[go: up one dir, main page]

Skip to main content

On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

  • Conference paper
Contemporary Computing (IC3 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 40))

Included in the following conference series:

Abstract

Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Schneier, B.: The uses and abuses of biometrics. Communication of the ACM 42(8), 136 (1999)

    Article  Google Scholar 

  2. Kong, A.W.K., Zhang, D., Kamel, M.: Analysis of brute-force break-ins of a palmprint authentication system. IEEE Transactions On Systems, Man and Cybernetics-Part B: Cybernetics 36(5), 1201–1205 (2006)

    Article  Google Scholar 

  3. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and patches. Pattern Recognition 35, 2727–2738 (2002)

    Article  Google Scholar 

  4. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.: Biometric cryptosystems: Issues and challenges. In: Proceedings of the IEEE, Special Issue on Enabling Security Technologies for Digital Rights Management, June 2004, vol. 92, pp. 948–960 (2004)

    Google Scholar 

  5. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on Computer and communications security (CCS 1999), pp. 28–36. ACM Press, New York (1999)

    Chapter  Google Scholar 

  6. Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively. Technical Report UCAMCL-TR 640, Computer Laboratory, University of Cambridge, United Kingdom (July 2005)

    Google Scholar 

  7. Petersen, K.: Notes on number theory and cryptography (2002), http://www.math.unc.edu/Faculty/petersen/Coding/cr2.pdf

  8. Menezes, A.J., Oorschot, P.V., Stone, S.V.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  9. Schneir, B.: Cryptography and Network Security, 2nd edn. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  10. Acharya, B., Patra, S.K., Panda, G., Panigrahy, S.K.: Novel methods of generating self-invertible matrix for hill cipher algorithm. International Journal of Security 1(1), 14–21 (2007)

    Google Scholar 

  11. Li, S., Zheng, X.: On the security of an image encryption method. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2002), vol. 2, pp. 925–928 (2002), http://www.hooklee.com/Papers/ICIP2002.pdf

  12. Saeednia, S.: How to make the hill cipher secure. Cryptologia 24(4), 353–360 (2000)

    Article  Google Scholar 

  13. Panigrahy, S.K., Acharya, B., Jena, D.: Image encryption using self-invertible key matrix of hill cipher algorithm. In: Proceedings of the 1st International Conference on Advances in Computing (ICAC 2008), Chikhli, India, pp. 1–5 (2008)

    Google Scholar 

  14. Ismail, I.A., Amin, M., Diab, H.: How to repair the hill cipher. Journal of Zhejiang Univ. Science A 7(12), 2022–2030 (2006)

    Article  Google Scholar 

  15. Rangel-Romero, Y., et al.: Comments on how to repair the hill cipher. Journal of Zhejiang University SCIENCE A, 1–4 (2007)

    Google Scholar 

  16. Palmprints. Hongkong PolyU Palmprint Database, http://www.comp.polyu.edu.hk/~biometric

  17. Faces, Cambridge AT&T Lab Face Database, http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Panigrahy, S.K., Jena, D., Korra, S.B., Jena, S.K. (2009). On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature. In: Ranka, S., et al. Contemporary Computing. IC3 2009. Communications in Computer and Information Science, vol 40. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03547-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03547-0_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03546-3

  • Online ISBN: 978-3-642-03547-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics