highly suitable for hiding biometric data, because it
works with unordered sets (e.g., fingerprint minutiae),
and can tolerate difference (element number or kind or
both) between the two sets A and B to some extent.
The id ea of ‘‘fuzzy fingerprint vault’’ [13] and
‘‘fuzzy vault for fingerprint’’ [4] are also proposed
aiming to solve the problems of fingerprint template
protection. Fuzzy Vault for face [14 ] and iris [15] have
also been proposed recently.
Performance Evaluation
Performance evaluation of the binding of biometric
and user data should be conducted based mainly on
two aspects: accuracy and security. Accuracy reflects
the effect after binding of biome tric and user data as an
enhanced identity authentication way, and securit y can
provide information on the probability that the system
will be attacked successfully.
1. Accuracy: The accuracy of biometric -like identity
authentication is due to the genuin e and imposter
distribution of matching. The overall accuracy
can be illustrated by Receiver Operation Character-
istics (ROC) curve, which shows the dependence of
False Reject Rate (FRR) on False Accept Rate (FAR)
at all thresholds. When the parameter changes,
FAR and FRR may yield the same value, which is
called Equal Error Rate (EER). It is a very impor-
tant indicator to evaluate the accuracy of the bio-
metric system, as well as binding of biometric and
user data.
2. Security: The security of the binding of biometric
and user data depends on the length of user data,
which is converted to binary 0/1 expression. It
assumes the attacker has full knowledge about the
binding method, but can only mount brute-force
attack on the system. So the system security is
weighed by bit length of the user data. Typically,
the sec urity of the iris binding system is 140-bit,and
that of fingerprint is 128-bits. However, typical face
binding algorithm holds only 58-bit security [3].
Summary
Binding of bio metric and user data is a kind of tech-
nique to tackle the issues of securit y and privacy
arising frequently in traditional biometric systems. It
may decrease the accuracy performance to some ex-
tent, but generally, the security and privacy of the
system are enhanced.
Related Entries
▶ Privacy Issues
▶ Security Issues, System Design
References
1. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of
Fingerprint Recognition. Springer, New York (2003)
2. Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric
cry ptosystems: issues and challenges. Proc. IEEE. 92(6),
948–960 (2004)
3. http://www.ipc.on.ca/images/Resources/up-1bio_encryp.pdf.
4. Uludag, U., Jain, A.: Securing fingerprint template: fuzzy vault
with helper data. In: Proceedings of IEEE Computer Society
Conference on Computer Vision and Pattern Recognition
Workshop, New York, pp. 163 (2006)
5. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractor. In: Tuyls, P.,
Skoric, B., Kevenaar, T. (eds.) Securit y with Noisy Data.
Springer, London (2008)
6. Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Kumar,
B.V.K.V.: Biometric encryption. In: Nichols, R.K. (ed.) Proceed-
ings of ICSA Guide to Cryptography. McGraw-Hill, New York
(1999)
7. Teoh, A.B.J., Ngo, D.C.L., Goh, A.: Biohashing: two factor au-
thentication featuring fingerprint data and tokenised random
number. Pattern Recognit. 37(11), 2245–2255 (2004)
8. Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In:
Proceedings of ACM Conference on Computer and Communi-
cations Security (CCS), Singapore, pp. 28–36 (1999)
9. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings
of IEEE International Symposium on Information Theory,
Lausanne, Switzerland, pp. 408 (2002)
10. Ngo, D.C.L., Toeh, A.B.J., Goh, A.: Eigenface-based face hashing.
In: Proceedings of International Conference on Biometric Au-
thentication, Hong Kong, China, pp. 195–199 (2004)
11. Connie, T., Teoh, A., Goh, M., Ngo, D.: PalmHashing: a novel
approach for cancelable biometrics. Inf. Process. Lett. 93(1), 1–5
(2005)
12. Lumini, A., Nanni, L.: An improved biohashing for human
authentication. Pattern Recognit. 40(3), 1057–1065 (2007)
13. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based
fingerprint authentication. In: Proceedings of ACM SIGMM
2003 Multimedia, Biometrics Methods and Applications Work-
shop, Berkley, CA, pp. 45–52 (2003)
14. Nyang, D., Lee, K.: Fuzzy face vault: how to implement
fuzzy vault with weighted features. In: Proceedings, Part I of
Fourth International Conference on Universal Access in
Biometric and User Data, Binding of
B
75
B