scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Template protection for HMM-based on-line signature authentication

TL;DR: This paper proposes a signature-based biometric authentication system, where signal processing techniques are applied to the acquired on-line signature in order to generate protected templates, from which retrieving the original data is computationally as hard as randomly guessing them.
Abstract: The security of biometric data is a very important issue in the deployment of biometric-based recognition systems. In this paper, we propose a signature-based biometric authentication system, where signal processing techniques are applied to the acquired on-line signature in order to generate protected templates, from which retrieving the original data is computationally as hard as randomly guessing them. A hidden Markov model (HMM)-based matching strategy is employed to compare the transformed signatures. The proposed protected authentication system generates a score as the result of the matching process, thus allowing to implement protected multibiometric recognition systems, through the application of score-fusion techniques. The experimental results show that, at the cost of only a slight performance reduction, the desired protection for the employed biometric templates can be properly achieved.

Summary (2 min read)

1. Introduction

  • The most emerging technology for automatic people recognition is biometrics.
  • Unfortunately, the use of biometric data in an automatic recognition system involves various risks, not affecting other traditional methods: if biometric data are somehow stolen or copied, they can be hardly replaced.
  • Moreover, biometric data can contain sensitive information (health, genetic background, age), that can be used in an unauthorized manner for malicious or undesired intents [1].
  • The adopted measures should be able to enhance biometric data resilience against attacks, while allowing the matching to be performed efficiently, thus guaranteeing acceptable recognition performance.
  • A non-invertible transform-based approach is proposed for the implementation of an on-line signature-based biometric authentication system, where the stored templates cannot reveal any information about the originally acquired biometric characteristics.

2. Biometric Template Security

  • In a typical biometric-based authentication system, eight possible vulnerable points can be individuated [2].
  • The concept of cancelable biometrics has been introduced in [2], and can be roughly described as the application of an intentional and repeatable modification to the original biometric template.
  • Generalizing this approach, three different non-invertible transforms, namely a cartesian, a polar and a functional transform, were proposed in [10] for generating cancelable fingerprint templates.
  • In [12] an adaptation of the fuzzy vault to signature protection is proposed, while also the fuzzy commitment (more specifically, its practical translation known as Helper Data System [13]) has been employed to provide security to the features extracted from an on-line signature, as proposed in [14].
  • On the other hand, the approach proposed in this paper directly works with the signature time sequences acquired by touch screens or digitizing tablets, trying to modify them in such a way that is com- putationally hard to recover the original information.

3. Proposed Approach for Cancelable On-line

  • As already pointed out, in this paper a non-invertible transform approach is proposed for the protection of online signature templates.
  • Specifically, the template that has to be protected consists of a set of signature discrete time sequences (e.g., position trajectories, pressure, etc.).
  • The desired protection is accomplished by properly modifying the considered time sequences, in such a way that it is not possible to retrieve the original data from the transformed one.
  • A function-based authentication approach is then implemented in order to perform the matching, directly applying Hidden Markov Models (HMMs) for the modelization of the transformed templates.
  • In Section 3.1, the employed feature extraction process, together with the implemented matching strategy, is presented.

3.1. HMM-based Signature Modeling

  • The proposed authentication system with protected templates is based on the on-line signature verification system presented in [16], where a function-based approach is employed to perform signature-based authentication, using HMMs to represent and match the signature discrete time sequences.
  • Specifically, in the proposed approach three time sequences, the horizontal x[n] and vertical y[n] position trajectories, together with the pressure signal p[n] (where n = 1, . . . , N is the discrete time index, and N is the time duration of the signature in sampling units), are acquired from each on-line signature through a digitizing tablet.
  • A geometric normalization, consisting of positions normalization followed by rotation alignment, is applied to the considered pen-position functions.
  • Then, other four discrete time sequences are derived from the basic set, and used as an additional extended set of functions, namely the path-tangent angle θ[n], the path velocity magnitude v[n], the log curvature radius ρ[n] and the total acceleration magnitude a[n], with n = 1, . . . , N .

3.2. Time Sequences Transformation

  • The vector d represents the key of the employed transformation.
  • Moreover, each original function undergoes the same decomposition before applying the convolutions.
  • A final signal normalization, oriented to obtain zero mean and unit standard deviation transformed functions, is then applied.
  • The security analysis of the proposed online signature template protection scheme is conducted in Section 4.

4. Security Analysis

  • Having defined the function transformation as in eq. (2), if an attacker gains access to the stored information, he has to resolve a blind deconvolution problem [18] to retrieve any information regarding the signature biometrics.
  • Typically, the goal of blind deconvolution is to recover a source signal given only the output of an unknown filter, or to separate different source signals from their convolutive mixtures.
  • Otherwise, some further constraints have to be established, in order to perform the process.
  • Moreover, it is worth pointing out that, in the proposed approach, for each user the HMM λ, estimated from the signature representations T, is the stored template.
  • Then, also if an attacker is able to acquire more than two distinct transformed versions of the original signature functions, it is however impossible to recover the original information using the data coming from different sources.

5. Experimental Results

  • An extensive set of experimental results has been performed using the MCYT on-line signature corpus [19].
  • Systems’ FAR for skilled forgeries (FARSF ) was computed using the available 25 skilled forgeries for each user, while the FAR for random forgeries (FARRF ) has been computed taking, for each user, one signature from each of the rest of the users.
  • Next, the authors performed tests to compare the performances of an unprotected and a protected system where HMMs are used as matching algorithm.
  • As a consequence, the more separations are performed, the more variable the convolutions at the output will be.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Template Protection for HMM-based On-line Signature Authentication
E. Maiorana*, M. Martinez-Diaz**, P. Campisi*, J. Ortega-Garcia**, A. Neri*
*Dip. Elettronica Applicata
Universit
´
a degli Studi “Roma Tre”
Via Della Vasca Navale 84, I-00146 Roma, Italy
http://www.comlab.uniroma3.it/people.htm
**ATVS, Escuela Politecnica Superior,
Universidad Autonoma de Madrid,
C/ Francisco Tomas y Valente 11, 28049 Madrid, Spain
http://atvs.ii.uam.es/listpeople.do
Abstract
The security of biometric data is a very important issue
in the deployment of biometric-based recognition systems.
In this paper, we propose a signature-based biometric au-
thentication system, where signal processing techniques are
applied to the acquired on-line signature in order to gen-
erate protected templates, from which retrieving the orig-
inal data is computationally as hard as randomly guess-
ing them. A Hidden Markov Model (HMM)-based matching
strategy is employed to compare the transformed signatures.
The proposed protected authentication system generates a
score as the result of the matching process, thus allowing
to implement protected multibiometric recognition systems,
through the application of score-fusion techniques. The ex-
perimental results show that, at the cost of only a slight per-
formance reduction, the desired protection for the employed
biometric templates can be properly achieved.
1. Introduction
The most emerging technology for automatic people
recognition is biometrics. In contrast with traditional ap-
proaches, based on what a person knows (password) or what
a person has (ID card, tokens), biometric-based authentica-
tion relies on who a person is or what a person does. Un-
fortunately, the use of biometric data in an automatic recog-
nition system involves various risks, not affecting other tra-
ditional methods: if biometric data are somehow stolen or
copied, they can be hardly replaced. Moreover, biomet-
ric data can contain sensitive information (health, genetic
background, age), that can be used in an unauthorized man-
ner for malicious or undesired intents [1]. Users’ privacy
can also be compromised if a cross-matching between dif-
ferent biometric database is performed, in order to track the
enrolled subjects. Therefore, when designing a biometric-
based recognition system, the issues deriving from the ex-
posed security and privacy concerns have to be carefully
considered. The adopted measures should be able to en-
hance biometric data resilience against attacks, while allow-
ing the matching to be performed efficiently, thus guaran-
teeing acceptable recognition performance.
In this contribution, a non-invertible transform-based ap-
proach is proposed for the implementation of an on-line
signature-based biometric authentication system, where the
stored templates cannot reveal any information about the
originally acquired biometric characteristics.
2. Biometric Template Security
In a typical biometric-based authentication system, eight
possible vulnerable points can be individuated [2]. The
unauthorized acquisition of the employed biometric data,
which represents one of the possible consequences of the
attacks to a biometric recognition system, is probably the
most dangerous treat regarding the privacy and the secu-
rity of the users. Different solutions have been investigated,
in the recent past, to secure the biometric templates gener-
ated from the feature extractor module. Among them, the
most promising approaches consist in the implementation
of what have been called cancelable biometrics. The con-
cept of cancelable biometrics has been introduced in [2],
and can be roughly described as the application of an inten-
tional and repeatable modification to the original biometric
template. Through the application of these distortions to
the biometric data, the properties of renewability and non-
invertibility [2] should be guaranteed. Moreover, the recog-
nition performance achievable using cancelable templates,
in terms of False Rejection Rate (FRR) and False Accep-
tance Rate (FAR), should not degrade significantly, when
compared to an unprotected system.
A classification of the already proposed solutions for the
generation of secure and renewable biometric templates has
been presented in [3], consisting of two macro-categories
referred to as biometric cryptosystem and feature transfor-
mation approaches. Biometric cryptosystems typically em-
ploy binary keys in order to secure the biometric templates,
and during the process some public information, usually re-
ferred to as helper data, is used. This category can be fur-
thered divided in key binding systems, where the helper data
are obtained by binding a key with the biometric template,
as it happens for the fuzzy commitment [4] and the fuzzy
vault [5], and key generation systems, where both the helper
data and the cryptographic key are directly generated from
1
978-1-4244-2340-8/08/$25.00 ©2008 IEEE

Repositorio Institucional de la Universidad Autónoma de Madrid
https://repositorio.uam.es
Esta es la versión de autor de la comunicación de congreso publicada en:
This is an author produced version of a paper published in:
IEEE Computer Society Conference on Computer Vision and Pattern
Recognition Workshops (CVPRW). IEEE, 2008. 1-6
DOI: http://dx.doi.org/ 10.1109/CVPRW.2008.4563114
Copyright: © 2008 IEEE
El acceso a la versión del editor puede requerir la suscripción del recurso
Access to the published version may require subscription

the biometric template, as in [6].
In a feature transformation approach, a transformation
function (typically dependent on some random parameters
which are employed as transformation keys) is applied to
the biometric templates, and the desired cancelable bio-
metrics are given by the transformed versions of the orig-
inal data. It is possible to distinguish between salting ap-
proaches, where the employed transformation functions are
invertible, and where therefore the security of the templates
relies in the secure storage of the function parameters [7],
and non-invertible transform approaches, where a one-way
function is applied to the considered biometrics, producing
templates from which it is computationally hard to retrieve
the original data, even if the transformation’s defining pa-
rameters are known. Implementing recognition system ac-
cording to this last category, the transformed templates can
remain in the same (feature) space of the original ones, be-
ing then possible to employ, during the authentication, the
matchers originally designed for the considered biometric
templates, and thus allowing to guarantee performances that
are similar to those of an unprotected approach. Moreover,
having the possibility of employing dedicated matchers, a
score can be obtained as the output of a recognition pro-
cess, even if it has been performed in a transformed and se-
cure domain: secure multibiometric systems can therefore
be implemented through score-level fusion techniques [8].
The method presented in this paper falls in the cate-
gory of the non-invertible transform approaches, being then
possible to use it to protect the considered biometric data,
while performing user authentication with performances
very similar to those of an unprotected system, and giving
the opportunity of designing multibiometric system. The
first practical non-invertible transform-based approach for
the protection of biometric data was presented in [9], where
the minutiae pattern extracted from a fingerprint undergoes
a key-dependent geometric transform. Generalizing this ap-
proach, three different non-invertible transforms, namely a
cartesian, a polar and a functional transform, were proposed
in [10] for generating cancelable fingerprint templates.
As far as signature template protection is concerned, it
was first considered in [11] with a key generation approach.
In [12] an adaptation of the fuzzy vault to signature protec-
tion is proposed, while also the fuzzy commitment (more
specifically, its practical translation known as Helper Data
System [13]) has been employed to provide security to the
features extracted from an on-line signature, as proposed in
[14]. A comprehensive survey on signature template protec-
tion can be found in [15]. Each of the referenced approaches
relies on the extraction of some parametric features from the
considered on-line signatures. On the other hand, the ap-
proach proposed in this paper directly works with the signa-
ture time sequences acquired by touch screens or digitizing
tablets, trying to modify them in such a way that is com-
putationally hard to recover the original information. Deal-
ing with time sequences instead of parametric features will
allow to manage a greater amount of information, thus en-
abling us to obtain significant authentication performances,
as outlined in Section 5.
3. Proposed Approach for Cancelable On-line
Signature Biometrics
As already pointed out, in this paper a non-invertible
transform approach is proposed for the protection of on-
line signature templates. Specifically, the template that has
to be protected consists of a set of signature discrete time
sequences (e.g., position trajectories, pressure, etc.). The
desired protection is accomplished by properly modifying
the considered time sequences, in such a way that it is not
possible to retrieve the original data from the transformed
one. A function-based authentication approach is then im-
plemented in order to perform the matching, directly apply-
ing Hidden Markov Models (HMMs) for the modelization
of the transformed templates. In Section 3.1, the employed
feature extraction process, together with the implemented
matching strategy, is presented.
3.1. HMM-based Signature Modeling
The proposed authentication system with protected tem-
plates is based on the on-line signature verification sys-
tem presented in [16], where a function-based approach is
employed to perform signature-based authentication, using
HMMs to represent and match the signature discrete time
sequences. Specifically, in the proposed approach three
time sequences, the horizontal x[n] and vertical y[n] po-
sition trajectories, together with the pressure signal p[n]
(where n =1,...,N is the discrete time index, and N
is the time duration of the signature in sampling units), are
acquired from each on-line signature through a digitizing
tablet. A geometric normalization, consisting of positions
normalization followed by rotation alignment, is applied to
the considered pen-position functions. Then, other four dis-
crete time sequences are derived from the basic set, and
used as an additional extended set of functions, namely
the path-tangent angle θ[n], the path velocity magnitude
v[n], the log curvature radius ρ[n] and the total acceler-
ation magnitude a[n], with n =1,...,N. The consid-
ered original signature representation is then derived using
both the basic and extended sets, and consists of a matrix
U =[u[1],...,u[N]] whose columns u[n] are obtained
as u[n]=[x[n],y[n],p[n][n],v[n
][n],a[n]]
T
,n =
1,...,N. Each row of matrix U is therefore given from
one of the F =7considered signature time sequences.
Instead of training a HMM with the original signature
template U, we represent each signature using a trans-
formed version of U, indicated as T =[t[1],...,t[K]].
Each column t[n], n =1,...,K represents a vector of

Figure 1. Example of a signature function transformation, where W =3.
length F , whose elements t[n]=[f
(1)
[n],...,f
(F )
[n]]
T
,
n =1,...,K, are derived from the elements of the original
template in such a way that it is not possible to recover U
from the knowledge of T.
HMMs are employed to model the obtained transformed
signature representations T. Specifically, the employed
models are defined by the number of hidden states H, and
by the number M of Gaussian densities which are used to
describe the probability p
h
(t) of the emission of symbol t
from the state h, h =1,...,H.
During enrollment, E signatures are acquired from each
user, and a client model λ (composed by an initial distri-
bution π, a state transition matrix A and an observation
density functions B [16]) is estimated from the transformed
signature representations
T
(1)
,...,T
(E)
, by following
the iterative strategy presented in [16]. When the user
claims his identity providing a new signature, its represen-
tation T is evaluated, and a similarity score is calculated as
(1/K)logP (T|λ) using the Viterbi algorithm [17].
3.2. Time Sequences Transformation
In the proposed approach, the number of transformed
discrete functions f
(i)
[n], i =1,...,F and n =1,...,K,
which define the transformed template T, equals the num-
ber F of the original functions. The transformed functions
are generated through linear combinations of the time se-
quences belonging to the original signature template U.
Specifically, in the proposed approach each trans-
formed function f
(i)
[n] is derived from a single cor-
responding original function r
(i)
[n], which represents a
generic original discrete time sequence selected among
the F rows of U (i.e. among the signature functions
x[n],y[n],p[n][n],v[n][n], and a[n]). A number (W
1) of values d
j
, are randomly selected between 1 and 99
in an ordered fashion, in such a way that d
j
>d
j1
, j =
1,...,W, and arranged in a vector d =[d
0
,...,d
W
],hav-
ing kept d
0
=0and d
W
= 100. The vector d represents the
key of the employed transformation. Then, the values d
j
are
converted according to the relations b
j
= round(
d
j
100
· N),
j =0,...,W, where round(·)represents the nearest inte-
ger, and the original sequence r
(i)
[n] is divided into W seg-
ments r
(i)j,N
j
[n] of length N
j
= b
j
b
j1
, each defined
as
r
(i)j,N
j
[n]=r
(i)
[n + b
j1
], (1)
for n =1,...,N
j
and j =1,...,W. Basically, the func-
tion r
(i)
[n] is split into W separated parts according to the
randomly generated vector d, as illustrated in Figure 1 for
the case with W =3. A transformed function f
(i)
[n],
n =1,...,K, is then obtained through the linear convo-
lution of the functions r
(i)j,N
j
[n], that is,
f
(i)
[n]=r
(i)1,N
1
[n] ... r
(i)W,N
W
[n]. (2)
Each transformed function f
(i)
[n] is therefore obtained
through the linear convolutions of parts of the correspond-
ing original functions r
(i)
[n], i =1,...,F. Moreover, each
original function undergoes the same decomposition before
applying the convolutions. As it can be seen, due to the
convolution operation in (2), the length of the transformed
functions is equal to K = N W +1, being therefore al-
most the same of the original functions one. A final signal
normalization, oriented to obtain zero mean and unit stan-
dard deviation transformed functions, is then applied. Dif-
ferent realizations can be obtained from the same original
functions, simply varying the size or the values of the pa-
rameter key d. The security analysis of the proposed on-
line signature template protection scheme is conducted in
Section 4.
4. Security Analysis
Having defined the function transformation as in eq. (2),
if an attacker gains access to the stored information, he has
to resolve a blind deconvolution problem [18] to retrieve
any information regarding the signature biometrics. Typi-
cally, the goal of blind deconvolution is to recover a source
signal given only the output of an unknown filter, or to sep-
arate different source signals from their convolutive mix-
tures. However, some statistical properties of the filter, or
of the considered sources, have to be assumed. Otherwise,
some further constraints have to be established, in order to
perform the process. In our case, the transformed template
T contains only convolutions between segments extracted
from the original functions, about which no a priori in-
formation can be assumed. Then, employing the proposed

