
▶ biometric cryptosystems, and ▶ data hiding techni-
ques. Template protection techniques specifically
designed and applied to
▶ iris images are hereafter
summarized.
Introduction
Template protection is a key issue that has to be
addressed when a biometric based authentication sys-
tem is designed. It is highly desirable to keep secret a
template both for security and for privacy reasons, and
in case a template is compromised it is necessary to
revoke, to cancel, or to renew it. Also, it is highly
recommended to obtain from the same biometric dif-
ferent templates in order to avoid unauth orized track-
ing across different databases. In the recent past several
techniques have been proposed to secure biometric
templates and to provide the desirable cancelability
and renewability properties. In the following limi-
tations of classical cryptography, when applied within
the biometric framework, are highlighted. Moreover,
recently introduced techniques like template distor-
tions, biometric cryptosystems, and data hiding tech-
niques are briefly discussed first in general and later
with specific application to iris template protection.
Cryptography [1] allows secure transmission of
data over a reliable but insecure channel. The privacy
of the message and its integrity are ensured, and the
authenticity of the sender is guaranteed. However,
cryptographic systems rely on the use of keys which
must be stored and released on a password based
authentication protocol. Therefore, the security of a
cryptographic system relies on how robust is the pass-
word storage system to brute force attacks. However,
template encryption cannot solve the biometric tem-
plate protection problem. In fact, at the aut hentication
stage, when a genuine biometrics is presented to the
system, the match must be performed in the template
domain, after decryption. However, this implies that
there is no more security on the biometric templates.
The match in the encrypted domain could solve this
problem. However, because of the intrinsic noisy na-
ture of biometric data, the match in the encrypted
domain would inevitably bring to a failure because
small differences between data would bring to sig-
nificant differences between their encrypted versions.
Some activities are flourishing to define signal
processing operations in the encrypted domain,
which could allow, for example, to perform operations
on encrypted biometric templates on not trusted
machines. However, this activity is still in its infancy
and does not provide tools within the biometric frame-
work yet.
Among the possible approaches recently proposed
to address the issue of template protection, techniques
based on intentional template distortions on the origi-
nal biometrics have been introduced in [ 2]. Specifical-
ly, the distortion can take place either in the biometric
domain, that is, before feature extraction or in the
feature domain. Moroever, the distor tion can be per-
formed using either an invertible or a non invertible
transform on the base of a user key which must be
known at the authentication stage . On ly the distorted
data are stored in the database. This implies that, even
if the database is compromised, the biometric data
cannot be retrieved unless, when dealing with invert-
ible transforms, user dependent keys are revealed.
Moreover, different templates can be generated from
the same original data, simply by changing the para-
meters of the employed transforms. The described
technique allows obtaining both cancelability and
renewability.
In the recent past, some efforts have been devoted
to design biometric cryptosystems (see [3] for a review)
where a classical password based authentication ap-
proach is replaced by biometric based authentica-
tion. Biometric cryptosystems can be used for either
securing the keys obtained when using traditional
cryptographic schemes or for providing the whole
authentication system. A possible classification of the
operating modes of a biometric cryptosystem is given
in [3] where key release, key binding,andkey generation
modes are identified. Specifically, in the key release
mode the crypto graphic key is stored together with
the biometric template and the other necessary infor-
mation about the user. After a successful biome tric
matching, the key is releas ed. However, this approach
has several drawbacks, since it requires access to the
stored template and then the one bit output of the
biometric matcher can be overridden by using Trojan
horse attacks. In the key binding mode the key is bound
to the biometric template in such a way that both of
them are inaccessible to an attacker and the key is
released when a valid biometric is presented. It is
worth pointing out that no match between the tem-
plates nee ds to be performed. Among the key binding
approaches it is worth citing the fuzzy commitment
866
I
Iris Template Protection