We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Survey on Security Schemes for Biometric Privacy

by Biruntha. S, Dhanalakshmi. S, Karthik. S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 1
Year of Publication: 2012
Authors: Biruntha. S, Dhanalakshmi. S, Karthik. S
10.5120/9654-3986

Biruntha. S, Dhanalakshmi. S, Karthik. S . Survey on Security Schemes for Biometric Privacy. International Journal of Computer Applications. 60, 1 ( December 2012), 4-7. DOI=10.5120/9654-3986

@article{ 10.5120/9654-3986,
author = { Biruntha. S, Dhanalakshmi. S, Karthik. S },
title = { Survey on Security Schemes for Biometric Privacy },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 1 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 4-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number1/9654-3986/ },
doi = { 10.5120/9654-3986 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:05:28.273335+05:30
%A Biruntha. S
%A Dhanalakshmi. S
%A Karthik. S
%T Survey on Security Schemes for Biometric Privacy
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 1
%P 4-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Biometric is the science of establishing the identity of on individual based on physical or behavioral traits such as face, fingerprint, Iris. The increasing popularity of biometrics offers personal identification systems greater security and convenient than password authentication system. A biometric system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the template stored in a database in order to identify person. At the same time there is a possible to intruder can access the database which stored the biometric data. So the security and privacy of biometric system is a major concern due to their issues like fake biometric, override matcher and etc. We present an overview of various biometric template protection schemes and discuss their advantages and limitations.

References
  1. Agrawal . N and Savvides. M, "Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching," in Proc. Computer Vision and Pattern Recognition Workshop, 2009, vol. 0, pp. 85–92. .
  2. Ateniese. G, Blundo. C, Santis. A, and Stinson. D, "Extended capabilities for visual cryptography," Theor. Comput. Sci. , vol. 250, no. 1–2, pp. 143–161, 2001.
  3. Bitouk. D, Kumar. N, Dhillon. S, Belhumeur. B, and Nayar. S. K, "Face swapping: Automatically replacing faces in photographs," ACMTrans. Graph. , vol. 27, no. 3, pp. 1–8, 2008.
  4. Chen. Y, Chan. Y, Huang. C, Tsai. M, and Chu. Y, "A multiple-level visual secret-sharing scheme without image size expansion," Inf. Sci. ,vol. 177, no. 21, pp. 4696–4710, 2007.
  5. Cootes. T et al. , "Active appearance models," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 23, no. 6, pp. 681–685, Jun. 2001.
  6. Davida G. I, Frankel. Y, and Matt. B. J, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security and Privacy, 1998, pp. 148–157.
  7. Dong. J and Tan. T, "Effects of watermarking on iris recognition performance," in Proc. 10th Int. Conf. Control, Automation, Robotics and Vision, 2008 (ICARCV 2008), 2008, pp. 1156–1161.
  8. Feng. Y, Yuen. P, and Jain. A, "A hybrid approach for face template protection," in Proc. SPIE Conf. Biometric Technology for Human Identification, Orlando, FL, 2008, vol. 6944.
  9. Gross. R, Sweeney. L, De la Torre. F, and Baker. S, "Model-based face de-identification," in IEEE Workshop on Privacy Research in Vision, Los Alamitos, CA, 2006.
  10. Jain. A and Uludag. U, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 25, no. 11, pp. 1494–1498, Nov. 2003.
  11. Jain. A, Nandakumar. K, and Nagar. A, "Biometric template security," EURASIP J. Advances Signal Process. , pp. 1–17, 2008.
  12. Maltoni. D, Maio. D, Jain . A, and Prabhakar . S, Handbook of Fingerprint Recognition. Secaucus, NJ: Springer-Verlag New York, Inc. , 2003.
  13. Moskovich. B and Osadchy. M, "Illumination invariant representation for privacy preserving face identification," in Proc. IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics, San Francisco, CA, Jun. 2010, pp. 154–161.
  14. Naor . M and Shamir . A, "Visual cryptography," in Proc. EUROCRYPT, 1994, pp. 1–12.
  15. Nakajima. M and Yamaguchi. Y, "Extended visual cryptography fornatural images," J. WSCG, vol. 10, no. 2, pp. 303–310, 2002.
  16. Prabhakar. S, Pankanti. S, and Jain. A, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy, vol. 1, no. 2, pp. 33–42,Mar. /Apr. 2003.
  17. Pravin M Sonare,Shubhangi Sapkal, "Stegano-CryptoSystem for Enhancing Biometric-feature security with RSA", Int. Conf. Information and Network Technology IPCSIT Vol. 4 2011.
  18. Revenkar. P, Anjum. A, and Gandhare. W, "Secure iris authentication using visual cryptography," Int. J. Comput. Sci. (IJCSIS), vol. 7, no. 3, pp. 217–221, Mar. 2010.
  19. Soutar. C, Roberge. D, Stoianov. A, Gilroy. R, and Kumar . B, "Biometric encryption," in ICSA Guide to Cryptography. New York: Mc-Graw-Hill, 1999.
  20. Thuraisingham. B and Ford. W, "Security constraint processing in a multilevel secure distributed database management system," IEEE Trans. Knowl. Data Eng. , vol. 7, no. 2, pp. 274–293, Apr. 1995.
  21. A. Ross and A. A. Othman, "Visual cryptography for Biometric privacy,"in IEEE transaction on information Forensics and security,vol. 6,No. 1,March 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics watermarking steganography cryptography Visual cryptography