Cryptographic Key Generation From Biometric Data
Cryptographic Key Generation From Biometric Data 3,7/5 286 reviews

In this paper we present an approach for biometric key generation using wavelets and electrocardiogram (ECG) signals. The stages that comprise the approach are one time enrollment and key derivation. This work is based on the uniqueness and quasi-stationary behavior of ECG signals with respect to an individual. This lets to consider the ECG signal as a biometric characteristic and guarantees.

Private biometrics is a form of encrypted biometrics, also called privacy-preserving biometric authentication methods, in which the biometric payload is a one-way, homomorphically encrypted feature vector that is 0.05% the size of the original biometric template and can be searched with full accuracy, speed and privacy. The feature vector's homomorphic encryption allows search and match to be conducted in polynomial time on an encrypted dataset and the search result is returned as an encrypted match. One or more computing devices may use an encrypted feature vector to verify an individual person (1:1 verify) or identify an individual in a datastore (1:many identify) without storing, sending or receiving plaintext biometric data within or between computing devices or any other entity. The purpose of private biometrics is to allow a person to be identified or authenticated while guaranteeing individual privacy and fundamental human rights by only operating on biometric data in the encrypted space.

Background[edit]

Transfer Unit Cryptographic Key

Biometric security strengthens user authentication but, until recently, also implied important risks to personal privacy. Indeed, while compromised passwords can be easily replaced and are not personally identifiable information(PII), biometric data is considered highly sensitive due to its personal nature, unique association with users, and the fact that compromised biometrics (biometric templates) cannot be revoked or replaced. Private biometrics have been developed to address this challenge. Private Biometrics provide the necessary biometric authentication while simultaneously minimizing user's privacy exposure through the use of one-way, fully homomorphic encryption.

The Biometric Open Protocol Standard, IEEE 2410-2018, was updated in 2018 to include private biometrics and stated that the one-way fully homomorphic encrypted feature vectors, “..bring a new level of consumer privacy assurance by keeping biometric data encrypted both at rest and in transit.” The Biometric Open Protocol Standard (BOPS III) also noted a key benefit of private biometrics was the new standard allowed for simplification of the API since the biometric payload was always one-way encrypted and therefore had no need for key management.[1]

Fully homomorphic cryptosystems for biometrics[edit]

Historically, biometric matching techniques have been unable to operate in the encrypted space and have required the biometric to be visible (unencrypted) at specific points during search and match operations. This decrypt requirement made large-scale search across encrypted biometrics (“1:many identify”) infeasible due to both significant overhead issues (e.g. complex key management and significant data storage and processing requirements) and the substantial risk that the biometrics were vulnerable to loss when processed in plaintext within the application or operating system (see FIDO Alliance, for example).

Biometric security vendors complying with data privacy laws and regulations (including Apple FaceID, Samsung, Google) therefore focused their efforts on the simpler 1:1 verify problem and were unable to overcome the large computational demands required for linear scan to solve the 1:many identify problem.[2]

Today, private biometric cryptosystems overcome these limitations and risks through the use of one-way, fully homomorphic encryption. This form of encryption allows computations to be carried out on ciphertext, allows the match to be conducted on an encrypted dataset without decrypting the reference biometric, and returns an encrypted match result. Matching in the encrypted space offers the highest levels of accuracy, speed and privacy and eliminates the risks associated with decrypting biometrics.

RSA1 is not supportedYou can use an existing SSH key with Bitbucket Server if you want, in which case you can go straight to either. when another system or process needs access to repositories in Bitbucket Server (for example your build server)The SSH key needs to be added to Bitbucket Server, and your Bitbucket Server administrator must have to Git repositories, before you can make use of the key.Bitbucket Server supports DSA, RSA2, and Ed25519 key types. Git generate ssh key bitbucket account.

Accuracy: same as plaintext (99%)[edit]

The private biometric feature vector is much smaller (0.05% the size of the original biometric template) but yet maintains the same accuracy as the original plaintext reference biometric. In testing using Google's unified embedding for face recognition and clustering CNN (“Facenet”),[3] Labeled Faces in the Wild (LFW) (source), and other open source faces, private biometric feature vectors returned the same accuracy as plaintext facial recognition. Using an 8MB facial biometric, one vendor reported an accuracy rate of 98.7%. The same vendor reported accuracy increased to 99.99% when using three 8MB facial biometrics and a vote algorithm (best two out of 3) to predict.[4]

