4. Brislawn, C., Quirk, M.: Image compression with the JPEG-2000
standard. In: Driggers, R. (ed.) Encyclopedia of Optical Engi-
neering, pp. 780–785. Marcel Dekker (2003)
5. INCITS biometric sample quality standard draft. M1/06-0948
(2006) http://www.incits.org/tc_home/m1htm/2006docs/
m1060948.pdf
6. NIST Biometric Quality Workshop, 2006, http://www.itl.nist.
gov/iad/894.03/quality/workshop07/index.html (2007)
7. Tabassi, E., Wilson, C., Watson, C.: Fingerprint image quality.
NIST research report NISTIR7151 (2004)
8. ISO/IEC Biometric Sample Quality Standard. ISO/IEC 29794
http://www.iso.org/iso/iso_catalogue/cata logue_tc/ca talogue_
detail.htm?csnumber=43583
9. Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement:
Algorithms and performance evaluation. IEEE Trans. Pattern
Anal. Mach. Intell. 20(8), 777–789 (1998)
10. Maltoni, D., Maio, D., Jain, A., Prabhakar, S.: Handbook of
fingerprint recognition. Springer, New York (2003)
11. Grother, P., McCabe, M., Watson, C., Indovina, M., Salamon, W.,
Flanagan, P., Tabassi, E., Newton, E., Wilson, C.: MINEX:
Performance and Interoperability of the INCITS 378 Fingerprint
Template. NIST MINEX Evaluation Report (2006)
12. Jain, A., Flynn, P., Ross, A.: Handbook of biometrics. Springer,
New York (2008)
13. Henry, E.: Classification and uses of finger prints. Routledge,
London (1900)
14. Ross, A., Nandakumar, K., Jain, A.: Handbook of multibio-
metrics. Springer, New York (2006)
Biometric and User Data, Binding of
PENG LI,JIE TIAN,XIN YANG,SUJING ZHOU
Institute of Automation, Chinese Academy of Sciences,
Beijing, People’s Republic of China
Synonyms
Key binding; Secure biometrics; Template protection
Definition
‘‘User data’’ stands for the private information of the
biometric system user, for example the identity num-
ber, e-mail address or any other significant or insignif-
icant character string, which can be transformed into
ASCII code in computer systems. Binding of biometric
and user data is a method which aims to solve the
issues of security and privacy involved with biometric
system. As an important method of Biometric
Encryption, binding of biometric and user data has
two main functions, one is protecting the biometric
template from attacks, where cancelable biometric
templates can be generated; and the other is embed-
ding user data into the biometric template, where user
data w ill be reproduced if and only if biometric match-
ing succeeds.
Introduction
As an identity authentication method, biometrics bases
recognition on an intrinsic aspect of the human being
and the use of biometrics requires the person to be
authenticated as physically present at the point of the
authentication [1]. With more and more application
examples, biometrics recognition system exposes some
intrinsic def ects; the most serious is the security and
privacy issue involved with raw biometric data [2].
Biometric data is difficult to cancel in case it is lost or
obtained by an attacker. The lost biometric may be
used for cross-matching between different databases
and can bring disastrous results to user data. Because
of this kind of hidden dang er, people resort to a more
secure biometric system, called Biometric Encryption
or Biometric Cryptosystems [3]. Amo ng the various
methods of Biometric Encryption, binding of biomet-
ric and user data is the most practical and promising
one, which is named Key Binding Method. This is
different from the other key-related method: Key Re-
lease (Fig. 1).
The commonly collected user data includes name,
any form of ID number, age, gender, and e-mail ad-
dress, etc. The user data which is bound with bio metric
in the algorithm layer, say e-mail address or social
security ID, should be protected from being stolen by
the attackers, while the nonsensitive data can be open.
In the enrollment stage of the Biometric Encryption
system, the biometric feature extraction procedure is
the same as in the traditional system. After the feature is
obtained, it will be bound with user data (e.g., identity
number, password, etc) in some way, thus yielding a
cancelable biometric template, which will be stored as a
private template and used to match the query samples.
In the matching stage, the user provides his/her bio-
metric and the user-specific data to the biometric sys-
tem. Then, the same feature extraction and binding
procedure will be conducted inside the system. The
two private templates are compared in the traditional
68
B
Biometric and User Data, Binding of