70 rdf:type schema:Book
71 Ncd3fd597f32d49b78ab942674f2fe564 schema:familyName Campilho
72 schema:givenName Aurélio
73 rdf:type schema:Person
74 Nd74c26e13e5e460aae71118c60137677 rdf:first N9fd52706a68c4ab999a234aa8c52faff
75 rdf:rest Nead0c934658d406b8f2633a58eeec0dc
76 Ne0b9b7adb386454a9b5069f00858887e rdf:first sg:person.015632044271.26
77 rdf:rest rdf:nil
78 Nead0c934658d406b8f2633a58eeec0dc rdf:first Ncd3fd597f32d49b78ab942674f2fe564
79 rdf:rest rdf:nil
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
84 schema:name Artificial Intelligence and Image Processing
85 rdf:type schema:DefinedTerm
86 sg:person.010665102115.35 schema:affiliation N0f0aec3e2dd54053afe7f4ca25a6bc66
87 schema:familyName Zhou
88 schema:givenName Xuebing
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010665102115.35
90 rdf:type schema:Person
91 sg:person.011143356603.69 schema:affiliation https://www.grid.ac/institutes/grid.5947.f
92 schema:familyName Busch
93 schema:givenName Christoph
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69
95 rdf:type schema:Person
96 sg:person.014146415751.52 schema:affiliation https://www.grid.ac/institutes/grid.4970.a
97 schema:familyName Wolthusen
98 schema:givenName Stephen D.
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014146415751.52
100 rdf:type schema:Person
101 sg:person.015632044271.26 schema:affiliation N69f7ce1e699c484087fcab0e5e9d7ccd
102 schema:familyName Kuijper
103 schema:givenName Arjan
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015632044271.26
105 rdf:type schema:Person
106 sg:pub.10.1007/0-387-23483-7_108 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052523866
107 https://doi.org/10.1007/0-387-23483-7_108
108 rdf:type schema:CreativeWork
109 sg:pub.10.1007/11527923_114 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028863910
110 https://doi.org/10.1007/11527923_114
111 rdf:type schema:CreativeWork
112 sg:pub.10.1007/978-3-540-24676-3_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040263189
113 https://doi.org/10.1007/978-3-540-24676-3_31
114 rdf:type schema:CreativeWork
115 sg:pub.10.1007/978-3-540-25976-3_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035408784
116 https://doi.org/10.1007/978-3-540-25976-3_15
117 rdf:type schema:CreativeWork
118 sg:pub.10.1007/s102070100006 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008722744
119 https://doi.org/10.1007/s102070100006
120 rdf:type schema:CreativeWork
121 sg:pub.10.1007/s11623-009-0089-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007266807
122 https://doi.org/10.1007/s11623-009-0089-0
123 rdf:type schema:CreativeWork
124 https://doi.org/10.1016/j.patcog.2004.04.011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003858561
125 rdf:type schema:CreativeWork
126 https://doi.org/10.1016/s0031-3203(02)00030-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020841916
127 rdf:type schema:CreativeWork
128 https://doi.org/10.1109/bcc.2007.4430534 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093860991
129 rdf:type schema:CreativeWork
130 https://doi.org/10.1109/iih-msp.2009.237 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093812138
131 rdf:type schema:CreativeWork
132 https://doi.org/10.1109/itw.1998.706492 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095200302
133 rdf:type schema:CreativeWork
134 https://doi.org/10.1109/tpami.2007.1004 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061743143
135 rdf:type schema:CreativeWork
136 https://doi.org/10.1145/319709.319714 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024621046
137 rdf:type schema:CreativeWork
138 https://www.grid.ac/institutes/grid.4970.a schema:alternateName Royal Holloway University of London
139 schema:name Information Security Group, Department of Mathematics, Royal Holloway, University of London, Egham Hill, TW20 0EX, Egham, UK
140 Norwegian Information Security Laboratory, Gjøvik University College, P.O. Box 191, N-2802, Gjøvik, Norway
141 rdf:type schema:Organization
142 https://www.grid.ac/institutes/grid.5947.f schema:alternateName Norwegian University of Science and Technology
143 schema:name Norwegian Information Security Laboratory, Gjøvik University College, P.O. Box 191, N-2802, Gjøvik, Norway
144 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...