A. Elmoataz et al. (Eds.): ICISP 2012, LNCS 7340, pp. 235–244, 2012. © Springer-Verlag Berlin Heidelberg 2012 Spiral Cube for Biometric Template Protection Chouaib Moujahdi 1 , Sanaa Ghouzali 1,2 , Mounia Mikram 1,3 , Mohammed Rziza 1 , and George Bebis 4 1 LRIT, Faculty of Sciences, Mohammed V-Agdal University, Rabat, Morocco 2 Information Technology Department, CCIS, King Saud University, Saudi Arabia 3 The School of Information Sciences, Rabat, Morocco 4 Dept of Computer Science and Engineering, University of Nevada, Reno moujahdi_chouaib@yahoo.fr Abstract. In this paper we present a new approach for biometric template pro- tection. Our objective is to build a preliminary non-invertible transformation approach, based on random projection, which meets the requirements of revo- cability, diversity, security and performance. We use the chaotic behavior of logistic map to build the projection vectors using a new technique that makes the construction of the projection matrix depend on the biometric template and its identity. Experimental results conducted on several face databases show the ability of our technique to preserve and increase the performance of protected systems. Moreover, we demonstrate that the security of our approach is suffi- ciently robust to possible attacks. Keywords: Template protection, random projection, logistic map, revocability, security. 1 Introduction The growing concern for the problem of identity theft and the urgent need for indi- vidual privacy make the conception of personal authentication / identification systems increasingly important. These systems must authenticate users respecting several requirements, like speed, reliability, accurately and protection of user’s privacy. Tra- ditional systems of personal authentication which use passwords or ID cards are not able to meet all these requirements. For against, authentication systems based on bio- metrics, which use physiological (face, iris, etc.) and behavioral (signature, etc.) mod- alities, have proven a priority over traditional systems. But while biometrics ensure uniqueness, they do not provide the secrecy. For example, a person let his fingerprints on every touched surface and face images can be seen everywhere. Consequently, many attacks can be launched against the biometric systems, which reduce the credi- bility of these systems. Therefore, although biometric technologies have inherent advantages over traditional methods of personal authentication / identification, the problem of ensuring the security of biometric data is critical. In practice, opponents exploit the structure of biometric systems to launch their at- tacks. All biometric systems consist of four main modules (Fig. 1): the sensor module.