transformation, recovering in a deterministic way the orig-
inal data from the transformed ones, employed to train the
HMMs, is as much hard as randomly guessing the segments
extracted from the signature functions.
Moreover, also considering different transformed tem-
plates employed in different systems (record multiplicity
attack), it is not possible to retrieve the original signature
sequences. In order to properly illustrate this, some as-
sumptions have to be stated. First, it is supposed that the
different transformed versions are derived from exactly the
same original data (although this is almost impossible, be-
ing on-line signatures characterized by a significant intra-
user variability). Moreover, it is worth pointing out that,
in the proposed approach, for each user the HMM λ,es-
timated from the signature representations T, is the stored
template. Then, if someone wants to retrieve the original
signature time sequences, he has to generate realizations
from the available HMMs. In order to analyze the security
of the proposed approach in the worst considerable case, it
is assumed that, from a stored HMM λ, it is possible to syn-
thesize exactly the same functions from which the model
has been estimated. Under these assumptions, which define
a very restrictive scenario, we then consider a case where an
attacker has acquired, from two different systems, two dif-
ferent transformed signature representations T
(1)
and T
(2)
,
generated from the same original template U. Considering
the simplest case with W =2, it is supposed that an attacker
possess two transformed instances f
(1)
[n] and f
(2)
[n], n =
1,...,K = N 1, of the same original time sequence
r[n], n =1,...,N, obtained using respectively the trans-
formation parameters d
(1)
1
and d
(2)
1
. In order to retrieve the
function r[n], the attacker should be able to obtain the seg-
ments r
(1)
1,N
(1)
1
[n] and r
(1)
2,N
(1)
2
[n], where N
(1)
1
= b
(1)
1
and
N
(1)
2
= N b
(1)
1
, or the segments r
(2)
1,N
(2)
1
[n] and r
(2)
2,N
(2)
2
[n],
withN
(2)
1
= b
(2)
1
and N
(2)
2
= N b
(2)
1
, from the avail-
able transformed functions f
(1)
[n]=r
(1)
1,N
(1)
1
[n] r
(1)
2,N
(1)
2
[n]
and f
(2)
[n]=r
(2)
1,N
(2)
1
[n] r
(2)
2,N
(2)
2
[n]. Deconvolution prob-
lems are typically coped with in the frequency domain, be-
ing the convolutions transformed into simple multiplica-
tions. In order to properly define the Discrete Fourier Trans-
forms (DFTs) of the considered sub-functions of r[n],the
extended versions ˆr
(j)
i,K
[n], i, j =1, 2, are generated ap-
plying a zero padding to the respective original functions,
until reaching the length K = N 1 (that is the length
of the convolutions f
(1)
[n] and f
(2)
[n]). Then, a sequence
Δ[n], n =1,...,K, is defined as the difference between
ˆr
(1)
1,K
[n] and ˆr
(2)
1,K
[n], which share a common part that is ex-
actly r
(2)
1,K
[n], having assumed that b
(1)
1
>b
(2)
1
:
Δ[n]=ˆr
(1)
1,K
[n] ˆr
(2)
1,K
[n],n=1,...,K. (3)
It can then be demonstrated that the following relations can
be derived for the considered finite sequences:
ˆr
(1)
1,K
[n]=ˆr
(2)
1,K
[n]+Δ[n]
ˆr
(1)
2,K
[n b
(1)
1
]=ˆr
(2)
2,K
[n b
(2)
1
] Δ[n]
(4)
where all the considered shifts are circular shifts. Then, ap-
plying the DFT to the a priori known functions f
(1)
[n] and
f
(2)
[n], and considering the relations between the DFT and
the linear convolution of two discrete sequences, it results:
DFT{f
(1)
[n]} = DF T{ˆr
(1)
1,K
[n]DFT{ˆr
(1)
2,K
[n]} =
DFT{ˆr
(1)
1,K
[n]DFT{ˆr
(2)
1,K
[n b
(1)
1
]e
j2π(k/K)b
(1)
1
DFT{f
(2)
[n]} = DF T{ˆr
(2)
1,K
[n]DFT{ˆr
(2)
2,K
[n]}
(5)
and using the relations in (4), the first equation of (5) can be
written as:
DFT{f
(1)
[n]} =
DFT{ˆr
(2)
1,K
[n]} + DFT{Δ[n]}
· (6)
DFT{ˆr
(2)
2,K
[n b
(2)
1
]}−DFT{Δ[n]}
·
e
j2π(k/K)b
(1)
1
and therefore:
DFT{f
(1)
[n]} = e
j2π(k/K)b
(1)
1
·
DFT{ˆr
(2)
1,K
[n]DFT{ˆr
(2)
2,K
[n]e
j2π(k/K)b
(2)
1
DFT{Δ[n]DFT {ˆr
(2)
1,K
[n]} + DFT{Δ[n]
DFT{ˆr
(2)
2,K
[n]e
j2π(k/K)b
(2)
1
DF T
2
{Δ[n]}
DFT{f
(2)
[n]} = DF T{ˆr
(2)
1,K
[n]DFT{ˆr
(2)
2,K
[n]}
(7)
As it can be seen, the obtained system cannot be re-
solved, due to the fact that the term DFT {Δ[n]} repre-
sents an additional unknown variable, added to the unknown
functions ˆr
(2)
1,K
[n] and ˆr
(2)
2,K
[n]. Then, also if an attacker is
able to acquire more than two distinct transformed versions
of the original signature functions, it is however impossible
to recover the original information using the data coming
from different sources.
5. Experimental Results
An extensive set of experimental results has been per-
formed using the MCYT on-line signature corpus [19]. This
database contains 330 users, for each of which 25 genuine
signatures and 25 skilled forgeries have been captured dur-
ing five different sessions.
In order to properly analyze the proposed non invertible
transform-based signature template protection, the follow-
ing aspects have been investigated:
which is the variability of the matching performances
when the transformation parameters are changed?

Citations
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Abstract: Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms for biometric-dependent key-release. In the last years a significant amount of approaches to both technologies have been published. A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented. State-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.

620 citations


Cites methods from "Template protection for HMM-based o..."

  • ...[144-146] apply non-invertible transforms to obtain cancelable templates from online signatures....

    [...]

Journal ArticleDOI
TL;DR: This paper addresses privacy leakage in biometric secrecy systems by investigating four settings in which two terminals observe two correlated sequences and determining the fundamental balance for both unconditional and conditional privacy leakage.
Abstract: This paper addresses privacy leakage in biometric secrecy systems. Four settings are investigated. The first one is the standard Ahlswede-Csiszar secret-generation setting in which two terminals observe two correlated sequences. They form a common secret by interchanging a public message. This message should only contain a negligible amount of information about the secret, but here, in addition, we require it to leak as little information as possible about the biometric data. For this first case, the fundamental tradeoff between secret-key and privacy-leakage rates is determined. Also for the second setting, in which the secret is not generated but independently chosen, the fundamental secret-key versus privacy-leakage rate balance is found. Settings three and four focus on zero-leakage systems. Here the public message should only contain a negligible amount of information on both the secret and the biometric sequence. To achieve this, a private key is needed, which can only be observed by the terminals. For both the generated-secret and the chosen-secret model, the regions of achievable secret-key versus private-key rate pairs are determined. For all four settings, the fundamental balance is determined for both unconditional and conditional privacy leakage.

194 citations


Additional excerpts

  • ...I. INTRODUCTION...

    [...]

Journal ArticleDOI
01 May 2010
TL;DR: An approach is proposed that is able to guarantee security and renewability to biometric templates, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template.
Abstract: Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the deployment of biometric-based authentication systems. In this paper, we propose an approach, which we refer to as BioConvolving, that is able to guarantee security and renewability to biometric templates. Specifically, we introduce a set of noninvertible transformations, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template. Once the transformation is performed, retrieving the original data from the transformed template is computationally as hard as random guessing. As a proof of concept, the proposed approach is applied to an on-line signature recognition system, where a hidden Markov model-based matching strategy is employed. The performance of a protected on-line signature recognition system employing the proposed BioConvolving approach is evaluated, both in terms of authentication rates and renewability capacity, using the MCYT signature database. The reported extensive set of experiments shows that protected and renewable biometric templates can be properly generated and used for recognition, at the expense of a slight degradation in authentication performance.

157 citations


Cites background or methods from "Template protection for HMM-based o..."

  • ...the authors’ works presented in [10] and [11]....

    [...]

  • ...Specifically, the values of H reported in Table I are H ∈ {8, 16}, since the best recognition rates are achieved when using, for the HMM modelization, a number of states comprised between 8 and 16, as observed in [5] and [10]....

    [...]

Journal ArticleDOI
TL;DR: The results prove that the proposed framework does not undermine the discriminating features of genuine and forged signatures and the verification performance is comparable to that of the state-of-the-art benchmark results.

