A Review of Cancelable Biometric Authentication Methods

  title={A Review of Cancelable Biometric Authentication Methods},
  author={R. Mamatha},
  journal={Journal of biometrics \& biostatistics},
  • R. Mamatha
  • Published 2018
  • Computer Science
  • Journal of biometrics & biostatistics
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large scale capture and storage of biometric data, which raises serious issues in terms of data privacy and identity theft. Unlike credit cards and passwords, which can be revoked and reissued when compromised, biometrics are permanently associated with a user and cannot be replaced. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable… 

Figures and Tables from this paper

Identity Authentication Chain based on Encrypted Database in Heterogeneous Alliance Network
A chain structure of identity authentication based on encrypted database in heterogeneous alliance network was constructed to implement the cross domain access and the analysis of security can illustrate that the chain was feasible and protected.


Generating Cancelable Fingerprint Templates
This paper demonstrates several methods to generate multiple cancelable identifiers from fingerprint images to overcome privacy concerns and concludes that feature-level cancelable biometric construction is practicable in large biometric deployments.
Sectored Random Projections for Cancelable Iris Biometrics
An efficient algorithm is proposed for generating a Cancelable Iris Biometric based on Sectored Random Projections that can generate a new pattern if the existing one is stolen, retain the original recognition performance and prevent extraction of useful information from the transformed patterns.
Enhancing security and privacy in biometrics-based authentication systems
The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics
  • N. Lalithamani, K. P. Soman
  • Computer Science, Mathematics
    2009 International Conference on Advances in Recent Technologies in Communication and Computing
  • 2009
C cancelable biometrics has been proposed as an effective solution for canceling and re-issuing biometric templates and it is highly infeasible to acquire the cancelable fingerprint templates or the original fingerprint from the generated key.
Biometric cryptosystems: issues and challenges
This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.
Biometric perils and patches
Situation Awareness through Multimodal Biometric Template Security in Real-Time Environments
A novel architecture for template generation in the context of situation awareness system in real and virtual application is presented and a novel cancelable biometric template generation algorithm utilizing random biometric fusion, random projection and selection is developed.
Dynamic sectored random projection for cancelable iris template
  • P. Punithavathi, S. Geetha
  • Computer Science
    2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
  • 2016
A dynamic sectored random projection for cancelable iris template has been proposed and the transformed templates generated have proved to be promising and satisfying the characteristics of cancelable biometrics.
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
  • A. Teoh, A. Goh, D. Ngo
  • Computer Science
    IEEE Transactions on Pattern Analysis and Machine Intelligence
  • 2006
The previously presented biometric-hash framework prescribes the integration of external randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics comparable to cryptographic ciphers or hashes, which are explained in this paper as arising from the random multispace quantization of biometric and external random inputs.