As the quality of the facial biometric image declined, accuracy degraded very slowly. For 256kB facial images (3% the quality of an 8MB picture), the same vendor reported 96.3% accuracy and that the neural network was able to maintain similar accuracy through boundary conditions including extreme cases of light or background.[5]

Speed: polynomial search (same as plaintext)[edit]

The private biometric feature vector is 4kB and contains 128 floating point numbers. In contrast, plaintext biometric security instances (including Apple Face ID[6]) currently use 7MB to 8MB reference facial biometrics (templates). By using the much smaller feature vector, the resulting search performance is less than one second per prediction using a datastore of 100 million open source faces (“polynomial search”).[7] The private biometric test model used for these results was Google's unified embedding for face recognition and clustering CNN (“Facenet”),[3] Labeled Faces in the Wild (LFW) (source), and other open source faces.

Privacy: full compliance with privacy regulations worldwide[edit]

As with all ideal one-way cryptographic hash functions, decrypt keys do not exist for private biometrics so it is infeasible to generate the original biometric message from the private biometric feature vector (its hash value) except by trying all possible messages. Unlike passwords, however, no two instances of a biometric are exactly the same or, stated in another way, there is no constant biometric value, so a brute force attack using all possible faces would only produce an approximate (fuzzy) match. Privacy and fundamental human rights are therefore guaranteed.

Specifically, the private biometric feature vector is produced by a one-way cryptographic hash algorithm that maps plaintext biometric data of arbitrary size to a small feature vector of a fixed size (4kB) that is mathematically impossible to invert. The one-way encryption algorithm is typically achieved using a pre-trained convolutional neural network (CNN), which takes a vector of arbitrary real-valued scores and squashes it to a 4kB vector of values between zero and one that sum to one.[8] It is mathematically impossible to reconstruct the original plaintext image from a private biometric feature vector of 128 floating point numbers.[9]

One-way encryption, history and modern use[edit]

One-way encryptions offer unlimited privacy by containing no mechanism to reverse the encryption and disclose the original data. Once a value is processed through a one-way hash, it is not possible to discover to the original value (hence the name “one-way”).[10]

History[edit]

The first one-way encryptions were likely developed by James H. Ellis, Clifford Cocks, and Malcolm Williamson at the UK intelligence agency GCHQ during the 1960s and 1970s and were published independently by Diffie and Hellman in 1976 (History of cryptography). Common modern one-way encryption algorithms, including MD5 (message digest) and SHA-512 (secure hash algorithm) are similar to the first such algorithms in that they also contain no mechanism to disclose the original data. The output of these modern one-way encryptions offer high privacy but are not homomorphic, meaning that the results of the one-way encryptions do not allow high order math operations (such as match). For example, we cannot use two SHA-512 sums to compare the closeness of two encrypted documents. This limitation makes it impossible for these one-way encryptions to be used to support classifying models in machine learning—or nearly anything else.

Modern use[edit]

The first one-way, homomorphically encrypted, Euclidean-measurable feature vector for biometric processing was proposed in a paper by Streit, Streit and Suffian in 2017.[11] In this paper, the authors theorized and also demonstrated using a small sample size (n=256 faces) that (1) it was possible to use neural networks to build a cryptosystem for biometrics that produced one-way, fully homomorphic feature vectors composed of normalized floating-point values; (2) the same neural network would also be useful for 1:1 verification (matching); and (3) the same neural network would not be useful in 1:many identification tasks since search would occur in linear time (i.e. non polynomial). The paper's first point was (in theory) later shown to be true, and the papers first, second and third points were later shown to be true only for small samples but not for larger samples.

A later tutorial (blog posting) by Mandel in 2018 demonstrated a similar approach to Streit, Streit and Suffian and confirmed using a Frobenius 2 distance function to determine the closeness of two feature vectors. In this posting, Mandel used a Frobenius 2 distance function to determine the closeness of two feature vectors and also demonstrated successful 1:1 verification. Mandel did not offer a scheme for 1:many identification as this method would have required a non polynomial full linear scan of the entire database. The Streit, Streit and Suffian paper attempted a novel “banding” approach for 1:many identification in order to mitigate the full linear scan requirement, but it is now understood that this approach produced too much overlap to help in identification.[12]

First production implementation[edit]

The first claimed commercial implementation of private biometrics, Private.id, was published by Private Identity, LLC in May 2018 by using the same method to provide 1:many identification in polynomial time across a large biometrics database (100 million faces).

