An Improved Biometric Template Protection Method based on Non-Uniform Quantization

Qi Han; Zhifang Wang; Xiamu Niu
April 2008
Journal of Digital Information Management;Apr2008, Vol. 6 Issue 2, p169
Academic Journal
In recent literature, the issue of biometric template protection was raised. Some schemes were proposed to solve the contradiction between the fuzzy biometric information and accurate cryptography functions to achieve the protection of biometric template via cryptography method. In this paper, a novel methodology to achieve the security of the biometric templates in biometric systems is proposed. An adaptive non-uniform quantization (ANUQ) algorithm is introduced to eliminate the contradiction between the fuzziness of the biometric information and the sensitive of the Hash function. The ANUQ algorithm maps different biometric feature vectors from the same individual to a unique quantized feature vector. Then the quantized feature vector can be saved and identified by its hash and the biometric system can be free from the risk of the leakage of users' privacy information. Based on the ANUQ algorithm, two biometric template protection scheme are designed to meet different applications. Scheme-I involved a single quantizing template while scheme-II use a quantizing template array. The comparison of the two schemes are raised. Further, the testing of these schemes are carried out on an iris recognition algorithm. The results show the feasibility of the ANUQ-based schemes.


Related Articles

  • Survey Paper of Encrypted Data Hiding using Skin Tone Detection. Kalambe, Rekha D.; Pandit, Rakesh; Patel, Sachin // International Journal of Computer Applications;Oct2013, Vol. 79, p6 

    Steganography is the skill of hiding the existence of data in other transmission medium to attain secret communication. It does not restore cryptography but quite boost the security using its abstruse features. In this paper we have surveyed on a Steganography and cryptography techniques which...

  • Multi-Segment Steganography Technique. Alnawok, Fayik; Ahmed, Basem // International Arab Journal of Information Technology (IAJIT);Jul2008, Vol. 5 Issue 3, p253 

    The idea of this paper is to invent a new strategy in steganography to get the minimum effect on the images which is used to hide data into it. This is by dividing the original image into a number of segments, these segments is achieved according to the number of characters included into the...

  • A Faster Cryptanalytic Time-Memory Tradeoff. Jung Woo Kim; Jungjoo Seo; Jin Hong; Kunsoo Park // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p75 

    There has been extensive research on a cryptanalytic time-memory tradeoff for recent 30 years. Since Hellman's work in 1980, some improved variants and techniques have been proposed, and the rainbow method is known as the best time-memory tradeoff. As for the memory size, however, the required...

  • A Novel Non-Deterministic Data Privacy Preservation Mechanism for Software as a Service. Kun Zhang; Qingzhong Li; Yuliang Shi // International Journal of Digital Content Technology & its Applic;Apr2012, Vol. 6 Issue 7, p181 

    For software as a service, tenants' data are stored and processed at platform of un-trusted service providers. Obfuscation and encryption are frequently-used data privacy preservation approaches. However, these approaches are not appropriate for software as a service. Obfuscation approaches,...

  • What have you got to lose? Godbout, Yves // CA Magazine;Aug2007, Vol. 140 Issue 6, p41 

    The article offers several ways on how to protect the valuable data stored in personal computers used by companies from being exposed to hackers. One way of protecting an organization's information is to put passwords on personal computers. Another suggestion offered by the author is to use...

  • EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY. Vivek, S. Sree; Selvi, S. Sharmila Deva; Radhakishan, V.; Rangan, C. Pandu // International Journal of Network Security & Its Applications;Mar2012, Vol. 4 Issue 2, p179 

    In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the...

  • Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version. Ting-Yi Chang; Chou-Chen Yang; Min-Shiang Hwang // International Journal of Security & Its Applications;Oct2012, Vol. 6 Issue 4, p1 

    A convertible authenticated encryption scheme simultaneously provides the functions of integration, authentication, confidentiality, and non-repudiation. A signer generates an au- thenticated ciphertext signature on the chosen message. So that only a designated recipient can recover the message...

  • A Novel Image Encryption using an Integration Technique of Blocks Rotation based on the Magic cube and the AES Algorithm. Abugharsa, Ahmed Bashir; Hasan Basari, Abd Samad Bin; Almangush, Hamida // International Journal of Computer Science Issues (IJCSI);Jul2012, Vol. 9 Issue 4, p41 

    In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a dimension. In this paper proposes an encryption...

  • Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES).  // International Journal of Computer Applications;2010, Vol. 1, p65 

    The article offers information on the elliptic curve cryptography (ECC) and its relevance in encryption scheme. It mentions the ECC's effectiveness in such scheme and cites its better performance compared to its remote secure access (RSA) counterpart. It cites its importance in dealing with...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics