A. Elmoataz et al. (Eds.): ICISP 2012, LNCS 7340, pp. 235–244, 2012.
© Springer-Verlag Berlin Heidelberg 2012
Spiral Cube for Biometric Template Protection
Chouaib Moujahdi
1
, Sanaa Ghouzali
1,2
, Mounia Mikram
1,3
,
Mohammed Rziza
1
, and George Bebis
4
1
LRIT, Faculty of Sciences, Mohammed V-Agdal University, Rabat, Morocco
2
Information Technology Department, CCIS, King Saud University, Saudi Arabia
3
The School of Information Sciences, Rabat, Morocco
4
Dept of Computer Science and Engineering, University of Nevada, Reno
moujahdi_chouaib@yahoo.fr
Abstract. In this paper we present a new approach for biometric template pro-
tection. Our objective is to build a preliminary non-invertible transformation
approach, based on random projection, which meets the requirements of revo-
cability, diversity, security and performance. We use the chaotic behavior of
logistic map to build the projection vectors using a new technique that makes
the construction of the projection matrix depend on the biometric template and
its identity. Experimental results conducted on several face databases show the
ability of our technique to preserve and increase the performance of protected
systems. Moreover, we demonstrate that the security of our approach is suffi-
ciently robust to possible attacks.
Keywords: Template protection, random projection, logistic map, revocability,
security.
1 Introduction
The growing concern for the problem of identity theft and the urgent need for indi-
vidual privacy make the conception of personal authentication / identification systems
increasingly important. These systems must authenticate users respecting several
requirements, like speed, reliability, accurately and protection of user’s privacy. Tra-
ditional systems of personal authentication which use passwords or ID cards are not
able to meet all these requirements. For against, authentication systems based on bio-
metrics, which use physiological (face, iris, etc.) and behavioral (signature, etc.) mod-
alities, have proven a priority over traditional systems. But while biometrics ensure
uniqueness, they do not provide the secrecy. For example, a person let his fingerprints
on every touched surface and face images can be seen everywhere. Consequently,
many attacks can be launched against the biometric systems, which reduce the credi-
bility of these systems. Therefore, although biometric technologies have inherent
advantages over traditional methods of personal authentication / identification, the
problem of ensuring the security of biometric data is critical.
In practice, opponents exploit the structure of biometric systems to launch their at-
tacks. All biometric systems consist of four main modules (Fig. 1): the sensor module.