93 citations


Cites methods from "Template protection for HMM-based o..."

  • ...al have used a signature transformation technique to secure online signatures templates that can be matched via HMM [35]....

    [...]

  • ...Table 4: Comparison of verification accuracy on SVC 2004 dataset when different transformation functions are used Transform KRP KRP-AH KRP-DPT [13] KRP-CFT [35] k = 30 k = 30 d = 120 w = 3...

    [...]

  • ...For Convolution Function Transform (CFT) [35], 120 distinguishing points (d) are chosen for each signature and matching for transformed signatures is performed using DTW....

    [...]

  • ...Unlike the traditional feature transformation techniques [20, 35, 29, 25], our system preserves the important biometric information even when the user specific password is compromised....

    [...]

Journal ArticleDOI
TL;DR: An on-line signature authentication system based on an ensemble of local, regional, and global matchers is presented and a template protection scheme employing the BioHashing and the BioConvolving approaches, two well known template protection techniques for biometric recognition, is discussed.
Abstract: In this work an on-line signature authentication system based on an ensemble of local, regional, and global matchers is presented. Specifically, the following matching approaches are taken into account: the fusion of two local methods employing Dynamic Time Warping, a Hidden Markov Model based approach where each signature is described by means of its regional properties, and a Linear Programming Descriptor classifier trained by global features. Moreover, a template protection scheme employing the BioHashing and the BioConvolving approaches, two well known template protection techniques for biometric recognition, is discussed. The reported experimental results, evaluated on the public MCYT signature database, show that our best ensemble obtains an impressive Equal Error Rate of 3%, when only five genuine signatures are acquired for each user during enrollment. Moreover, when the proposed protected system is taken into account, the Equal Error Rate achieved in the worst case scenario, that is,when an ''impostor'' is able to steal the hash keys, is equal to 4.51%, whereas an Equal Error Rate ~0 can be obtained when nobody steals the hash keys.

77 citations


Cites background or methods from "Template protection for HMM-based o..."

  • ...the Improved BioHashing template protection technique (Lumini & Nanni, 2007); the BioConvolving template protection technique presented in Maiorana et al. (2008)....

    [...]

  • ...…(Van der Veen, Kevenaar, Schrijen, Akkermans, & Zuo, 2006) has been employed to provide security for the features extracted from an on-line signature, as proposed in Maiorana et al. (2008), Campisi, Maiorana, & Neri (2008), where a user-adaptive error correcting code selection was also introduced....

    [...]

  • ...In Maiorana et al. (2008) a signature template protection scheme, where non-invertible transforms are applied to a set of signature sequences, has been presented, and its non-invertibility discussed....

    [...]

  • ...Notice that using the standard Kholmatov’s method and the base approach proposed in Maiorana et al. (2008) we obtain an EER 12.95 of and an AUC of 0.927....

    [...]

  • ...The generation of cancelable biometrics according to the BioConvolving approach was proposed in Maiorana et al. (2008)....

    [...]

References
More filters
Journal ArticleDOI
Lawrence R. Rabiner1
01 Feb 1989
TL;DR: In this paper, the authors provide an overview of the basic theory of hidden Markov models (HMMs) as originated by L.E. Baum and T. Petrie (1966) and give practical details on methods of implementation of the theory along with a description of selected applications of HMMs to distinct problems in speech recognition.
Abstract: This tutorial provides an overview of the basic theory of hidden Markov models (HMMs) as originated by L.E. Baum and T. Petrie (1966) and gives practical details on methods of implementation of the theory along with a description of selected applications of the theory to distinct problems in speech recognition. Results from a number of original sources are combined to provide a single source of acquiring the background required to pursue further this area of research. The author first reviews the theory of discrete Markov chains and shows how the concept of hidden states, where the observation is a probabilistic function of the state, can be used effectively. The theory is illustrated with two simple examples, namely coin-tossing, and the classic balls-in-urns system. Three fundamental problems of HMMs are noted and several practical techniques for solving these problems are given. The various types of HMMs that have been studied, including ergodic as well as left-right models, are described. >

21,819 citations

Proceedings ArticleDOI
01 Nov 1999
TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Abstract: We combine well-known techniques from the areas of error-correcting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding: it is infeasible for an attacker to learn the committed value, and also for the committer to decommit a value in more than one way. In a conventional scheme, a commitment must be opened using a unique witness, which acts, essentially, as a decryption key. By contrast, our scheme is fuzzy in the sense that it accepts a witness that is close to the original encrypting witness in a suitable metric, but not necessarily identical.This characteristic of our fuzzy commitment scheme makes it useful for applications such as biometric authentication systems, in which data is subject to random noise. Because the scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords. This addresses a major outstanding problem in the theory of biometric authentication. We prove the security characteristics of our fuzzy commitment scheme relative to the properties of an underlying cryptographic hash function.

1,744 citations


"Template protection for HMM-based o..." refers background in this paper

  • ...This category can be furthered divided in key binding systems, where the helper data are obtained by binding a key with the biometric template, as it happens for the fuzzy commitment [4] and the fuzzy vault [5], and key generation systems, where both the helper data and the cryptographic key are directly generated from...

    [...]

Journal ArticleDOI
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

1,709 citations


"Template protection for HMM-based o..." refers background or methods in this paper

  • ...In a typical biometric-based authentication system, eight possible vulnerable points can be individuated [2]....

    [...]

  • ...Through the application of these distortions to the biometric data, the properties of renewability and noninvertibility [2] should be guaranteed....

    [...]

  • ...The concept of cancelable biometrics has been introduced in [2], and can be roughly described as the application of an intentional and repeatable modification to the original biometric template....

    [...]

Proceedings ArticleDOI
30 Jun 2002
TL;DR: In this article, the authors describe a fuzzy vault construction that allows Alice to place a secret value /spl kappa/ in a secure vault and lock it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using B, he obtains the secret value if B is close to A, i.e., only if A and B overlap substantially.
Abstract: We describe a simple and novel cryptographic construction that we call a fuzzy vault. Alice may place a secret value /spl kappa/ in a fuzzy vault and "lock" it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the vault using an unordered set B, he obtains /spl kappa/ only if B is close to A, i.e., only if A and B overlap substantially.

1,481 citations

Journal ArticleDOI
TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Abstract: Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

1,119 citations

Frequently Asked Questions (14)
Q1. What are the contributions mentioned in the paper "Template protection for hmm-based on-line signature authentication" ?

In this paper, the authors propose a signature-based biometric authentication system, where signal processing techniques are applied to the acquired on-line signature in order to generate protected templates, from which retrieving the original data is computationally as hard as randomly guessing them. 

The proposed authentication system with protected templates is based on the on-line signature verification system presented in [16], where a function-based approach is employed to perform signature-based authentication, using HMMs to represent and match the signature discrete time sequences. 

The unauthorized acquisition of the employed biometric data, which represents one of the possible consequences of the attacks to a biometric recognition system, is probably the most dangerous treat regarding the privacy and the security of the users. 

A function-based authentication approach is then implemented in order to perform the matching, directly applying Hidden Markov Models (HMMs) for the modelization of the transformed templates. 

Performing the transformations keeping W = 3 results in an EER of about 19.24%, while if each signature function is divided in W = 4 segments before performing the convolutions, the EER raises to 24.92%. 

Deconvolution prob-lems are typically coped with in the frequency domain, being the convolutions transformed into simple multiplications. 

Systems’ FAR for skilled forgeries (FARSF ) was computed using the available 25 skilled forgeries for each user, while the FAR for random forgeries (FARRF ) has been computed taking, for each user, one signature from each of the rest of the users. 

In order to retrieve the function r[n], the attacker should be able to obtain the segments r(1)1,N (1) 1[n] and r(1) 2,N(1) 2[n], where N (1)1 = b (1) 1 andN (1) 2 = N − b(1)1 , or the segments r(2)1,N(2)1 [n] and r (2) 2,N (2) 2 [n], withN (2)1 = b (2) 1 and N (2) 2 = N − b(2)1 , from the available transformed functions f (1)[n] = r(1) 1,N(1) 1[n]∗ r(1) 2,N(1) 2[n]and f (2)[n] = r(2) 1,N(2) 1[n] ∗ r(2) 2,N(2) 2[n]. 

As it can be seen, the best performance achievable with an unprotected approach consists in an EER of 10.29%, and it occurs for H = 12 and M = 16. 

Each user is enrolled using the E = 5 signatures from the first session, while the other four sessions are employed to estimate the FRR. 

As already pointed out, in this paper a non-invertible transform approach is proposed for the protection of online signature templates. 

As it can be seen from the reported Receiver Operating Characteristic (ROC) curves, the EER for skilled forgeries in an unprotected system is equal to 10.74%, and it increases only slightly to 14.03% when the protection of the templates is introduced, considering W = 2. 

In order to analyze the security of the proposed approach in the worst considerable case, it is assumed that, from a stored HMM λ, it is possible to synthesize exactly the same functions from which the model has been estimated. 

The first practical non-invertible transform-based approach for the protection of biometric data was presented in [9], where the minutiae pattern extracted from a fingerprint undergoes a key-dependent geometric transform.