Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Analysis of the Iriscode Bioencoding Scheme
Patrick Lacharme
Pages - 315 - 321     |    Revised - 15-09-2012     |    Published - 24-10-2012
Volume - 6   Issue - 5    |    Publication Date - October 2012  Table of Contents
Cancelable Biometrics, Bioencoding Scheme, Iriscode
Cancelable biometrics is a technique used to enhance security and user privacy. These schemes are employed to generate multiple revocable data from the original biometric template. In this paper, the security of binary template transformations is evaluated, through a new transformation for iris templates, called bioencoding scheme. This transformation and its security is analyzed, using Boolean functions and non linear Boolean systems. A general discussion on binary template transformations is finally proposed.
CITED BY (2)  
1 Tarek, M., Ouda, O., & Hamza, T. (2016). Robust cancellable biometrics scheme based on neural networks. IET Biometrics.
2 Tarek, M., Ouda, O., & Hamza, T. (2014). Tokenless Cancelable Biometric Templates Based on Hetroassociation Neural Network. International Journal of Biometrics and Bioinformatics (IJBB), 8(2), 8.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 CiteSeerX
4 refSeek
5 Scribd
6 slideshare
7 PdfSR
1 N. Ratha, J. Connell and R. M. Bolle. “Enhancing Security and Privacy in Biometrics biased Authentication Systems”, IBM Systems, vol 40, N 3, pp. 614-634, 2001.
2 A. Nagar, K. Nandakumar and A. K. Jain. “Biometric template transformation: A security analysis”, SPIE, Electronic Imaging, Media Forensics and Security XII, 2010.
3 D. Maio, D. Maltoni, A. Jain and S. Prabhakar. “ Handbook of fingerprint recognition”,Springer, 2009.
4 R. Belguechi, E. Cherrier and C. Rosenberger. “How to Evaluate Transformation Based Cancelable Biometric Systems?”, IBPC 2012.
5 A. K. Jain, K. Nandakumar and A. Nagar. “Biometric Template Security”, EURASIP J.Advances in Signal Processing, vol 8, N 2, pp. 1-17, 2008.
6 C. Rathgeb and A. Uhl. “A Survey on Biometric Cryptosystems and Cancelable Biometrics”,EURASIP J. on Information Security, vol 3, 2011.
7 O. Ouda, N. Tsumura and T. Nakaguchi. “Tokenless cancelable biometrics scheme for protecting iris codes”, ICPR'10, pp. 882-885, 2010.
8 O. Ouda, N. Tsumura and T. Nakaguchi. “BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes”, IEICE Transaction on Information and Systems, vol E93-D, N 7, pp. 1878-1888, 2010.
9 O. Ouda, N. Tsumura and T. Nakaguchi. “Securing BioEncoded iriscodes against Correlation Attacks”, IEEE Int. Conference on Communications, ICC'11, pp. 1-5, 2011.
10 O. Ouda, N. Tsumura and T. Nakaguchi. “On the Security of BioEncoding Based Cancelable Biometrics”, IEICE Trans. on Information and Systems, vol E94-D, N 9, pp. 1768-1778,2011.
11 J. Daugman. “Probing the uniqueness and randomness of iris codes: results from 200 billion iris pair comparisons, IEEE, vol 94, N 11, pp. 1927-1935, 2006.
12 K. W. Bowyer, K. Hollingsworth and P. J. Flynn. “Image understanding for iris biometrics: A survey”, Computer Vision and Image Understanding, vol 110, N 2, pp. 281-307, 2007.
13 J. Daugman. “High confidence visual recognition of persons by a test of statistical independence”, IEEE Transactions on PAMI, vol 15, N 11, pp. 1148-1161, 1993.
14 J. Daugman. “The importance of being random: Statistical principles of iris recognition”,Pattern Recognition, vol 36, N 2, pp. 279-291, 2003.
15 J. Daugman, ”How iris recognition works”, IEEE Transactions on Circiuts and Systems for Video Technology, vol 14, N 1, pp. 21-30, 2004.
16 F. Hao, R. Anderson and J. Daugman. “Combining crypto with biometrics effectively”, IEEE Transactions on Computers, vol 55, N 9, pp. 1081-1088, 2006.
17 J. Bringer, H. Chabanne, G. Cohen, B. Kindarji and G. Zemor. “Optimal iris fuzzy sketches”,1st IEEE Int. Conference on Biometrics: Theory, Applications and Systems, pp. 1-6, 2007.
18 S. C. Chong, A. B. J. Teoh and D. C. L. Ngo. “High security iris verification system based on random secret integration”, Computer Vision and Image Understanding, vol 102, N 2,pp. 169-177, 2006.
19 S. C. Chong, A. B. J. Teoh and D. C. L. Ngo. “Iris authentication using privatized advanced correlation filter”, International Conference in Biometrics (ICB), pp. 382-386, 2006.
20 J. Zuo, N. K. Ratha and J. H. Connell. “Cancelable iris biometric”, Conference on Pattern Recognition (ICPR), pp. 1-4, 2008.
21 J. K. Pillai, V. M. Patel, R. Chellappa and N. K. Ratha. “Secure and Robust Iris Recognition using Random Projections and Sparse Representations”, IEEE Transactions on pattern analysis and machine inteligence, vol 33, N 9, 2011.
22 C. Rathgeb and A. Uhl. ” The State-of-the-Art in Iris Biometric Cryptosystems”, InTech, pp.179-202, 2011.
23 C. Carlet. “Boolean functions for cryptography and error correcting codes”, Cambridge Univ.Press, pp. 257-397, 2010.
24 A. Nagar, K. Nandakumar and A. K. Jain. “MultiBiometric Cryptosystems Based on FeatureLevel Fusion”, IEEE Transactions on Information Forensics and Security, vol 7, N 1, 2012.
25 L. Nanni and A. Lumini. “Local binary patterns for a hybrid fingerprint matcher”, Pattern Recognition, vol 41, N 11, pp.3461-3466, 2008.
Associate Professor Patrick Lacharme
ensicaen - France