2016
DOI: 10.1049/iet-bmt.2015.0111
|View full text |Cite
|
Sign up to set email alerts
|

Biometric template protection based on Bloom filters and honey templates

Abstract: Biometric verification can be considered one of the most reliable approaches to person authentication. However, biometrics are highly sensitive personal data and any information leakage poses severe security and privacy risks. Biometric templates should hence be protected and impersonation with stolen templates must be prevented, while preserving system's performance. In this study, a general biometric template protection scheme based on honey templates and Bloom filters is proposed, in order to grant privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…This technique permutes the rows of a feature block according to a keyed random permutation to diffuse the statistical properties of a biometric feature vector and at the same time to preserve the biometric performance. Later, [34] uses the same technique with a minor addition, that is, after a row‐wise permutation there is a circular shift within each column. However, this circular shifting does not contribute to the dissipation of the biometric information but rather might lead to some accuracy loss since different columns after shifting might result in the same column.…”
Section: Theoretical Comparisonmentioning
confidence: 99%
“…This technique permutes the rows of a feature block according to a keyed random permutation to diffuse the statistical properties of a biometric feature vector and at the same time to preserve the biometric performance. Later, [34] uses the same technique with a minor addition, that is, after a row‐wise permutation there is a circular shift within each column. However, this circular shifting does not contribute to the dissipation of the biometric information but rather might lead to some accuracy loss since different columns after shifting might result in the same column.…”
Section: Theoretical Comparisonmentioning
confidence: 99%
“…This technique permutes the rows of a feature block according to a keyed random permutation to diffuse the statistical properties of a biometric feature vector and at the same time to preserve the biometric performance. Later, [31] uses the same technique with a minor addition, that is, after a row-wise permutation there is a circular shift within each column. However, this circular shifting does not contribute to the dissipation of the biometric information but rather might lead to some accuracy loss since different columns after shifting might result in the same column.…”
Section: Bloom Filter Based Btp Schemesmentioning
confidence: 99%
“…[25]- [27] [30], [31] [38], [39], [45] [36], [37], [40], [44] [33], [35] Irreversibility Unlinkability…”
mentioning
confidence: 99%
“…Yang and Martiri [37] proposed honey template-based template protection scheme to detect the biometric template database leakage. In the protection scheme, machine learning based classification algorithms is utilized to produce the sugar and honey templates applied in face [38].…”
Section: A Vulnerabilities Attacks Of Biometric Template In the Datamentioning
confidence: 99%