On the client device, Private.id transforms each reference biometric (template) into a one-way, fully homomorphic, Euclidean-measurable feature vector using matrix multiplication from the neural network that may then be stored locally or transmitted. The original biometric is deleted immediately after the feature vector is computed or, if the solution is embedded in firmware, the biometric is transient and never stored. Once the biometric is deleted, it is no longer possible to lose or compromise the biometric.[4]

The Private.id feature vector can be used in one of two ways. If the feature vector is stored locally, it may be used to compute 1:1 verification with high accuracy (99% or greater) using linear mathematics. If the feature vector is also stored in a Cloud, the feature vector may also be used as input for a neural network to perform 1:many identification with the same accuracy, speed and privacy as the original plaintext reference biometric (template).[4]

Compliance[edit]

Private biometrics use the following two properties in deriving compliance with biometric data privacy laws and regulations worldwide. First, the private biometrics encryption is a one-way encryption, so loss of privacy by decryption is mathematically impossible and privacy is therefore guaranteed. Second, since no two instances of a biometric are exactly the same or, stated in another way, there is no constant biometric value, the private biometrics one-way encrypted feature vector is Euclidean Measureable in order to provide a mechanism to determine a fuzzy match in which two instances of the same identity are “closer” than two instances of a different identity.

IEEE Biometric Open Protocol Standard (BOPS III)[edit]

The IEEE 2410-2018 Biometric Open Protocol Standard was updated in 2018 to include private biometrics. The specification stated that one-way fully homomorphic encrypted feature vectors, “bring a new level of consumer privacy assurance by keeping biometric data encrypted both at rest and in transit.” IEEE 2410-2018 also noted a key benefit of private biometrics is that the new standard allows for simplification of the API since the biometric payload is always one-way encrypted and there is no need for key management.[1]

Discussion: passive encryption and data security compliance[edit]

Private biometrics enables passive encryption (encryption at rest), the most difficult requirement of the US Department of Defense Trusted Computer System Evaluation Criteria (TCSEC). No other cryptosystem or method provides operations on rested encrypted data, so passive encryption—an unfulfilled requirement of the TCSEC since 1983, is no longer an issue.

Private biometrics technology is an enabling technology for applications and operating systems—but itself does not directly address—the auditing and constant protection concepts introduced in the TCSEC.

US DoD Standard Trusted Computer System Evaluation Criteria (TCSEC)[edit]

Private biometrics, as implemented in a system that conforms to IEEE 2410-2018 BOPS III,[1] satisfies the privacy requirements of the US Department of Defense Standard Trusted Computer System Evaluation Criteria (TCSEC). The TCSEC sets the basic requirements for assessing the effectiveness of computer security controls built into a computer system (“Orange Book, section B1”). Today, the applications and operating systems contain features that comply with TCSEC levels C2 and B1 except they lack homomorphic encryption and so do not process data encrypted at rest. We typically, if not always, obtained waivers, because there was not a known work around. Adding private biometrics to these operating systems and applications resolves this issue.

For example, consider the case of a typical MySQL database. To query MySQL in a reasonable period of time, we need data that maps to indexes that maps to queries that maps to end user data. To do this, we work with plaintext. The only way to encrypt this is to encrypt the entire data store, and to decrypt the entire data store, prior to use. Since data use is constant, the data is never encrypted. Thus, in the past we would apply for waivers because there was no known work around. Now using private biometrics, we can match and do operations on data that is always encrypted.

Multiple Independent Levels of Security/Safety (MILS) architecture[edit]

Private biometrics, as implemented in a system that conforms to IEEE 2410-2018 BOPS III, comply with the standards of the Multiple Independent Levels of Security/Safety (MILS) architecture. MILS builds on the Bell and La Padula theories on secure systems that represent the foundational theories of the US DoD Standard Trusted Computer System Evaluation Criteria (TCSEC), or the DoD “Orange Book.” (See paragraphs above.)

Private biometrics’ high-assurance security architecture is based on the concepts of separation and controlled information flow and implemented using only mechanisms that support trustworthy components, thus the security solution is non-bypassable, evaluable, always invoked and tamper proof. This is achieved using the one-way encrypted feature vector, which elegantly allows only encrypted data (and never stores or processes plaintext) between security domains and through trustworthy security monitors.

Specifically, private biometrics systems are:

  • Non-bypassable, as plaintext biometrics cannot use another communication path, including lower level mechanisms, to bypass the security monitor since the original biometric is transient at inception (e.g. the biometric template acquired by the client device exists only for a few seconds at inception and then is deleted or never stored).
  • Evaluable in that the feature vectors are modular, well designed, well specified, well implemented, small and of low complexity.
  • Always-invoked, in that each and every message is always one-way encrypted independent of security monitors.
  • Tamperproof in that the feature vector's one-way encryption prevents unauthorized changes and does not use systems that control rights to the security monitor code, configuration and data.

