Article Preview
Top1. Introduction
Security of stored biometric template is the main challenge in today’s digital scenario. This chapter explores how to resolve the current security issues with the stored biometric template. The main objective of the proposed technique is to secure the biometric template before storing it into the database. For the security of biometric template, the AES encryption algorithm is used with helping data which will use as a symmetric key for AES encryption algorithm. This research is mainly based on the oldest security system of stored data where the password was stored as it is in normal text format in the personal computer database and the regular text format is easily compromised. If the normal password is compromised, one can easily change and replace it with the new one. However, if the stored biometric feature is compromised, it will be lost permanently, and the user can never use this biometric feature in future for any verification process. The biometric template security is based on three types of technique- transformation, biometric cryptosystem and watermarking. The proposed scheme is based on template transformation technique.
Template transformation is a process where the input biometric template is modified by the user given key which is difficult to retrieve the original biometric template from the encoded template. During authentication, the same process is applied to the biometric query. The input biometric feature is also encrypted by the same user specific key. For verification the stored and received biometric template are decrypted and then are matched with each other; if the received and stored biometric feature is matched then the requested user is authorized or if does not match, the request for verification is rejected.
Top2. Previous Work
Biometric template is the particular attributes of a biometric sample. It is a reference to particular attributes that have been extracted from a biometric sample. This paper is dealt with the background study of biometric template security techniques. Many research scholars have work on this technique. Jain et al., (2002, 2008) pointed that the fake biometric data replaces the stored biometric data in order to illegal access such as physical spoof, a set of fake biometric data. For gaining illegal access the stolen biometric is replayed to the matcher. The stored biometric data consist of the data of an individual in a database which is used for comparison for biometric verification system. If the biometric data is quite close to the one presented, the person is verified. Hence this system has great problem for security of the biometric data. The privacy of stored biometric data is affected by internal and external attacks.
Rudolf et al., (1998), Maltoni et al., (2009), Putte and Keuning (2000) have analyzed the problem in verification system. During verification system in large scale the stored database can be accessed by several verifiers who cannot be trusted. The database is not secured from the serious threat in a network situation. According to Matsumoto et al., (2002) the biometric data can be mistreated to construct artificial biometric in order to impersonate individual.
Hill et al., (2001) point out that the artificial biometric used for illegal verification may be constructed if some data of biometric (minutia) are available. Schneier, (1999) hold the view that the identity of an individual is stolen if his biometric data is stolen. The identity of a person is lost permanently when his biometric data is stolen. Therefore, it is very essential to maintain the security of biometric data. vide (Babler, 1991; Miller, 1973; Penrose, 1965) show the genetic information in the fingerprint which creates a serious problem. Ratha et al. (2001) finds the different types of attack on biometric system: