
to the biometric encryption approach of Soutar et al.
[9]. Boult [3] proposes a scheme in which face recog-
nition feaures are encoded via scaling and rotation;
The resulting data are separated into a ‘‘general
wrapping’’ number, whi ch is encrypted with a one-
way transform, and a fractional par t, which is pre-
served undestorted. Comparison is based on robust
distance measures, which saturate at large distances.
The cancelable fingerprint templates of [8] use the
minutiae rather than the raw image, since this allows
both minutiae position and angle to be permuted
(increasing the degrees of freedom of the transforma-
tion), and since distortion will interfere with the fea-
ture extraction process. The distortion is modeled on
the electric field distribution for random charges.
Results show a small impact on biometric errors
(5% increase in FRR) over undistorted features. A
theoretical approach to cancelable biometrics uses
▶ shielding functions [4], to allow a verifier to check
the authenticity of a prover (user wanting to be ver-
ified) without learning any biometric information,
using proposed d-contracting and E-revealing func-
tions. The proposed system was based on simple
Gaussian noise models and not tested with an actual
biometric system. Unfortunately, it is unclear how
practical functions can be found that account for the
inherent biometric feature variability.
A ‘‘biohashing’’ approach has been proposed by
Teoh et al. [6] and applied to many different modalities
including fingerprint, face, and palm. This scheme
applies a wavelet Fourier-Mellen transform (a rotation
and scale invariant transform) to input images. Each
bit of the tempate is calculated based on the inner
product of the transformed image with a random
image generated from a code. The claimed performance
of this approach is 0% EER. Unfortunately, it has been
shown by Kong et al. [10] that this high performance is
actually due to the code being treated as a guaranteed
secure password. Without this assumption, biohashing
approaches show overall poor error rates.
In general, cancelable biometrics may be seen to
represent a promising approach to address biometric
security and privacy vulnerabilities. However, there
are several concerns about the security of such
schemes. First, there is very little work analyzing their
security, except for an analysis of biohashing [10].
Secondly, while distortion schemes should be ‘‘prefer-
ably non-invertible’’ [2], no detailed proposed scheme
has this property. In fact, it would appear to be trivial
to ‘‘undistort’’ the template given knowledge of the
distortion key in most cases. Third, cancelable
biometrics would appear to be difficult to implement
in the untrusted scenarios for which they are proposed:
if the user does not trust the owne r of the biometric
sensor to keep the biometric private, how can they
enforce privacy on the distortion parameters used?
This last concern is perhaps the most serious: the
security of cancelable biometrics depends on secure
management of the distortion parameters, which
must be used for enrollment and made available at
matching. Furthermore, such keys may not be much
better protected than current passwords and PINs. In
summary, cancelable bio metrics offer a possible solu-
tion to certain serious security and privacy concerns of
biometric technology; however, current schemes leave
a number of important issues unaddressed. Research is
very active in this subject, and may succeed in addres-
sing these concerns.
Related Entries
▶ Fingerprints Hashing
▶ Security and Liveness, Overview
References
1. Ratha, N., Connell, J., Bolle, R.: Cancelable biometrics. In Proc.
Biometric Consortium Conference, Washington DC, USA
(2000)
2. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and
patches. Pattern Recogn. 35, 2727–2738 (2002)
3. Boult, T.: Robust distance measures for face-recognition sup-
porting revocable biometric tokens Proc. 7th Int. Conf. on Auto-
matic Face Gesture Recog Southampton, UK, pp. 560–566 (2006)
4. Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance
privacy and prevent misuse of biometric templates. In Proc.
AVBPA, Guiford, UK, LNCS 2688, 393–402 (2003)
5. Savvides M, Vijaya Kumar BVK, Khosla, P.K.: Cancelable bio-
metric filters for face recognition. In Proc. Int. Conf. Pattern
Recognition, pp. 922–925 (2004)
6. Teoh, A.B., Ngo, D.C., Goh, A.: Biohashing: two factor authenti-
cation featuring fingerprint data and tokenised random number.
Pattern Recogn. 37, 2245–2255 (2004)
7. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and
privacy in biometrics-based authentication systems. IBM Syst. J.
40, 614–634 (2001)
8. Ratha, N., Connell, J., Bolle, R.M., Chikkerur, S.: Cancelable
biometrics: A case study in fingerprints. Proc. Int. Conf. Pattern
Recogn. 4, 370–373 (2006)
Cancelable Biometrics
C
177
C