History[edit]

Implicit authentication and private equality testing[edit]

Unsecure biometric data are sensitive due to their nature and how they can be used. Implicit authentication is a common practice when using passwords, as a user may prove knowledge of a password without actually revealing it. However, two biometric measurements of the same person may differ, and this fuzziness of biometric measurements renders implicit authentication protocols useless in the biometrics domain.

Similarly, private equality testing, where two devices or entities want to check whether the values that they hold are the same without presenting them to each other or to any other device or entity, is well practiced and detailed solutions have been published. However, since two biometrics of the same person may not be equal, these protocols are also ineffective in the biometrics domain. For instance, if the two values differ in τ bits, then one of the parties may need to present 2τ candidate values for checking.[13]

Cryptographic key generation from biometric data card

Homomorphic encryption[edit]

Prior to the introduction of private biometrics, biometric techniques required the use of plaintext search for matching so each biometric was required to be visible (unencrypted) at some point in the search process. It was recognized that it would be beneficial to instead conduct matching on an encrypted dataset.

Encrypt match is typically accomplished using one-way encryption algorithms, meaning that given the encrypted data, there is no mechanism to get to the original data. Common one-way encryption algorithms are MD5 and SHA-512. However, these algorithms are not homomorphic, meaning that there is no way to compare the closeness of two samples of encrypted data, and thus no means to compare. The inability to compare renders any form of classifying model in machine learning untenable.

Homomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext, thus generating an encrypted match result. Matching in the encrypted space using a one-way encryption offers the highest level of privacy. With a payload of feature vectors one-way encrypted, there is no need to decrypt and no need for key management.

A promising method of homomorphic encryption on biometric data is the use of machine learning models to generate feature vectors. For black-box models, such as neural networks, these vectors can not by themselves be used to recreate the initial input data and are therefore a form of one-way encryption. However, the vectors are euclidean measurable, so similarity between vectors can be calculated. This process allows for biometric data to be homomorphically encrypted.

For instance if we consider facial recognition performed with the Euclidean Distance, when we match two face images using a neural network, first each face is converted to a float vector, which in the case of Google's FaceNet, is of size 128. The representation of this float vector is arbitrary and cannot be reverse-engineered back to the original face. Indeed, the matrix multiplication from the neural network then becomes the vector of the face, is Euclidean measurable but unrecognizable, and cannot map back to any image.

Prior approaches used to solve private biometrics[edit]

Prior to the availability of private biometrics, research focused on ensuring the prover's biometric would be protected against misuse by a dishonest verifier through the use of partially homomorphic data or decrypted(plaintext) data coupled with a private verification function intended to shield private data from the verifier. This method introduced a computational and communication overhead which was computationally inexpensive for 1:1 verification but proved infeasible for large 1:many identification requirements.

From 1998 to 2018 cryptographic researchers pursued four independent approaches to solve the problem: cancelable biometrics, BioHashing, Biometric Cryptosystems, and two-way partially homomorphic encryption.[14]

Feature transformation approach[edit]

The feature transformation approach “transformed” biometric feature data to random data through the use of a client-specific key or password. Examples of this approach included biohashing and cancelable biometrics.The approach offered reasonable performance but was found to be insecure if the client-specific key was compromised.

Cancelable BiometricsThe first use of indirect biometric templates (later called cancelable biometrics) was proposed in 1998 by Davida, Frankel and Matt.[15] Three years later, Ruud Bolle, Nilini Ratha and Jonathan Connell, working in IBM's Exploratory Computer Vision Group, proposed the first concrete idea of cancelable biometrics.[16][17]

Cancelable biometrics were defined in these communications as biometric templates that were unique for every application and that, if lost, could be easily cancelled and replaced. The solution was (at the time) thought to provide higher privacy levels by allowing multiple templates to be associated with the same biometric data by storing only the transformed (hashed) version of the biometric template. The solution was also promoted for its ability to prevent linkage of the user's biometric data across various databases since only a transformed version of the biometric template (and not the unencrypted (plaintext) biometric template) was stored for later use. [18][19][20]

