
method in [6]. Then two chaotic maps are used for
encrypting the iris template. The first map is used to
generate a 1D sequence of real numbers used as a
sequence key. A biometric generated key, the biokey,
is used to set the initial condition and the parameters
of the chaotic map. Then, the so obtained 1D sequence
is used as the sequence key of a different chao tic map
which is used to encrypt the template. The authors of
[15] point out that this approach assures robus tness
against different kind of attacks. After encryption, the
template is embedded into the cover image by using a
discrete wavelet transform (DWT) decomposition. The
template extraction and decryption is made on the
authentication side by performing dual operations
with respect to the ones done at the embedding side.
The authors hig hlights that their method offers better
performance than those given by using only one cha-
otic map.
Summary
Template protection is a key requirement when de-
signing a biometric based authentication system. A
brief overview of the main approaches based on the
use of transforms, bio metric cryptosystems, and data
hiding techniques, either specifically tailored or simply
applied to iris template protection have been here
outlined.
Related Entries
▶ Biometric Encryption
▶ Biometric Security Overview
▶ Iris Databases
▶ Iris Digital Watermarking
▶ Template Security
References
1. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of
applied cryptography, CRC Press (1996)
2. Bolle, R.M., Connell, J.H., Ratha, N.K.: Biometric perils and
patches. Pattern Recognit. 35, 2727–2738 (2002)
3. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template secu-
rity. EURASIP J. Adv. Signal. Process, Special Issue on Advanced
signal processing and pattern recognition methods for
Biometrics, article ID 579416 (2008)
4. Cox, I., Miller, M., Bloom, J., Miller, M., Fridrich, J.: Digital
watermarking and steganography 2nd edn. Morgan Kaufmann
(2007)
5. Chin, C.S., Teoh, A.B.J., Ngo, D.C.L.: High security iris verifica-
tion system based on random secret integration. Comput. Vis.
Image Underst. 102(2), 169–177 (2006)
6. Daugman, J.: How iris recognition works. IEEE Trans. Circuits
Syst. Video Technol. 14(1), 21–30 (2004)
7. Juels, A., Wattenberg, M.: A fuzzy commitment scheme, In: Sixth
ACM Conference on Computer and Communication Security,
pp. 28–36 (1999)
8. Juels, A., Sudan, M.: A fuzzy vault scheme, In: Proceedings of
the IEEE on International Symposium on Information Theory,
pp. 408 (2002)
9. Yang, S., Verbauwhede, I.: Secure iris verification, In: Proceed-
ings of the IEEE ICASSP 2007, vol. 2, pp. 133–136 (2007)
10. Hao, F., Anderson, R., Daugman, J.: Combining crypto with
biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088
(2006)
11. Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zemor, G.:
Optimal iris fuzzy sketches. In: First IEEE International Confer-
ence on Biometrics: Theory, Applications, and Systems, BTAS
2007, pp. 1–6 (2007)
12. Lee, Y.J., Bae, K., Lee, S.J., Park, K.R.: Biometric key binding:
Fuzzy vault based on iris images. ICB 2007, LNCS 4642,
pp. 800–808 (2002)
13. Nandakumar, K.: Multibiometric systems: Fusion strategies and
template security, Dissertation, Michigan State University, De-
partment of Computer Science and Engineering (2008)
14. Martinian, E., Yekhanin, S., Yedidia, J.S.: Secure biometrics via
syndromes. In: 43rd Annual Allerton Conference on Commu-
nications, Control, and Computing, Monticello, IL, Oct (2005)
15. Khan, M.K., Zhang, J., Tian, L.: Chaotic secure content-based
hidden transmission of biometric templates, Chaos Solitons &
Fractals, Elsevier, 32, pp. 1749–1759 (2007)
Iris Template Security
▶ Iris Template Protection
Iris2pi
This is a most widely used iris recognition algorithm as
of 2008. This is a version of the Daugman algorithm.
It differs from an earli er version, ‘‘bowtie,’’ in the way
it handles eyelid (and other) occlusions. The bowti e
872
I
Iris Template Security