Cryptographic Key Generation From Biometric Data Center

Cancelable biometrics were deemed useful because of their diversity, reusability and one-way encryption (which, at the time, was referred to as a one-way transformation). Specifically, no cancellable template could be used in two different applications (diversity); it was straightforward to revoke and reissuance a cancellable template in the event of compromise (reusability); and the one-way hash of the template prevented recovery of sensitive biometric data. Finally, it was postulated that the transformation would not deteriorate accuracy.[21]

  • BioHashing

Research into cancelable biometrics moved into BioHashing by 2004. The BioHashing feature transformation technique was first published by Jin, Ling and Goh and combined biometric features and a tokenized (pseudo-) random number (TRN). Specifically, BioHash combined the biometric template with a user-specific TRN to produce a set of non-invertible binary bit strings that were thought to be irreproducible if both the biometric and the TRN were not presented simultaneously.[22]

Indeed, it was first claimed that the BioHashing technique had achieved perfect accuracy (equal error rates) for faces, fingerprints and palm prints, and the method gained further traction when its extremely low error rates were combined with the claim that its biometric data was secure against loss because factoring the inner products of biometrics feature and TRN was an intractable problem.[22][18]

By 2005, however, researchers Cheung and Kong (Hong Kong Polytechnic and University of Waterloo) asserted in two journal articles that BioHashing performance was actually based on the sole use of TRN and conjectured that the introduction of any form of biometric become meaningless since the system could be used only with the tokens.[23][24] These researchers also reported that the non-invertibility of the random hash would deteriorate the biometric recognition accuracy when the genuine token was stolen and used by an impostor (“the stolen-token scenario”).[23][25]

Biometric cryptosystem approach[edit]

Biometric cryptosystems were originally developed to either secure cryptographic keys using biometric features (“key-biometrics binding”) or to directly generate cryptographic keys from biometric features.[26] Biometric cryptosystems used cryptography to provide the system with cryptographic keys protection and biometrics to provide the system with dynamically generate keys to secure the template and biometric system.[27]

With Lightroom, you can even arrange and alter your photographs anyplace and at whatever point you need that it is offered with Twitter and Flickr. Searching for shots from your most loved excursions to the water? Lightroom 5 product key generator. Sensei auto-labeling makes finding your photographs a snap so you can make collections dependent on any subject you need.Straightforward capacity.Beginning at 1 TB with alternatives for additional, the distributed storage in Lightroom CC guarantees that you can get to your whole library of full-goals photographs whenever you need, anyplace you are, from any gadget.Simple sharing.Offer your photographs with friends and family, customers, or a much greater group of onlookers. Post your photos specifically to social locales. Features Of Adobe Photoshop Lightroom CC 2020 9More brilliant association.Adobe Sensei utilizes the intensity of the machine figuring out how to apply accessible watchwords naturally.

The acceptance and deployment of biometric cryptosystem solutions was constrained, however, by the fuzziness related with biometric data. Hence, error correction codes (ECCs), including includes fuzzy vault and fuzzy commitment, were adopted to alleviate the fuzziness of the biometric data. This overall approach proved impractical, however, due to the need for accurate authentication and suffered from security issues due to its need for strong restriction to support authentication accuracy.[28]

Future research on biometric cryptosystems is likely to focus on a number of remaining implementation challenges and security issues involving both the fuzzy representations of biometric identifiers and the imperfect nature of biometric feature extraction and matching algorithms. And, unfortunately, since biometric cryptosystems can, at the current time, be defeated using relatively simple strategies leveraging both weaknesses of the current systems (the fuzzy representations of biometric identifiers and the imperfect nature of biometric feature extraction and matching algorithms), it is unlikely that these systems will be able to deliver acceptable end-to-end system performance until suitable advances are achieved.[27]

Two-way partially homomorphic encryption approach[edit]

Cryptographic Key Generation From Biometric Data

The two-way partially homomorphic encryption method for private biometrics was similar to the today's private biometrics in that it offered protection of biometric feature data through the use of homomorphic encryption and measured the similarity of encrypted feature data by metrics such as the Hamming and the Euclidean distances. However, the method was vulnerable to data loss due to the existence of secret keys that were to be managed by trusted parties. Widespread adoption of the approach also suffered from the encryption schemes’ complex key management and large computational and data storage requirements.[14]

See also[edit]

External links[edit]

Cryptographic Key Generation From Biometric Data Card

  • BOP - Biometrics Open Protocol
  • Fidoalliance.org
  • LFWcrop Face Dataset
  • Cancelable biometrics
  • EER - equal error rate
  • Technovelgy.com, Biometric Match


References[edit]

Cryptographic Key Generation From Biometric Data System

  1. ^ abcBiometrics Open Protocol (BOPS) III. IEEE 2410-2018, IEEE Standards Association. 2018. Accessed 7/22/2018.
  2. ^Selleck, Evan. “Craig Federighi Says Apple is ‘Focusing Face ID on Single User Authentication.’” Phone Hacks. 12-01-2017. Accessed 7-15-2018.
  3. ^ abFlorian Schroff, Dmitry Kalenichenko, James Philbin. “FaceNet: A unified embedding for face recognition and clustering.” CVPR 2015: 815-823
  4. ^ abcPrivate.id
  5. ^Unpublished 2018 white paper, Private Identity, LLC.
  6. ^Evans, Johnny. “iPhone X & Face ID: Everything you need to know.” ComputerWorld. 9/13/2017. Accessed 7/22/2018
  7. ^Ben Shneiderman. 1973. Polynomial search. Softw. Pract. Exper. 3, 1 (January 1973), 5-8.
  8. ^Karn, Ujjwal. “An Intuitive Explanation of Convolutional Neural Networks.” The Data Science Blog. 8/11/2016, Accessed 7/22/2018.
  9. ^Lian, Shiguo, Jinsheng Sun, and Zhiquan Wang. 'One-way hash function based on neural network.'
  10. ^'One-Way Encryption'.
  11. ^Streit, S. Streit, B and Suffian S. “Privacy-Enabled Biometric Search.” CoRR. 1708.04726 (2017).
  12. ^Mandal, Arun. “MTCNN Face Detection and Matching using Facenet Tensorflow.” Python 3.6. Posted: 2018-02-16. Accessed 2018-07-15
  13. ^Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption Constantinos Patsakis, Jeroen van Rest, Michal Choras and M´elanie Bouroche
  14. ^ abYasuda M., Shimoyama T., Kogure J., Yokoyama K., Koshiba T. (2013) Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics. In: Cuzzocrea A., Kittl C., Simos D.E., Weippl E., Xu L. (eds) Security Engineering and Intelligence Informatics. CD-ARES 2013. Lecture Notes in Computer Science, vol 8128. Springer, Berlin, Heidelberg.
  15. ^G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometrics identification, in: Proceeding Symposium on Privacy and Security, 1998, pp. 148–157
  16. ^N. Ratha, J. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J. 40 (3) (2001) 614–634
  17. ^R.M. Bolle, J.H. Connell, N.K. Ratha, Biometrics perils and patches, Pattern Recognition 35 (2002) 2727–2738.
  18. ^ abABJ Teoh, YW Kuan, S Lee. “Cancellable biometrics and annotations on biohash.” Pattern recognition. 41 (6), pp.2034-2044. (2008)
  19. ^N. Ratha, J. Connell, R.M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J. 40 (3) (2001) 614–634.
  20. ^R.M. Bolle, J.H. Connel, N.K. Ratha, Biometrics perils and patches, Pattern Recognition 35 (2002) 2727–2738.
  21. ^B.J. Andrew Teoh, A. Goh, C.L. David Ngo, Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell. 28 (12) (2006) 1892–1901.
  22. ^ abATB Jin, DNC Ling, A Goh. “Biohashing: two factor authentication featuring fingerprint data and tokenised random number.” Pattern recognition 37 (11), 2245-2255. (2004)
  23. ^ abK.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, H.W. Lam, An analysis on accuracy of cancellable biometrics based on BioHashing. KES 2005, Lecture Notes on Artificial Intelligence, vol. 3683, pp. 1168–1172.
  24. ^K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of FaceHashing, ICB 2006, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin. pp. 106–112.
  25. ^Adams Kong, King-Hong Cheung, David Zhang, Mohamed Kamel, and Jane You. 2006. An analysis of BioHashing and its variants. Pattern Recogn. 39, 7 (July 2006), 1359-1368.
  26. ^Ann Cavoukian and Alex Stoianov Biometric Encryption Chapter from the Encyclopedia of Biometrics.
  27. ^ abJisha Nair.b.j., Ranjitha Kumari.s, 'A review on biometric cryptosystems.' International Journal Of Latest Trends In Engineering And Technology. Volume 6 Issue 1 - September 2015
  28. ^Teoh, Andrew & Kim, Jaihie. (2015). Error Correction Codes for Biometric Cryptosystem. 한국통신학회지 (정보와통신). 32. 39-49.
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Private_biometrics&oldid=941261347'